Skip to content

Commit acf47f8

Browse files
authored
Merge pull request #109683 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 91976d8 + c915053 commit acf47f8

28 files changed

+182
-68
lines changed

articles/active-directory/manage-apps/application-sign-in-unexpected-user-consent-error.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,12 @@ Certain conditions must be true for a user to consent to the permissions an appl
3030

3131
## Requesting not authorized permissions error
3232
* **AADSTS90093:** <clientAppDisplayName> is requesting one or more permissions that you are not authorized to grant. Contact an administrator, who can consent to this application on your behalf.
33+
* **AADSTS90094:** <clientAppDisplayName> needs permission to access resources in your organization that only an admin can grant. Please ask an admin to grant permission to this app before you can use it.
3334

3435
This error occurs when a user who is not a company administrator attempts to use an application that is requesting permissions that only an administrator can grant. This error can be resolved by an administrator granting access to the application on behalf of their organization.
3536

37+
This error can also occur when a user is prevented from consenting to an application due to Microsoft detecting that the permissions request is risky. In this case, an audit event will also be logged with a Category of "ApplicationManagement", Activity Type of "Consent to application" and Status Reason of "Risky application detected".
38+
3639
## Policy prevents granting permissions error
3740
* **AADSTS90093:** An administrator of <tenantDisplayName> has set a policy that prevents you from granting <name of app> the permissions it is requesting. Contact an administrator of <tenantDisplayName>, who can grant permissions to this app on your behalf.
3841

