Skip to content

Commit 0597817

Browse files
indent edits
1 parent d596c5a commit 0597817

File tree

1 file changed

+65
-64
lines changed

1 file changed

+65
-64
lines changed

articles/container-registry/container-registry-enable-conditional-access-policy.md

Lines changed: 65 additions & 64 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ The Conditional Access policy applies after the first-factor authentication to t
1919

2020
The following steps will help create a Conditional Access policy for Azure Container Registry (ACR).
2121

22-
1. Disable authentication-as-arm in ACR - Azure CLI.
23-
2. Disable authentication-as-arm in the ACR - Azure portal.
24-
3. Create and configure Conditional Access policy for Azure Container Registry.
22+
1. Disable authentication-as-arm in ACR - Azure CLI.
23+
2. Disable authentication-as-arm in the ACR - Azure portal.
24+
3. Create and configure Conditional Access policy for Azure Container Registry.
2525

2626
## Prerequisites
2727

@@ -30,18 +30,18 @@ The following steps will help create a Conditional Access policy for Azure Conta
3030
3131
## Disable authentication-as-arm in ACR - Azure CLI
3232

33-
Disabling `azureADAuthenticationAsArmPolicy` will force the registry to use ACR audience token. You can use Azure CLI version 2.40.0 or later, run `az --version` to find the version.
33+
Disabling `azureADAuthenticationAsArmPolicy` will force the registry to use ACR audience token. You can use Azure CLI version 2.40.0 or later, run `az --version` to find the version.
3434

35-
1. Run the command to show the current configuration of the registry's policy for authentication using ARM tokens with the registry. If the status is `enabled`, then both ACRs and ARM audience tokens can be used for authentication. If the status is `disabled` it means only ACR's audience tokens can be used for authentication.
35+
1. Run the command to show the current configuration of the registry's policy for authentication using ARM tokens with the registry. If the status is `enabled`, then both ACRs and ARM audience tokens can be used for authentication. If the status is `disabled` it means only ACR's audience tokens can be used for authentication.
3636

