You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-registry/container-registry-enable-conditional-access-policy.md
+65-64Lines changed: 65 additions & 64 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,9 +19,9 @@ The Conditional Access policy applies after the first-factor authentication to t
19
19
20
20
The following steps will help create a Conditional Access policy for Azure Container Registry (ACR).
21
21
22
-
1. Disable authentication-as-arm in ACR - Azure CLI.
23
-
2. Disable authentication-as-arm in the ACR - Azure portal.
24
-
3. Create and configure Conditional Access policy for Azure Container Registry.
22
+
1. Disable authentication-as-arm in ACR - Azure CLI.
23
+
2. Disable authentication-as-arm in the ACR - Azure portal.
24
+
3. Create and configure Conditional Access policy for Azure Container Registry.
25
25
26
26
## Prerequisites
27
27
@@ -30,18 +30,18 @@ The following steps will help create a Conditional Access policy for Azure Conta
30
30
31
31
## Disable authentication-as-arm in ACR - Azure CLI
32
32
33
-
Disabling `azureADAuthenticationAsArmPolicy` will force the registry to use ACR audience token. You can use Azure CLI version 2.40.0 or later, run `az --version` to find the version.
33
+
Disabling `azureADAuthenticationAsArmPolicy` will force the registry to use ACR audience token. You can use Azure CLI version 2.40.0 or later, run `az --version` to find the version.
34
34
35
-
1. Run the command to show the current configuration of the registry's policy for authentication using ARM tokens with the registry. If the status is `enabled`, then both ACRs and ARM audience tokens can be used for authentication. If the status is `disabled` it means only ACR's audience tokens can be used for authentication.
35
+
1. Run the command to show the current configuration of the registry's policy for authentication using ARM tokens with the registry. If the status is `enabled`, then both ACRs and ARM audience tokens can be used for authentication. If the status is `disabled` it means only ACR's audience tokens can be used for authentication.
36
36
37
-
```azurecli-interactive
38
-
az acr config authentication-as-arm show -r <registry>
39
-
```
37
+
```azurecli-interactive
38
+
az acr config authentication-as-arm show -r <registry>
39
+
```
40
40
41
-
1. Run the command to update the status of the registry's policy.
41
+
1. Run the command to update the status of the registry's policy.
42
42
43
-
```azurecli-interactive
44
-
az acr config authentication-as-arm update -r <registry> --status [enabled/disabled]
43
+
```azurecli-interactive
44
+
az acr config authentication-as-arm update -r <registry> --status [enabled/disabled]
45
45
```
46
46
47
47
## Disable authentication-as-arm in the ACR - Azure portal
@@ -50,50 +50,51 @@ Disabling `authentication-as-arm` property by assigning a built-in policy will a
50
50
51
51
You can disable authentication-as-arm in the ACR, by following below steps:
52
52
53
-
1. Sign in to the [Azure portal](https://portal.azure.com).
54
-
2. Refer to the ACR's built-in policy definitions in the [azure-container-registry-built-in-policy definition's](policy-reference.md).
55
-
3. Assign a built-in policy to disable authentication-as-arm definition - Azure portal.
53
+
1. Sign in to the [Azure portal](https://portal.azure.com).
54
+
2. Refer to the ACR's built-in policy definitions in the [azure-container-registry-built-in-policy definition's](policy-reference.md).
55
+
3. Assign a built-in policy to disable authentication-as-arm definition - Azure portal.
56
56
57
57
### Assign a built-in policy definition to disable ARM audience token authentication - Azure portal.
58
58
59
59
You can enable registry's Conditional Access policy in the [Azure portal](https://portal.azure.com).
60
60
61
-
1. Sign in to the [Azure portal](https://portal.azure.com).
61
+
Azure Container Registry has two built-in policy definitions to disable authentication-as-arm, as below:
62
+
63
+
>* `Container registries should have ARM audience token authentication disabled.` - This policy will report, block any non-compliant resources, and also sends a request to update non-compliant to compliant.
64
+
>* `Configure container registries to disable ARM audience token authentication.` - This policy offers remediation and updates non-compliant to compliant resources.
65
+
62
66
63
-
1. Navigate to your **Azure Container Registry** > **Resource Group** > **Settings** > **Policies** .
64
-
65
-
:::image type="content" source="media/container-registry-enable-conditional-policy/01-azure-policies.png" alt-text="Screenshot showing how to navigate Azure policies.":::
67
+
1. Sign in to the [Azure portal](https://portal.azure.com).
66
68
67
-
1. Navigate to **Azure Policy**, On the **Assignments**, select **Assign policy**.
69
+
1. Navigate to your **Azure Container Registry** > **Resource Group** > **Settings** > **Policies** .
68
70
69
-
:::image type="content" source="media/container-registry-enable-conditional-policy/02-Assign-policy.png" alt-text="Screenshot showing how to assign a policy.":::
71
+
:::image type="content" source="media/container-registry-enable-conditional-policy/01-azure-policies.png" alt-text="Screenshot showing how to navigate Azure policies.":::
70
72
71
-
1. Under the **Assign policy** , use filters to search and find the **Scope**, **Policy definition**, **Assignment name**.