articles/active-directory/manage-apps/configure-user-consent.md

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -139,10 +139,54 @@ You can use the Azure AD PowerShell Preview module ([AzureADPreview](https://doc
139139
}
140140
```
141141
142+
## Configure risk-based step-up consent
143+
144+
Risk-based step-up consent helps reduce user exposure to malicious apps making [illicit consent requests](https://docs.microsoft.com/microsoft-365/security/office-365-security/detect-and-remediate-illicit-consent-grants). If Microsoft detects a risky end-user consent request, the request will require a "step-up" to admin consent instead. This capability is enabled by default, but it will only result in a behavior change when end-user consent is enabled.
145+
146+
When a risky consent request is detected, the consent prompt will display a message indicating that admin approval is needed. If the [admin consent request workflow](configure-admin-consent-workflow.md) is enabled, the user can send the request to an admin for further review directly from the consent prompt. If it is not enabled, the following message will be displayed:
147+
148+
* **AADSTS90094:** <clientAppDisplayName> needs permission to access resources in your organization that only an admin can grant. Please ask an admin to grant permission to this app before you can use it.
149+
150+
In this case, an audit event will also be logged with a Category of "ApplicationManagement", Activity Type of "Consent to application" and Status Reason of "Risky application detected".
151+
152+
> [!IMPORTANT]
153+
> Admins should [evaluate all consent requests](manage-consent-requests.md#evaluating-a-request-for-tenant-wide-admin-consent) carefully before approving, especially when Microsoft has detected risk.
154+
155+
### Disable or re-enable risk-based step-up consent using PowerShell
156+
157+
You can use the Azure AD PowerShell Preview module ([AzureADPreview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview)), to disable the step-up to admin consent required in cases where Microsoft detects risk or to re-enable it if it was previously disabled.
158+
159+
This can be done using the same steps as shown above for [configuring group owner consent using PowerShell](#configure-group-owner-consent-using-powershell), but substituting a different settings value. There are three differences in steps:
160+
161+
1. Understand the setting values for risk based step-up consent:
162+
163+
| Setting | Type | Description |
164+
| ------------- | ------------ | ------------ |
165+
| _BlockUserConsentForRiskyApps_ | Boolean | Flag indicating if user consent will be blocked when a risky request is detected. |
166+
167+
2. Substitute the following value in step 3:
168+
169+
```powershell
170+
$riskBasedConsentEnabledValue = $settings.Values | ? { $_.Name -eq "BlockUserConsentForRiskyApps" }
171+
```
172+
3. Substitute one of the following in step 5:
173+
174+
```powershell
175+
# Disable risk-based step-up consent entirely
176+
$riskBasedConsentEnabledValue.Value = "False"
177+
```
178+
179+
```powershell
180+
# Re-enable risk-based step-up consent, if disabled previously
181+
$riskBasedConsentEnabledValue.Value = "True"
182+
```
183+
142184
## Next steps
143185
144186
[Configure the admin consent workflow](configure-admin-consent-workflow.md)
145187
188+
[Learn how to manage consent to applications and evaluate consent requests](manage-consent-requests.md)
189+
146190
[Grant tenant-wide admin consent to an application](grant-admin-consent.md)
147191
148192
[Permissions and consent in the Microsoft identity platform](../develop/active-directory-v2-scopes.md)
3.26 KB
Loading
6.05 KB
Loading
21.3 KB
Loading
8.76 KB
Loading
33.9 KB
Loading
26.8 KB
Loading
25.6 KB
Loading

articles/active-directory/saas-apps/netvision-compas-tutorial.md

Lines changed: 53 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ To get started, you need the following items:
4141
In this tutorial, you configure and test Azure AD SSO in a test environment.
4242

4343
* Netvision Compas supports **SP and IDP** initiated SSO
44-
* Once you configure Netvision Compas you can enforce Session Control, which protects exfiltration and infiltration of your organizations sensitive data in real time. Session Control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
44+
* Once you configure Netvision Compas you can enforce Session Control, which protects exfiltration and infiltration of your organization's sensitive data in real time. Session Control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
4545

4646

4747
## Adding Netvision Compas from the gallery
@@ -66,7 +66,7 @@ To configure and test Azure AD SSO with Netvision Compas, complete the following
6666
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
6767
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
6868
1. **[Configure Netvision Compas SSO](#configure-netvision-compas-sso)** - to configure the single sign-on settings on application side.
69-
1. **[Create Netvision Compas test user](#create-netvision-compas-test-user)** - to have a counterpart of B.Simon in Netvision Compas that is linked to the Azure AD representation of user.
69+
1. **[Configure Netvision Compas test user](#configure-netvision-compas-test-user)** - to have a counterpart of B.Simon in Netvision Compas that is linked to the Azure AD representation of user.
7070
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
7171

7272
## Configure Azure AD SSO
@@ -92,16 +92,14 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9292
In the **Sign-on URL** text box, type a URL using the following pattern:
9393
`https://<TENANT>.compas.cloud/Identity/Auth/AssertionConsumerService`
9494

95-
> [!NOTE]
96-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Netvision Compas Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
95+
> [!NOTE]
96+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Netvision Compas Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9797
98-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
98+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the metadata file and save it on your computer.
9999

100-
![The Certificate download link](common/certificatebase64.png)
100+
![The Certificate download link](common/metadataxml.png)
101101

102-
1. On the **Set up Netvision Compas** section, copy the appropriate URL(s) based on your requirement.
103102

104-
![Copy configuration URLs](common/copy-configuration-urls.png)
105103

106104
### Create an Azure AD test user
107105

@@ -127,26 +125,67 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
127125

128126
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
129127

130-
![The Add User link](common/add-assign-user.png)
128+
![The Add User link](common/add-assign-user.png)
131129

132130
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
133131
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
134132
1. In the **Add Assignment** dialog, click the **Assign** button.
135133

136134
## Configure Netvision Compas SSO
137135

138-
To configure single sign-on on **Netvision Compas** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [Netvision Compas support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
136+
In this section you enable SAML SSO in **Netvision Compas**.
137+
1. Log into **Netvision Compas** using an administrative account and access the administration area.
139138

140-
### Create Netvision Compas test user
139+
![Admin area](media/netvision-compas-tutorial/admin.png)
141140

142-
In this section, you create a user called B.Simon in Netvision Compas. Work with [Netvision Compas support team](mailto:[email protected]) to add the users in the Netvision Compas platform. Users must be created and activated before you use single sign-on.
141+
1. Locate the **System** area and select **Identity Providers**.
142+
143+
![Admin IDPs](media/netvision-compas-tutorial/admin-idps.png)
144+
145+
1. Select the **Add** action to register Azure AD as a new IDP.
146+
147+
![Add IDP](media/netvision-compas-tutorial/idps-add.png)
148+
149+
1. Select **SAML** for the **Provider type**.
150+
1. Enter meaningful values for the **Display name** and **Description** fields.
151+
1. Assign **Netvision Compas** users to the IDP by selecting from the **Available users** list and then selecting the **Add selected** button. Users can also be assigned to the IDP while following the provisioning procedure.
152+
1. For the **Metadata** SAML option click the **Choose File** button and select the metadata file previously saved on your computer.
153+
1. Click **Save**.
154+
155+
![Edit IDP](media/netvision-compas-tutorial/idp-edit.png)
156+
157+
158+
### Configure Netvision Compas test user
159+
160+
In this section, you configure an existing user in **Netvision Compas** to use Azure AD for SSO.
161+
1. Follow the **Netvision Compas** user provisioning procedure, as defined by your company or edit an existing user account.
162+
1. While defining the user's profile, make sure that the user's **Email (Personal)** address matches the Azure AD username: [email protected]. For example, `[email protected]`.
163+
164+
![Edit user](media/netvision-compas-tutorial/user-config.png)
165+
166+
Users must be created and activated before you use single sign-on.
143167

144168
## Test SSO
145169

146-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
170+
In this section, you test your Azure AD single sign-on configuration.
171+
172+
### Using the Access Panel (IDP initiated).
147173

148174
When you click the Netvision Compas tile in the Access Panel, you should be automatically signed in to the Netvision Compas for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
149175

176+
### Directly accessing Netvision Compas (SP initiated).
177+
178+
1. Access the **Netvision Compas** URL. For example, `https://tenant.compas.cloud`.
179+
1. Enter the **Netvision Compas** username and select **Next**.
180+
181+
![Login user](media/netvision-compas-tutorial/login-user.png)
182+
183+
1. **(optional)** If the user is assigned multiple IDPs within **Netvision Compas**, a list of available IDPs is presented. Select the Azure AD IDP configured previously in **Netvision Compas**.
184+
185+
![Login choose](media/netvision-compas-tutorial/login-choose.png)
186+
187+
1. You are redirected to Azure AD to perform the authentication. Once you are successfully authenticated, you should be automatically signed in to **Netvision Compas** for which you set up SSO.
188+
150189
## Additional resources
151190

152191
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
@@ -157,4 +196,4 @@ When you click the Netvision Compas tile in the Access Panel, you should be auto
157196

158197
- [Try Netvision Compas with Azure AD](https://aad.portal.azure.com/)
159198

160-
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
199+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

0 commit comments

Comments
 (0)