You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-sign-in-unexpected-user-consent-error.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,9 +30,12 @@ Certain conditions must be true for a user to consent to the permissions an appl
30
30
31
31
## Requesting not authorized permissions error
32
32
***AADSTS90093:**<clientAppDisplayName> is requesting one or more permissions that you are not authorized to grant. Contact an administrator, who can consent to this application on your behalf.
33
+
***AADSTS90094:**<clientAppDisplayName> needs permission to access resources in your organization that only an admin can grant. Please ask an admin to grant permission to this app before you can use it.
33
34
34
35
This error occurs when a user who is not a company administrator attempts to use an application that is requesting permissions that only an administrator can grant. This error can be resolved by an administrator granting access to the application on behalf of their organization.
35
36
37
+
This error can also occur when a user is prevented from consenting to an application due to Microsoft detecting that the permissions request is risky. In this case, an audit event will also be logged with a Category of "ApplicationManagement", Activity Type of "Consent to application" and Status Reason of "Risky application detected".
38
+
36
39
## Policy prevents granting permissions error
37
40
***AADSTS90093:** An administrator of <tenantDisplayName> has set a policy that prevents you from granting <name of app> the permissions it is requesting. Contact an administrator of <tenantDisplayName>, who can grant permissions to this app on your behalf.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/configure-user-consent.md
+44Lines changed: 44 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -139,10 +139,54 @@ You can use the Azure AD PowerShell Preview module ([AzureADPreview](https://doc
139
139
}
140
140
```
141
141
142
+
## Configure risk-based step-up consent
143
+
144
+
Risk-based step-up consent helps reduce user exposure to malicious apps making [illicit consent requests](https://docs.microsoft.com/microsoft-365/security/office-365-security/detect-and-remediate-illicit-consent-grants). If Microsoft detects a risky end-user consent request, the request will require a "step-up" to admin consent instead. This capability is enabled by default, but it will only result in a behavior change when end-user consent is enabled.
145
+
146
+
When a risky consent request is detected, the consent prompt will display a message indicating that admin approval is needed. If the [admin consent request workflow](configure-admin-consent-workflow.md) is enabled, the user can send the request to an admin for further review directly from the consent prompt. If it is not enabled, the following message will be displayed:
147
+
148
+
* **AADSTS90094:** <clientAppDisplayName> needs permission to access resources in your organization that only an admin can grant. Please ask an admin to grant permission to this app before you can use it.
149
+
150
+
In this case, an audit event will also be logged with a Category of "ApplicationManagement", Activity Type of "Consent to application" and Status Reason of "Risky application detected".
151
+
152
+
> [!IMPORTANT]
153
+
> Admins should [evaluate all consent requests](manage-consent-requests.md#evaluating-a-request-for-tenant-wide-admin-consent) carefully before approving, especially when Microsoft has detected risk.
154
+
155
+
### Disable or re-enable risk-based step-up consent using PowerShell
156
+
157
+
You can use the Azure AD PowerShell Preview module ([AzureADPreview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview)), to disable the step-up to admin consent required in cases where Microsoft detects risk or to re-enable it if it was previously disabled.
158
+
159
+
This can be done using the same steps as shown above for [configuring group owner consent using PowerShell](#configure-group-owner-consent-using-powershell), but substituting a different settings value. There are three differences in steps:
160
+
161
+
1. Understand the setting values for risk based step-up consent:
162
+
163
+
| Setting | Type | Description |
164
+
| ------------- | ------------ | ------------ |
165
+
| _BlockUserConsentForRiskyApps_ | Boolean | Flag indicating if user consent will be blocked when a risky request is detected. |
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/netvision-compas-tutorial.md
+53-14Lines changed: 53 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ To get started, you need the following items:
41
41
In this tutorial, you configure and test Azure AD SSO in a test environment.
42
42
43
43
* Netvision Compas supports **SP and IDP** initiated SSO
44
-
* Once you configure Netvision Compas you can enforce Session Control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session Control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
44
+
* Once you configure Netvision Compas you can enforce Session Control, which protects exfiltration and infiltration of your organization's sensitive data in real time. Session Control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
45
45
46
46
47
47
## Adding Netvision Compas from the gallery
@@ -66,7 +66,7 @@ To configure and test Azure AD SSO with Netvision Compas, complete the following
66
66
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
67
67
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
68
68
1.**[Configure Netvision Compas SSO](#configure-netvision-compas-sso)** - to configure the single sign-on settings on application side.
69
-
1.**[Create Netvision Compas test user](#create-netvision-compas-test-user)** - to have a counterpart of B.Simon in Netvision Compas that is linked to the Azure AD representation of user.
69
+
1.**[Configure Netvision Compas test user](#configure-netvision-compas-test-user)** - to have a counterpart of B.Simon in Netvision Compas that is linked to the Azure AD representation of user.
70
70
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
71
71
72
72
## Configure Azure AD SSO
@@ -92,16 +92,14 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
92
92
In the **Sign-on URL** text box, type a URL using the following pattern:
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Netvision Compas Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
95
+
> [!NOTE]
96
+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Netvision Compas Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
97
97
98
-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
98
+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the metadata file and save it on your computer.
@@ -127,26 +125,67 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
127
125
128
126
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
129
127
130
-

128
+

131
129
132
130
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
133
131
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
134
132
1. In the **Add Assignment** dialog, click the **Assign** button.
135
133
136
134
## Configure Netvision Compas SSO
137
135
138
-
To configure single sign-on on **Netvision Compas** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [Netvision Compas support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
136
+
In this section you enable SAML SSO in **Netvision Compas**.
137
+
1. Log into **Netvision Compas** using an administrative account and access the administration area.
In this section, you create a user called B.Simon in Netvision Compas. Work with [Netvision Compas support team](mailto:[email protected]) to add the users in the Netvision Compas platform. Users must be created and activated before you use single sign-on.
141
+
1. Locate the **System** area and select **Identity Providers**.
1. Enter meaningful values for the **Display name** and **Description** fields.
151
+
1. Assign **Netvision Compas** users to the IDP by selecting from the **Available users** list and then selecting the **Add selected** button. Users can also be assigned to the IDP while following the provisioning procedure.
152
+
1. For the **Metadata** SAML option click the **Choose File** button and select the metadata file previously saved on your computer.
In this section, you configure an existing user in **Netvision Compas** to use Azure AD for SSO.
161
+
1. Follow the **Netvision Compas** user provisioning procedure, as defined by your company or edit an existing user account.
162
+
1. While defining the user's profile, make sure that the user's **Email (Personal)** address matches the Azure AD username: [email protected]. For example, `[email protected]`.
Users must be created and activated before you use single sign-on.
143
167
144
168
## Test SSO
145
169
146
-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
170
+
In this section, you test your Azure AD single sign-on configuration.
171
+
172
+
### Using the Access Panel (IDP initiated).
147
173
148
174
When you click the Netvision Compas tile in the Access Panel, you should be automatically signed in to the Netvision Compas for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
1.**(optional)** If the user is assigned multiple IDPs within **Netvision Compas**, a list of available IDPs is presented. Select the Azure AD IDP configured previously in **Netvision Compas**.
1. You are redirected to Azure AD to perform the authentication. Once you are successfully authenticated, you should be automatically signed in to **Netvision Compas** for which you set up SSO.
188
+
150
189
## Additional resources
151
190
152
191
-[ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
@@ -157,4 +196,4 @@ When you click the Netvision Compas tile in the Access Panel, you should be auto
157
196
158
197
-[Try Netvision Compas with Azure AD](https://aad.portal.azure.com/)
159
198
160
-
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
199
+
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
0 commit comments