Skip to content

Commit 1f7dbcc

Browse files
committed
TRv2 updates for GA
1 parent d48efc7 commit 1f7dbcc

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/active-directory/external-identities/tenant-restrictions-v2.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: how-to
8-
ms.date: 08/17/2023
8+
ms.date: 09/08/2023
99

1010
ms.author: mimart
1111
author: msmimart
@@ -47,7 +47,7 @@ While [tenant restrictions v1](../manage-apps/tenant-restrictions.md) provide au
4747
In your organization's [cross-tenant access settings](cross-tenant-access-overview.md), you can configure a tenant restrictions v2 policy. After you create the policy, there are three ways to apply the policy in your organization.
4848

4949
- **Universal tenant restrictions v2**. This option provides both authentication plane and data plane protection without a corporate proxy. [Universal tenant restrictions](https://learn.microsoft.com/en-us/azure/global-secure-access/how-to-universal-tenant-restrictions) use Global Secure Access (preview) to tag all traffic no matter the operating system, browser, or device form factor. It allows support for both client and remote network connectivity.
50-
- **Authentication plane tenant restrictions v2**. You can deploy a corporate proxy in your organization and [configure the proxy to set tenant restrictions v2 signals](#option-2-set-up-tenant-restrictions-v2-on-your-corporate-proxy) on all traffic to Microsoft Entra and Microsoft Account (MSA).
50+
- **Authentication plane tenant restrictions v2**. You can deploy a corporate proxy in your organization and [configure the proxy to set tenant restrictions v2 signals](#option-2-set-up-tenant-restrictions-v2-on-your-corporate-proxy) on all traffic to Microsoft Entra and Microsoft Accounts (MSA).
5151
- **Windows tenant restrictions v2**. For your corporate-owned Windows devices, you can enforce both authentication plane and data plane protection by enforcing tenant restrictions directly on devices. Tenant restrictions are enforced upon resource access, providing data path coverage and protection against token infiltration. A corporate proxy isn't required for policy enforcement. Devices can be Azure AD managed or domain-joined devices that are managed via Group Policy.
5252

5353
> [!NOTE]
@@ -70,7 +70,7 @@ Tenant restrictions v2 can be scoped to specific users, groups, organizations, o
7070
- Anonymous blocking to consumer OneDrive account. Customers can work around at proxy level by blocking https://onedrive.live.com/.
7171
- When a user accesses a third-party app, like Slack, using an anonymous link or non-Azure AD account.
7272
- When a user copies an Azure AD-issued token from a home machine to a work machine and uses it to access a third-party app like Slack.
73-
- Per-user tenant restrictions for Microsoft Account (MSA).
73+
- Per-user tenant restrictions for Microsoft Accounts.
7474

7575

7676
### Compare Tenant restrictions v1 and v2
@@ -81,9 +81,9 @@ The following table compares the features in each version.
8181
|----------------------|---------|---------|
8282
|**Policy enforcement** | The corporate proxy enforces the tenant restriction policy in the Azure AD control plane. | Options: <br></br>- Universal tenant restrictions in Global Secure Access (preview), which uses policy signaling to tag all traffic, providing both authentication and data plane support on all platforms. <br></br>- Authentication plane-only protection, where the corporate proxy sets tenant restrictions v2 signals on all traffic. <br></br>- Windows device management, where devices are configured to point Microsoft traffic to the tenant restriction policy, and the policy is enforced in the cloud. |
8383
|**Malicious tenant requests** | Azure AD blocks malicious tenant authentication requests to provide authentication plane protection. | Azure AD blocks malicious tenant authentication requests to provide authentication plane protection. |
84-
|**Granularity** | Limited. | Tenant, user, group, and application granularity. (Microsoft Account doesn't support user-level granularity.) |
84+
|**Granularity** | Limited. | Tenant, user, group, and application granularity. (User-level granularity isn't supported with Microsoft Accounts.) |
8585
|**Anonymous access** | Anonymous access to Teams meetings and file sharing is allowed. | Anonymous access to Teams meetings is blocked. Access to anonymously shared resources (“Anyone with the link”) is blocked. |
86-
|**Microsoft accounts (MSA)** |Uses a Restrict-MSA header to block access to consumer accounts. | Allows control of Microsoft account (MSA and Live ID) authentication on both the identity and data planes.<br></br>For example, if you enforce tenant restrictions by default, you can create a Microsoft accounts-specific policy that allows users to access specific apps with their Microsoft accounts, for example: <br> Microsoft Learn (app ID `18fbca16-2224-45f6-85b0-f7bf2b39b3f3`), or <br> Microsoft Enterprise Skills Initiative (app ID `195e7f27-02f9-4045-9a91-cd2fa1c2af2f`). |
86+
|**Microsoft Accounts** |Uses a Restrict-MSA header to block access to consumer accounts. | Allows control of Microsoft Accounts (MSA and Live ID) authentication on both the identity and data planes.<br></br>For example, if you enforce tenant restrictions by default, you can create a Microsoft Accounts-specific policy that allows users to access specific apps with their Microsoft Accounts, for example: <br> Microsoft Learn (app ID `18fbca16-2224-45f6-85b0-f7bf2b39b3f3`), or <br> Microsoft Enterprise Skills Initiative (app ID `195e7f27-02f9-4045-9a91-cd2fa1c2af2f`). |
8787
|**Proxy management** | Manage corporate proxies by adding tenants to the Azure AD traffic allowlist. | For corporate proxy authentication plane protection, configure the proxy to set tenant restrictions v2 signals on all traffic. |
8888
|**Platform support** |Supported on all platforms. Provides only authentication plane protection. | Universal tenant restrictions in Global Secure Access (preview) supports any operating system, browser, or device form factor.<br></br>Corporate proxy authentication plane protection supports macOS, Chrome browser, and .NET applications.<br></br>Windows device management supports Windows operating systems and Microsoft Edge. |
8989
|**Portal support** |No user interface in the Azure portal for configuring the policy. | User interface available in the Azure portal for setting up the cloud policy. |
@@ -231,7 +231,7 @@ Settings for tenant restrictions v2 are located in the Azure portal under **Cros
231231

232232
### Step 2: Configure tenant restrictions v2 for specific partners
233233

234-
Suppose you use tenant restrictions to block access by default, but you want to allow users to access certain applications using their own external accounts. For example, say you want users to be able to access Microsoft Learn with their own Microsoft accounts (MSAs). The instructions in this section describe how to add organization-specific settings that take precedence over the default settings.
234+
Suppose you use tenant restrictions to block access by default, but you want to allow users to access certain applications using their own external accounts. For example, say you want users to be able to access Microsoft Learn with their own Microsoft Accounts. The instructions in this section describe how to add organization-specific settings that take precedence over the default settings.
235235

236236
#### Example: Configure tenant restrictions v2 to allow Microsoft Accounts
237237

@@ -408,7 +408,7 @@ To test the tenant restrictions v2 policy on a device, follow these steps.
408408

409409
1. Select **OK**.
410410

411-
### Block Chrome, Firefox and .NET applications like PowerShell
411+
#### Block Chrome, Firefox and .NET applications like PowerShell
412412

413413
You can use the Windows Firewall feature to block unprotected apps from accessing Microsoft resources via Chrome, Firefox, and .NET applications like PowerShell. The applications that would be blocked/allowed as per the tenant restrictions v2 policy.
414414

0 commit comments

Comments
 (0)