You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/tenant-restrictions-v2.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: active-directory
5
5
ms.service: active-directory
6
6
ms.subservice: B2B
7
7
ms.topic: how-to
8
-
ms.date: 08/17/2023
8
+
ms.date: 09/08/2023
9
9
10
10
ms.author: mimart
11
11
author: msmimart
@@ -47,7 +47,7 @@ While [tenant restrictions v1](../manage-apps/tenant-restrictions.md) provide au
47
47
In your organization's [cross-tenant access settings](cross-tenant-access-overview.md), you can configure a tenant restrictions v2 policy. After you create the policy, there are three ways to apply the policy in your organization.
48
48
49
49
-**Universal tenant restrictions v2**. This option provides both authentication plane and data plane protection without a corporate proxy. [Universal tenant restrictions](https://learn.microsoft.com/en-us/azure/global-secure-access/how-to-universal-tenant-restrictions) use Global Secure Access (preview) to tag all traffic no matter the operating system, browser, or device form factor. It allows support for both client and remote network connectivity.
50
-
-**Authentication plane tenant restrictions v2**. You can deploy a corporate proxy in your organization and [configure the proxy to set tenant restrictions v2 signals](#option-2-set-up-tenant-restrictions-v2-on-your-corporate-proxy) on all traffic to Microsoft Entra and Microsoft Account (MSA).
50
+
-**Authentication plane tenant restrictions v2**. You can deploy a corporate proxy in your organization and [configure the proxy to set tenant restrictions v2 signals](#option-2-set-up-tenant-restrictions-v2-on-your-corporate-proxy) on all traffic to Microsoft Entra and Microsoft Accounts (MSA).
51
51
-**Windows tenant restrictions v2**. For your corporate-owned Windows devices, you can enforce both authentication plane and data plane protection by enforcing tenant restrictions directly on devices. Tenant restrictions are enforced upon resource access, providing data path coverage and protection against token infiltration. A corporate proxy isn't required for policy enforcement. Devices can be Azure AD managed or domain-joined devices that are managed via Group Policy.
52
52
53
53
> [!NOTE]
@@ -70,7 +70,7 @@ Tenant restrictions v2 can be scoped to specific users, groups, organizations, o
70
70
- Anonymous blocking to consumer OneDrive account. Customers can work around at proxy level by blocking https://onedrive.live.com/.
71
71
- When a user accesses a third-party app, like Slack, using an anonymous link or non-Azure AD account.
72
72
- When a user copies an Azure AD-issued token from a home machine to a work machine and uses it to access a third-party app like Slack.
73
-
- Per-user tenant restrictions for Microsoft Account (MSA).
73
+
- Per-user tenant restrictions for Microsoft Accounts.
74
74
75
75
76
76
### Compare Tenant restrictions v1 and v2
@@ -81,9 +81,9 @@ The following table compares the features in each version.
81
81
|----------------------|---------|---------|
82
82
|**Policy enforcement**| The corporate proxy enforces the tenant restriction policy in the Azure AD control plane. | Options: <br></br>- Universal tenant restrictions in Global Secure Access (preview), which uses policy signaling to tag all traffic, providing both authentication and data plane support on all platforms. <br></br>- Authentication plane-only protection, where the corporate proxy sets tenant restrictions v2 signals on all traffic. <br></br>- Windows device management, where devices are configured to point Microsoft traffic to the tenant restriction policy, and the policy is enforced in the cloud. |
83
83
|**Malicious tenant requests**| Azure AD blocks malicious tenant authentication requests to provide authentication plane protection. | Azure AD blocks malicious tenant authentication requests to provide authentication plane protection. |
84
-
|**Granularity**| Limited. | Tenant, user, group, and application granularity. (Microsoft Account doesn't support user-level granularity.) |
84
+
|**Granularity**| Limited. | Tenant, user, group, and application granularity. (User-level granularity isn't supported with Microsoft Accounts.) |
85
85
|**Anonymous access**| Anonymous access to Teams meetings and file sharing is allowed. | Anonymous access to Teams meetings is blocked. Access to anonymously shared resources (“Anyone with the link”) is blocked. |
86
-
|**Microsoft accounts (MSA)**|Uses a Restrict-MSA header to block access to consumer accounts. | Allows control of Microsoft account (MSA and Live ID) authentication on both the identity and data planes.<br></br>For example, if you enforce tenant restrictions by default, you can create a Microsoft accounts-specific policy that allows users to access specific apps with their Microsoft accounts, for example: <br> Microsoft Learn (app ID `18fbca16-2224-45f6-85b0-f7bf2b39b3f3`), or <br> Microsoft Enterprise Skills Initiative (app ID `195e7f27-02f9-4045-9a91-cd2fa1c2af2f`). |
86
+
|**Microsoft Accounts**|Uses a Restrict-MSA header to block access to consumer accounts. | Allows control of Microsoft Accounts (MSA and Live ID) authentication on both the identity and data planes.<br></br>For example, if you enforce tenant restrictions by default, you can create a Microsoft Accounts-specific policy that allows users to access specific apps with their Microsoft Accounts, for example: <br> Microsoft Learn (app ID `18fbca16-2224-45f6-85b0-f7bf2b39b3f3`), or <br> Microsoft Enterprise Skills Initiative (app ID `195e7f27-02f9-4045-9a91-cd2fa1c2af2f`). |
87
87
|**Proxy management**| Manage corporate proxies by adding tenants to the Azure AD traffic allowlist. | For corporate proxy authentication plane protection, configure the proxy to set tenant restrictions v2 signals on all traffic. |
88
88
|**Platform support**|Supported on all platforms. Provides only authentication plane protection. | Universal tenant restrictions in Global Secure Access (preview) supports any operating system, browser, or device form factor.<br></br>Corporate proxy authentication plane protection supports macOS, Chrome browser, and .NET applications.<br></br>Windows device management supports Windows operating systems and Microsoft Edge. |
89
89
|**Portal support**|No user interface in the Azure portal for configuring the policy. | User interface available in the Azure portal for setting up the cloud policy. |
@@ -231,7 +231,7 @@ Settings for tenant restrictions v2 are located in the Azure portal under **Cros
231
231
232
232
### Step 2: Configure tenant restrictions v2 for specific partners
233
233
234
-
Suppose you use tenant restrictions to block access by default, but you want to allow users to access certain applications using their own external accounts. For example, say you want users to be able to access Microsoft Learn with their own Microsoft accounts (MSAs). The instructions in this section describe how to add organization-specific settings that take precedence over the default settings.
234
+
Suppose you use tenant restrictions to block access by default, but you want to allow users to access certain applications using their own external accounts. For example, say you want users to be able to access Microsoft Learn with their own Microsoft Accounts. The instructions in this section describe how to add organization-specific settings that take precedence over the default settings.
235
235
236
236
#### Example: Configure tenant restrictions v2 to allow Microsoft Accounts
237
237
@@ -408,7 +408,7 @@ To test the tenant restrictions v2 policy on a device, follow these steps.
408
408
409
409
1. Select **OK**.
410
410
411
-
### Block Chrome, Firefox and .NET applications like PowerShell
411
+
####Block Chrome, Firefox and .NET applications like PowerShell
412
412
413
413
You can use the Windows Firewall feature to block unprotected apps from accessing Microsoft resources via Chrome, Firefox, and .NET applications like PowerShell. The applications that would be blocked/allowed as per the tenant restrictions v2 policy.
0 commit comments