You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Previously, Conditional Access policies applied only to users when they access apps and services like SharePoint online or the Azure portal. This preview adds support for Conditional Access policies applied to service principals owned by the organization. We call this capability Conditional Access for workload identities.
21
21
22
-
A workload identity is an identity that allows an application or service principal access to resources, sometimes in the context of a user. These workload identities differ from traditional user accounts as:
22
+
A [workload identity](../develop/workload-identities-overview.md) is an identity that allows an application or service principal access to resources, sometimes in the context of a user. These workload identities differ from traditional user accounts as they:
23
23
24
-
- They usually have no formal lifecycle process.
24
+
- Can’t perform multi-factor authentication.
25
+
- Often have no formal lifecycle process.
25
26
- Need to store their credentials or secrets somewhere.
26
-
- Applications may use multiple identities.
27
-
28
-
These differences make workload identities difficult to manage, puts them at higher risk for leaks, and reduces the potential for securing access.
27
+
28
+
These differences make workload identities harder to manage and put them at higher risk for compromise.
29
29
30
30
> [!IMPORTANT]
31
31
> In public preview, you can scope Conditional Access policies to service principals in Azure AD with an Azure Active Directory Premium P2 edition active in your tenant. After general availability, additional licenses might be required.
32
32
33
33
> [!NOTE]
34
34
> Policy can be applied to single tenant service principals that have been registered in your tenant. Third party SaaS and multi-tenanted apps are out of scope. Managed identities are not covered by policy.
35
35
36
-
This preview enables blocking service principals from outside of trusted IP ranges, such as a corporate network public IP ranges.
36
+
This preview enables blocking service principals from outside of trusted public IP ranges, or based on risk detected by Azure AD Identity Protection.
37
37
38
38
## Implementation
39
39
40
-
### Step 1: Set up a sample application
41
-
42
-
If you already have a test application that makes use of a service principal, you can skip this step.
43
-
44
-
Set up a sample application that, demonstrates how a job or a Windows service can run with an application identity, instead of a user's identity. Follow the instructions in the article [Quickstart: Get a token and call the Microsoft Graph API by using a console app's identity](../develop/quickstart-v2-netcore-daemon.md) to create this application.
45
-
46
-
### Step 2: Create a Conditional Access policy
40
+
### Create a location-based Conditional Access policy
47
41
48
42
Create a location based Conditional Access policy that applies to service principals.
49
43
@@ -60,6 +54,52 @@ Create a location based Conditional Access policy that applies to service princi
60
54
1. Your policy can be saved in **Report-only** mode, allowing administrators to estimate the effects, or policy is enforced by turning policy **On**.
61
55
1. Select **Create** to complete your policy.
62
56
57
+
### Create a risk-based Conditional Access policy
58
+
59
+
Use this sample JSON for a risk-based policy using the [Microsoft Graph beta endpoint](/graph/api/resources/conditionalaccesspolicy?view=graph-rest-1.0&preserve-view=true).
60
+
61
+
> [!NOTE]
62
+
> Report-only mode doesn't report account risk on a risky workload identity.
If you wish to roll back this feature, you can delete or disable any created policies.
@@ -77,14 +117,14 @@ Failure reason when Service Principal is blocked by Conditional Access: “Acces
77
117
78
118
### Finding the objectID
79
119
80
-
You can get the objectID of the service principal from Azure AD Enterprise Applications. The Object ID in Azure AD App registrations cannot be used. This identifier is the Object ID of the app registration, not of the service principal.
120
+
You can get the objectID of the service principal from Azure AD Enterprise Applications. The Object ID in Azure AD App registrations can’t be used. This identifier is the Object ID of the app registration, not of the service principal.
81
121
82
122
1. Browse to the **Azure portal** > **Azure Active Directory** > **Enterprise Applications**, find the application you registered.
83
123
1. From the **Overview** tab, copy the **Object ID** of the application. This identifier is the unique to the service principal, used by Conditional Access policy to find the calling app.
84
124
85
125
### Microsoft Graph
86
126
87
-
Sample JSON for configuration using the Microsoft Graph beta endpoint.
127
+
Sample JSON for location-based configuration using the Microsoft Graph beta endpoint.
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/howto-export-risk-data.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,12 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: identity-protection
8
8
ms.topic: how-to
9
-
ms.date: 07/30/2021
9
+
ms.date: 02/18/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
13
13
manager: karenhoran
14
-
ms.reviewer: sahandle
14
+
ms.reviewer: sahandle, etbasser
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
@@ -26,18 +26,20 @@ Azure AD stores reports and security signals for a defined period of time. When
26
26
| Azure AD MFA usage | 30 days | 30 days | 30 days |
27
27
| Risky sign-ins | 7 days | 30 days | 30 days |
28
28
29
-
Organizations can choose to store data for longer periods by changing diagnostic settings in Azure AD to send **RiskyUsers**and **UserRiskEvents** data to a Log Analytics workspace, archive data to a storage account, stream data to an Event Hub, or send data to a partner solution. Find these options in the **Azure portal** > **Azure Active Directory**, **Diagnostic settings** > **Edit setting**. If you don't have a diagnostic setting, follow the instructions in the article [Create diagnostic settings to send platform logs and metrics to different destinations](../../azure-monitor/essentials/diagnostic-settings.md) to create one.
29
+
Organizations can choose to store data for longer periods by changing diagnostic settings in Azure AD to send **RiskyUsers**, **UserRiskEvents**, **RiskyServicePrincipals**, and **ServicePrincipalRiskEvents** data to a Log Analytics workspace, archive data to a storage account, stream data to an event hub, or send data to a partner solution. Find these options in the **Azure portal** > **Azure Active Directory**, **Diagnostic settings** > **Edit setting**. If you don't have a diagnostic setting, follow the instructions in the article [Create diagnostic settings to send platform logs and metrics to different destinations](../../azure-monitor/essentials/diagnostic-settings.md) to create one.
30
30
31
31
[](./media/howto-export-risk-data/change-diagnostic-setting-in-portal.png#lightbox)
32
32
33
33
## Log Analytics
34
34
35
35
Log Analytics allows organizations to query data using built in queries or custom created Kusto queries, for more information, see [Get started with log queries in Azure Monitor](../../azure-monitor/logs/get-started-queries.md).
36
36
37
-
Once enabled you will find access to Log Analytics in the **Azure portal** > **Azure AD** > **Log Analytics**. The tables of most interest to Identity Protection administrators are **AADRiskyUsers** and **AADUserRiskEvents**.
37
+
Once enabled you'll find access to Log Analytics in the **Azure portal** > **Azure AD** > **Log Analytics**. The following tables are of most interest to Identity Protection administrators:
38
38
39
39
- AADRiskyUsers - Provides data like the **Risky users** report in Identity Protection.
40
40
- AADUserRiskEvents - Provides data like the **Risk detections** report in Identity Protection.
41
+
- RiskyServicePrincipals - Provides data like the **Risky workload identities** report in Identity Protection.
42
+
- ServicePrincipalRiskEvents - Provides data like the **Workload identity detections** report in Identity Protection.
41
43
42
44
[](./media/howto-export-risk-data/log-analytics-view-query-user-risk-events.png#lightbox)
0 commit comments