Skip to content

Commit 68114f6

Browse files
authored
Merge pull request #51327 from jesakowi/patch-2
Updated to include Risk Based Step-up Consent
2 parents 77056a4 + d50559e commit 68114f6

File tree

1 file changed

+44
-0
lines changed

1 file changed

+44
-0
lines changed

articles/active-directory/manage-apps/configure-user-consent.md

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -139,10 +139,54 @@ You can use the Azure AD PowerShell Preview module ([AzureADPreview](https://doc
139139
}
140140
```
141141
142+
## Configure risk-based step-up consent
143+
144+
Risk-based step-up consent helps reduce user exposure to malicious apps making [illicit consent requests](https://docs.microsoft.com/microsoft-365/security/office-365-security/detect-and-remediate-illicit-consent-grants). If Microsoft detects a risky end-user consent request, the request will require a "step-up" to admin consent instead. This capability is enabled by default, but it will only result in a behavior change when end-user consent is enabled.
145+
146+
When a risky consent request is detected, the consent prompt will display a message indicating that admin approval is needed. If the [admin consent request workflow](configure-admin-consent-workflow.md) is enabled, the user can send the request to an admin for further review directly from the consent prompt. If it is not enabled, the following message will be displayed:
147+
148+
* **AADSTS90094:** <clientAppDisplayName> needs permission to access resources in your organization that only an admin can grant. Please ask an admin to grant permission to this app before you can use it.
149+
150+
In this case, an audit event will also be logged with a Category of "ApplicationManagement", Activity Type of "Consent to application" and Status Reason of "Risky application detected".
151+
152+
> [!IMPORTANT]
153+
> Admins should [evaluate all consent requests](manage-consent-requests.md#evaluating-a-request-for-tenant-wide-admin-consent) carefully before approving, especially when Microsoft has detected risk.
154+
155+
### Disable or re-enable risk-based step-up consent using PowerShell
156+
157+
You can use the Azure AD PowerShell Preview module ([AzureADPreview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview)), to disable the step-up to admin consent required in cases where Microsoft detects risk or to re-enable it if it was previously disabled.
158+
159+
This can be done using the same steps as shown above for [configuring group owner consent using PowerShell](#configure-group-owner-consent-using-powershell), but substituting a different settings value. There are three differences in steps:
160+
161+
1. Understand the setting values for risk based step-up consent:
162+
163+
| Setting | Type | Description |
164+
| ------------- | ------------ | ------------ |
165+
| _BlockUserConsentForRiskyApps_ | Boolean | Flag indicating if user consent will be blocked when a risky request is detected. |
166+
167+
2. Substitute the following value in step 3:
168+
169+
```powershell
170+
$riskBasedConsentEnabledValue = $settings.Values | ? { $_.Name -eq "BlockUserConsentForRiskyApps" }
171+
```
172+
3. Substitute one of the following in step 5:
173+
174+
```powershell
175+
# Disable risk-based step-up consent entirely
176+
$riskBasedConsentEnabledValue.Value = "False"
177+
```
178+
179+
```powershell
180+
# Re-enable risk-based step-up consent, if disabled previously
181+
$riskBasedConsentEnabledValue.Value = "True"
182+
```
183+
142184
## Next steps
143185
144186
[Configure the admin consent workflow](configure-admin-consent-workflow.md)
145187
188+
[Learn how to manage consent to applications and evaluate consent requests](manage-consent-requests.md)
189+
146190
[Grant tenant-wide admin consent to an application](grant-admin-consent.md)
147191
148192
[Permissions and consent in the Microsoft identity platform](../develop/active-directory-v2-scopes.md)

0 commit comments

Comments
 (0)