37-
```azurecli-interactive
38-
az acr config authentication-as-arm show -r <registry>
39-
```
37+
```azurecli-interactive
38+
az acr config authentication-as-arm show -r <registry>
39+
```
4040
41-
1. Run the command to update the status of the registry's policy.
41+
1. Run the command to update the status of the registry's policy.
4242
43-
```azurecli-interactive
44-
az acr config authentication-as-arm update -r <registry> --status [enabled/disabled]
43+
```azurecli-interactive
44+
az acr config authentication-as-arm update -r <registry> --status [enabled/disabled]
4545
```
4646
4747
## Disable authentication-as-arm in the ACR - Azure portal
@@ -50,50 +50,51 @@ Disabling `authentication-as-arm` property by assigning a built-in policy will a
5050
5151
You can disable authentication-as-arm in the ACR, by following below steps:
5252
53-
1. Sign in to the [Azure portal](https://portal.azure.com).
54-
2. Refer to the ACR's built-in policy definitions in the [azure-container-registry-built-in-policy definition's](policy-reference.md).
55-
3. Assign a built-in policy to disable authentication-as-arm definition - Azure portal.
53+
1. Sign in to the [Azure portal](https://portal.azure.com).
54+
2. Refer to the ACR's built-in policy definitions in the [azure-container-registry-built-in-policy definition's](policy-reference.md).
55+
3. Assign a built-in policy to disable authentication-as-arm definition - Azure portal.
5656
5757
### Assign a built-in policy definition to disable ARM audience token authentication - Azure portal.
5858
5959
You can enable registry's Conditional Access policy in the [Azure portal](https://portal.azure.com).
6060
61-
1. Sign in to the [Azure portal](https://portal.azure.com).
61+
Azure Container Registry has two built-in policy definitions to disable authentication-as-arm, as below:
62+
63+
>* `Container registries should have ARM audience token authentication disabled.` - This policy will report, block any non-compliant resources, and also sends a request to update non-compliant to compliant.
64+
>* `Configure container registries to disable ARM audience token authentication.` - This policy offers remediation and updates non-compliant to compliant resources.
65+
6266
63-
1. Navigate to your **Azure Container Registry** > **Resource Group** > **Settings** > **Policies** .
64-
65-
:::image type="content" source="media/container-registry-enable-conditional-policy/01-azure-policies.png" alt-text="Screenshot showing how to navigate Azure policies.":::
67+
1. Sign in to the [Azure portal](https://portal.azure.com).
6668
67-
1. Navigate to **Azure Policy**, On the **Assignments**, select **Assign policy**.
69+
1. Navigate to your **Azure Container Registry** > **Resource Group** > **Settings** > **Policies** .
6870
69-
:::image type="content" source="media/container-registry-enable-conditional-policy/02-Assign-policy.png" alt-text="Screenshot showing how to assign a policy.":::
71+
:::image type="content" source="media/container-registry-enable-conditional-policy/01-azure-policies.png" alt-text="Screenshot showing how to navigate Azure policies.":::
7072
71-
1. Under the **Assign policy** , use filters to search and find the **Scope**, **Policy definition**, **Assignment name**.
73+
1. Navigate to **Azure Policy**, On the **Assignments**, select **Assign policy**.
74+
75+
:::image type="content" source="media/container-registry-enable-conditional-policy/02-Assign-policy.png" alt-text="Screenshot showing how to assign a policy.":::
7276
73-
:::image type="content" source="media/container-registry-enable-conditional-policy/03-Assign-policy-tab.png" alt-text="Screenshot of the assign policy tab.":::
77+
1. Under the **Assign policy** , use filters to search and find the **Scope**, **Policy definition**, **Assignment name**.
7478
75-
1. Select **Scope** to filter and search for the **Subscription** and **ResourceGroup** and choose **Select**.
76-
77-
:::image type="content" source="media/container-registry-enable-conditional-policy/04-select-scope.png" alt-text="Screenshot of the Scope tab.":::
79+
:::image type="content" source="media/container-registry-enable-conditional-policy/03-Assign-policy-tab.png" alt-text="Screenshot of the assign policy tab.":::
7880
79-
1. Select **Policy definition** to filter and search the built-in policy definitions for the Conditional Access policy.
81+
1. Select **Scope** to filter and search for the **Subscription** and **ResourceGroup** and choose **Select**.
8082
81-
:::image type="content" source="media/container-registry-enable-conditional-policy/05-built-in-policy-definitions.png" alt-text="Screenshot of built-in-policy-definitions.":::
82-
83-
Azure Container Registry has two built-in policy definitions to disable authentication-as-arm, as below:
83+
:::image type="content" source="media/container-registry-enable-conditional-policy/04-select-scope.png" alt-text="Screenshot of the Scope tab.":::
8484
85-
>* `Container registries should have ARM audience token authentication disabled.` - This policy will report, block any non-compliant resources, and also sends a request to update non-compliant to compliant.
86-
>* `Configure container registries to disable ARM audience token authentication.` - This policy offers remediation and updates non-compliant to compliant resources.
85+
1. Select **Policy definition** to filter and search the built-in policy definitions for the Conditional Access policy.
86+
87+
:::image type="content" source="media/container-registry-enable-conditional-policy/05-built-in-policy-definitions.png" alt-text="Screenshot of built-in-policy-definitions.":::
8788
88-
1. Use filters to select and confirm **Scope**, **Policy definition**, and **Assignment name**.
89+
1. Use filters to select and confirm **Scope**, **Policy definition**, and **Assignment name**.
8990
90-
1. Use the filters to limit compliance states or to search for policies.
91+
1. Use the filters to limit compliance states or to search for policies.
9192
92-
1. Confirm your settings and set policy enforcement as **enabled**.
93+
1. Confirm your settings and set policy enforcement as **enabled**.
9394
94-
1. Select **Review+Create**.
95+
1. Select **Review+Create**.
9596
96-
:::image type="content" source="media/container-registry-enable-conditional-policy/06-enable-policy.png" alt-text="Screenshot to activate a Conditional Access policy":::
97+
:::image type="content" source="media/container-registry-enable-conditional-policy/06-enable-policy.png" alt-text="Screenshot to activate a Conditional Access policy":::
9798
9899
99100
## Create and configure a Conditional Access policy - Azure portal
@@ -102,54 +103,54 @@ ACR supports Conditional Access policy for Active Directory users only. It curre
102103
103104
Create a Conditional Access policy and assign your test group of users as follows:
104105
105-
1. Sign in to the [Azure portal](https://portal.azure.com) by using an account with *global administrator* permissions.
106+
1. Sign in to the [Azure portal](https://portal.azure.com) by using an account with *global administrator* permissions.
106107
107-