73
+
1. Navigate to **Azure Policy**, On the **Assignments**, select **Assign policy**.
74
+
75
+
:::image type="content" source="media/container-registry-enable-conditional-policy/02-Assign-policy.png" alt-text="Screenshot showing how to assign a policy.":::
72
76
73
-
:::image type="content" source="media/container-registry-enable-conditional-policy/03-Assign-policy-tab.png" alt-text="Screenshot of the assign policy tab.":::
77
+
1. Under the **Assignpolicy** , use filters to search and find the **Scope**, **Policy definition**, **Assignment name**.
74
78
75
-
1. Select **Scope** to filter and search for the **Subscription** and **ResourceGroup** and choose **Select**.
76
-
77
-
:::image type="content" source="media/container-registry-enable-conditional-policy/04-select-scope.png" alt-text="Screenshot of the Scope tab.":::
79
+
:::image type="content" source="media/container-registry-enable-conditional-policy/03-Assign-policy-tab.png" alt-text="Screenshot of the assign policy tab.":::
78
80
79
-
1. Select **Policy definition** to filter and search the built-in policy definitions for the Conditional Access policy.
81
+
1. Select **Scope** to filter and search for the **Subscription** and **ResourceGroup** and choose **Select**.
80
82
81
-
:::image type="content" source="media/container-registry-enable-conditional-policy/05-built-in-policy-definitions.png" alt-text="Screenshot of built-in-policy-definitions.":::
82
-
83
-
Azure Container Registry has two built-in policy definitions to disable authentication-as-arm, as below:
83
+
:::image type="content" source="media/container-registry-enable-conditional-policy/04-select-scope.png" alt-text="Screenshot of the Scope tab.":::
84
84
85
-
>* `Container registries should have ARM audience token authentication disabled.` - This policy will report, block any non-compliant resources, and also sends a request to update non-compliant to compliant.
86
-
>* `Configure container registries to disable ARM audience token authentication.` - This policy offers remediation and updates non-compliant to compliant resources.
85
+
1. Select **Policy definition** to filter and search the built-in policy definitions for the Conditional Access policy.
86
+
87
+
:::image type="content" source="media/container-registry-enable-conditional-policy/05-built-in-policy-definitions.png" alt-text="Screenshot of built-in-policy-definitions.":::
87
88
88
-
1. Use filters to select and confirm **Scope**, **Policy definition**, and **Assignment name**.
89
+
1. Use filters to select and confirm **Scope**, **Policy definition**, and **Assignment name**.
89
90
90
-
1. Use the filters to limit compliance states or to search for policies.
91
+
1. Use the filters to limit compliance states or to search for policies.
91
92
92
-
1. Confirm your settings and set policy enforcement as **enabled**.
93
+
1. Confirm your settings and set policy enforcement as **enabled**.
93
94
94
-
1. Select **Review+Create**.
95
+
1. Select **Review+Create**.
95
96
96
-
:::image type="content" source="media/container-registry-enable-conditional-policy/06-enable-policy.png" alt-text="Screenshot to activate a Conditional Access policy":::
97
+
:::image type="content" source="media/container-registry-enable-conditional-policy/06-enable-policy.png" alt-text="Screenshot to activate a Conditional Access policy":::
97
98
98
99
99
100
## Create and configure a Conditional Access policy - Azure portal
@@ -102,54 +103,54 @@ ACR supports Conditional Access policy for Active Directory users only. It curre
102
103
103
104
Create a Conditional Access policy and assign your test group of users as follows:
104
105
105
-
1. Sign in to the [Azure portal](https://portal.azure.com) by using an account with *global administrator* permissions.
106
+
1. Sign in to the [Azure portal](https://portal.azure.com) by using an account with *global administrator* permissions.
106
107
107
-
1. Search for and select **Azure Active Directory**. Then select **Security** from the menu on the left-hand side.
108
+
1. Search for and select **Azure Active Directory**. Then select **Security** from the menu on the left-hand side.
108
109
109
-
1. Select **Conditional Access**, select **+ New policy**, and then select **Create new policy**.
110
-
111
-
:::image type="content" alt-text="A screenshot of the Conditional Access page, where you select 'New policy' and then select 'Create new policy'." source="media/container-registry-enable-conditional-policy/01-create-conditional-access.png":::
110
+
1. Select **Conditional Access**, select **+ New policy**, and then select **Create new policy**.
111
+
112
+
:::image type="content" alt-text="A screenshot of the Conditional Access page, where you select 'New policy' and then select 'Create new policy'." source="media/container-registry-enable-conditional-policy/01-create-conditional-access.png":::
112
113
113
-
1. Enter a name for the policy, such as *demo*.
114
+
1. Enter a name for the policy, such as *demo*.
114
115
115
-
1. Under **Assignments**, select the current value under **Users or workload identities**.
116
-
117
-
:::image type="content" alt-text="A screenshot of the Conditional Access page, where you select the current value under 'Users or workload identities'." source="media/container-registry-enable-conditional-policy/02-conditional-access-users-and-groups.png":::
