Skip to content

Commit 65151db

Browse files
Merge pull request #235340 from rolyon/rolyon-aadroles-protected-actions-policy-not-satisfied
[Azure AD roles] Protected actions troubleshoot policy not satisfied
2 parents f8fa531 + 41743b6 commit 65151db

File tree

2 files changed

+24
-4
lines changed

2 files changed

+24
-4
lines changed

articles/active-directory/roles/protected-actions-add.md

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: roles
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/10/2022
12+
ms.date: 04/21/2023
1313
---
1414

1515
# Add, test, or remove protected actions in Azure AD (preview)
@@ -45,14 +45,18 @@ Protected actions use a Conditional Access authentication context, so you must c
4545

4646
1. Create a new policy and select your authentication context.
4747

48-
For more information, see [Conditional Access: Cloud apps, actions, and authentication context](../conditional-access/concept-conditional-access-cloud-apps.md).
48+
For more information, see [Conditional Access: Cloud apps, actions, and authentication context](../conditional-access/concept-conditional-access-cloud-apps.md#authentication-context).
4949

5050
:::image type="content" source="media/protected-actions-add/policy-authentication-context.png" alt-text="Screenshot of New policy page to create a new policy with an authentication context." lightbox="media/protected-actions-add/policy-authentication-context.png":::
5151

5252
## Add protected actions
5353

5454
To add protection actions, assign a Conditional Access policy to one or more permissions using a Conditional Access authentication context.
5555

56+
1. Select **Azure Active Directory** > **Protect & secure** > **Conditional Access** > **Policies**.
57+
58+
1. Make sure the state of the Conditional Access policy that you plan to use with your protected action is set to **On** and not **Off** or **Report-only**.
59+
5660
1. Select **Azure Active Directory** > **Roles & admins** > **Protected actions (Preview)**.
5761

5862
:::image type="content" source="media/protected-actions-add/protected-actions-start.png" alt-text="Screenshot of Add protected actions page in Roles and administrators." lightbox="media/protected-actions-add/protected-actions-start.png":::
@@ -173,6 +177,22 @@ The user has previously satisfied policy. For example, the completed multifactor
173177

174178
Check the [Azure AD sign-in events](../conditional-access/troubleshoot-conditional-access.md) to troubleshoot. The sign-in events will include details about the session, including if the user has already completed multifactor authentication. When troubleshooting with the sign-in logs, it's also helpful to check the policy details page, to confirm an authentication context was requested.
175179

180+
### Symptom - Policy is never satisfied
181+
182+
When you attempt to perform the requirements for the Conditional Access policy, the policy is never satisfied and you keep getting requested to reauthenticate.
183+
184+
**Cause**
185+
186+
The Conditional Access policy wasn't created or the policy state is **Off** or **Report-only**.
187+
188+
**Solution**
189+
190+
Create the Conditional Access policy if it doesn't exist or and set the state to **On**.
191+
192+
If you aren't able to access the Conditional Access page because of the protected action and repeated requests to reauthenticate, use the following link to open the Conditional Access page.
193+
194+
- [https://aka.ms/MSALProtectedActions](https://aka.ms/MSALProtectedActions)
195+
176196
### Symptom - No access to add protected actions
177197

178198
When signed in you don't have permissions to add or remove protected actions.

articles/active-directory/roles/protected-actions-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Here's the initial set of permissions:
5757
5858
## How do protected actions compare with Privileged Identity Management role activation?
5959

60-
[Privileged Identity Management role activation](../privileged-identity-management/pim-how-to-change-default-settings.md) can also be assigned Conditional Access policies. This capability allows for policy enforcement only when a user activates a role, providing the most comprehensive protection. Protected actions are enforced only when a user takes an action that requires permissions with Conditional Access policy assigned to it. Protected actions allows for high impact permissions to be protected, independent of a user role. Privileged Identity Management role activation and protected actions can be used together, for the strongest coverage.
60+
[Privileged Identity Management role activation](../privileged-identity-management/pim-how-to-change-default-settings.md) can also be assigned Conditional Access policies. This capability allows for policy enforcement only when a user activates a role, providing the most comprehensive protection. Protected actions are enforced only when a user takes an action that requires permissions with Conditional Access policy assigned to it. Protected actions allow for high impact permissions to be protected, independent of a user role. Privileged Identity Management role activation and protected actions can be used together for stronger coverage.
6161

6262
## Steps to use protected actions
6363

@@ -67,7 +67,7 @@ Here's the initial set of permissions:
6767

6868
1. **Configure Conditional Access policy**
6969

70-
Configure a Conditional Access authentication context and an associated Conditional Access policy. Protected actions use an authentication context, which allows policy enforcement for fine-grain resources in a service, like Azure AD permissions. A good policy to start with is to require passwordless MFA and exclude an emergency account. [Learn more](../conditional-access/concept-conditional-access-cloud-apps.md#authentication-context)
70+
Configure a Conditional Access authentication context and an associated Conditional Access policy. Protected actions use an authentication context, which allows policy enforcement for fine-grain resources in a service, like Azure AD permissions. A good policy to start with is to require passwordless MFA and exclude an emergency account. [Learn more](./protected-actions-add.md#configure-conditional-access-policy)
7171

7272
1. **Add protected actions**
7373

0 commit comments

Comments
 (0)