1. Search for and select **Azure Active Directory**. Then select **Security** from the menu on the left-hand side.
108+
1. Search for and select **Azure Active Directory**. Then select **Security** from the menu on the left-hand side.
108109
109-
1. Select **Conditional Access**, select **+ New policy**, and then select **Create new policy**.
110-
111-
:::image type="content" alt-text="A screenshot of the Conditional Access page, where you select 'New policy' and then select 'Create new policy'." source="media/container-registry-enable-conditional-policy/01-create-conditional-access.png":::
110+
1. Select **Conditional Access**, select **+ New policy**, and then select **Create new policy**.
111+
112+
:::image type="content" alt-text="A screenshot of the Conditional Access page, where you select 'New policy' and then select 'Create new policy'." source="media/container-registry-enable-conditional-policy/01-create-conditional-access.png":::
112113
113-
1. Enter a name for the policy, such as *demo*.
114+
1. Enter a name for the policy, such as *demo*.
114115
115-
1. Under **Assignments**, select the current value under **Users or workload identities**.
116-
117-
:::image type="content" alt-text="A screenshot of the Conditional Access page, where you select the current value under 'Users or workload identities'." source="media/container-registry-enable-conditional-policy/02-conditional-access-users-and-groups.png":::
116+
1. Under **Assignments**, select the current value under **Users or workload identities**.
117+
118+
:::image type="content" alt-text="A screenshot of the Conditional Access page, where you select the current value under 'Users or workload identities'." source="media/container-registry-enable-conditional-policy/02-conditional-access-users-and-groups.png":::
118119
119-
1. Under **What does this policy apply to?**, verify and select **Users and groups**.
120+
1. Under **What does this policy apply to?**, verify and select **Users and groups**.
120121
121-
1. Under **Include**, choose **Select users and groups**, and then select **All users**.
122-
123-
:::image type="content" alt-text="A screenshot of the page for creating a new policy, where you select options to specify users." source="media/container-registry-enable-conditional-policy/03-conditional-access-users-groups-select-users.png":::
122+
1. Under **Include**, choose **Select users and groups**, and then select **All users**.
123+
124+
:::image type="content" alt-text="A screenshot of the page for creating a new policy, where you select options to specify users." source="media/container-registry-enable-conditional-policy/03-conditional-access-users-groups-select-users.png":::
124125
125-
1. Under **Exclude**, choose **Select users and groups**, to exclude any choice of selection.
126+
1. Under **Exclude**, choose **Select users and groups**, to exclude any choice of selection.
126127
127-
1. Under **Cloud apps or actions**, choose **Cloud apps**.
128+
1. Under **Cloud apps or actions**, choose **Cloud apps**.
128129
129-
1. Under **Include**, choose **Select apps**.
130+
1. Under **Include**, choose **Select apps**.
130131
131-
:::image type="content" alt-text="A screenshot of the page for creating a new policy, where you select options to specify cloud apps." source="media/container-registry-enable-conditional-policy/04-select-cloud-apps-select-apps.png":::
132+
:::image type="content" alt-text="A screenshot of the page for creating a new policy, where you select options to specify cloud apps." source="media/container-registry-enable-conditional-policy/04-select-cloud-apps-select-apps.png":::
132133
133-
1. Browse for and select apps to apply Conditional Access, in this case *Azure Container Registry*, then choose **Select**.
134+
1. Browse for and select apps to apply Conditional Access, in this case *Azure Container Registry*, then choose **Select**.
134135
135-
:::image type="content" alt-text="A screenshot of the list of apps, with results filtered, and 'Azure Container Registry' selected." source="media/container-registry-enable-conditional-policy/05-select-azure-container-registry-app.png":::
136+
:::image type="content" alt-text="A screenshot of the list of apps, with results filtered, and 'Azure Container Registry' selected." source="media/container-registry-enable-conditional-policy/05-select-azure-container-registry-app.png":::
136137
137-
1. Under **Conditions** , configure control access level with options such as *User risk level*, *Sign-in risk level*, *Sign-in risk detections (Preview)*, *Device platforms*, *Locations*, *Client apps*, *Time (Preview)*, *Filter for devices*.
138+
1. Under **Conditions** , configure control access level with options such as *User risk level*, *Sign-in risk level*, *Sign-in risk detections (Preview)*, *Device platforms*, *Locations*, *Client apps*, *Time (Preview)*, *Filter for devices*.
138139
139-
1. Under **Grant**, filter and choose from options to enforce grant access or block access, during a sign-in event to the Azure portal. In this case grant access with *Require multifactor authentication*, then choose **Select**.
140+
1. Under **Grant**, filter and choose from options to enforce grant access or block access, during a sign-in event to the Azure portal. In this case grant access with *Require multifactor authentication*, then choose **Select**.
140141
141-
>[!TIP]
142-
> To configure and grant multi-factor authentication, see [configure and conditions for multi-factor authentication.](/azure/active-directory/authentication/tutorial-enable-azure-mfa#configure-the-conditions-for-multi-factor-authentication)
142+
>[!TIP]
143+
> To configure and grant multi-factor authentication, see [configure and conditions for multi-factor authentication.](/azure/active-directory/authentication/tutorial-enable-azure-mfa#configure-the-conditions-for-multi-factor-authentication)
143144
144-
1. Under **Session**, filter and choose from options to enable any control on session level experience of the cloud apps.
145+
1. Under **Session**, filter and choose from options to enable any control on session level experience of the cloud apps.
145146
146-
1. After selecting and confirming, Under **Enable policy**, select **On**.
147+
1. After selecting and confirming, Under **Enable policy**, select **On**.
147148
148-
1. To apply and activate the policy, Select **Create**.
149+
1. To apply and activate the policy, Select **Create**.
149150
150-
:::image type="content" alt-text="A screenshot showing how to activate the Conditional Access policy." source="media/container-registry-enable-conditional-policy/06-enable-conditional-access-policy.png":::
151+
:::image type="content" alt-text="A screenshot showing how to activate the Conditional Access policy." source="media/container-registry-enable-conditional-policy/06-enable-conditional-access-policy.png":::
151152
152-
We have now completed creating the Conditional Access policy for the Azure Container Registry.
153+
We have now completed creating the Conditional Access policy for the Azure Container Registry.
153154
154155
## Next steps
155156

0 commit comments

Comments
 (0)