116
+
1. Under **Assignments**, select the current value under **Users or workload identities**.
117
+
118
+
:::image type="content" alt-text="A screenshot of the Conditional Access page, where you select the current value under 'Users or workload identities'." source="media/container-registry-enable-conditional-policy/02-conditional-access-users-and-groups.png":::
118
119
119
-
1. Under **What does this policy apply to?**, verify and select **Users and groups**.
120
+
1. Under **What does this policy apply to?**, verify and select **Users and groups**.
120
121
121
-
1. Under **Include**, choose **Select users and groups**, and then select **All users**.
122
-
123
-
:::image type="content" alt-text="A screenshot of the page for creating a new policy, where you select options to specify users." source="media/container-registry-enable-conditional-policy/03-conditional-access-users-groups-select-users.png":::
122
+
1. Under **Include**, choose **Select users and groups**, and then select **All users**.
123
+
124
+
:::image type="content" alt-text="A screenshot of the page for creating a new policy, where you select options to specify users." source="media/container-registry-enable-conditional-policy/03-conditional-access-users-groups-select-users.png":::
124
125
125
-
1. Under **Exclude**, choose **Select users and groups**, to exclude any choice of selection.
126
+
1. Under **Exclude**, choose **Select users and groups**, to exclude any choice of selection.
126
127
127
-
1. Under **Cloud apps or actions**, choose **Cloud apps**.
128
+
1. Under **Cloud apps or actions**, choose **Cloud apps**.
128
129
129
-
1. Under **Include**, choose **Select apps**.
130
+
1. Under **Include**, choose **Select apps**.
130
131
131
-
:::image type="content" alt-text="A screenshot of the page for creating a new policy, where you select options to specify cloud apps." source="media/container-registry-enable-conditional-policy/04-select-cloud-apps-select-apps.png":::
132
+
:::image type="content" alt-text="A screenshot of the page for creating a new policy, where you select options to specify cloud apps." source="media/container-registry-enable-conditional-policy/04-select-cloud-apps-select-apps.png":::
132
133
133
-
1. Browse for and select apps to apply Conditional Access, in this case *Azure Container Registry*, then choose **Select**.
134
+
1. Browse for and select apps to apply Conditional Access, in this case *Azure Container Registry*, then choose **Select**.
134
135
135
-
:::image type="content" alt-text="A screenshot of the list of apps, with results filtered, and 'Azure Container Registry' selected." source="media/container-registry-enable-conditional-policy/05-select-azure-container-registry-app.png":::
136
+
:::image type="content" alt-text="A screenshot of the list of apps, with results filtered, and 'Azure Container Registry' selected." source="media/container-registry-enable-conditional-policy/05-select-azure-container-registry-app.png":::
136
137
137
-
1. Under **Conditions** , configure control access level with options such as *User risk level*, *Sign-in risk level*, *Sign-in risk detections (Preview)*, *Device platforms*, *Locations*, *Client apps*, *Time (Preview)*, *Filter for devices*.
138
+
1. Under **Conditions** , configure control access level with options such as *User risk level*, *Sign-in risk level*, *Sign-in risk detections (Preview)*, *Device platforms*, *Locations*, *Client apps*, *Time (Preview)*, *Filter for devices*.
138
139
139
-
1. Under **Grant**, filter and choose from options to enforce grant access or block access, during a sign-in event to the Azure portal. In this case grant access with *Require multifactor authentication*, then choose **Select**.
140
+
1. Under **Grant**, filter and choose from options to enforce grant access or block access, during a sign-in event to the Azure portal. In this case grant access with *Require multifactor authentication*, then choose **Select**.
140
141
141
-
>[!TIP]
142
-
> To configure and grant multi-factor authentication, see [configure and conditions for multi-factor authentication.](/azure/active-directory/authentication/tutorial-enable-azure-mfa#configure-the-conditions-for-multi-factor-authentication)
142
+
>[!TIP]
143
+
> To configure and grant multi-factor authentication, see [configure and conditions for multi-factor authentication.](/azure/active-directory/authentication/tutorial-enable-azure-mfa#configure-the-conditions-for-multi-factor-authentication)
143
144
144
-
1. Under **Session**, filter and choose from options to enable any control on session level experience of the cloud apps.
145
+
1. Under **Session**, filter and choose from options to enable any control on session level experience of the cloud apps.
145
146
146
-
1. After selecting and confirming, Under **Enable policy**, select **On**.
147
+
1. After selecting and confirming, Under **Enable policy**, select **On**.
147
148
148
-
1. To apply and activate the policy, Select **Create**.
149
+
1. To apply and activate the policy, Select **Create**.
149
150
150
-
:::image type="content" alt-text="A screenshot showing how to activate the Conditional Access policy." source="media/container-registry-enable-conditional-policy/06-enable-conditional-access-policy.png":::
151
+
:::image type="content" alt-text="A screenshot showing how to activate the Conditional Access policy." source="media/container-registry-enable-conditional-policy/06-enable-conditional-access-policy.png":::
151
152
152
-
We have now completed creating the Conditional Access policy for the Azure Container Registry.
153
+
We have now completed creating the Conditional Access policy for the Azure Container Registry.
0 commit comments