|
| 1 | +--- |
| 2 | +title: Set up Identity Protection and Conditional Access in Azure AD B2C |
| 3 | +description: Learn how configure Identity Protection and Conditional Access for you Azure AD B2C tenant to view risky sign-in and other risk events and create policies based on risk detections. |
| 4 | + |
| 5 | +services: active-directory |
| 6 | +ms.service: active-directory |
| 7 | +ms.subservice: conditional-access |
| 8 | +ms.topic: overview |
| 9 | +ms.date: 09/01/2020 |
| 10 | + |
| 11 | +ms.author: mimart |
| 12 | +author: msmimart |
| 13 | +manager: celested |
| 14 | + |
| 15 | +ms.collection: M365-identity-device-management |
| 16 | +--- |
| 17 | +# Set up Identity Protection and Conditional Access in Azure AD B2C |
| 18 | + |
| 19 | +[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)] |
| 20 | + |
| 21 | +Identity Protection provides ongoing risk detection for your Azure AD B2C tenant. If your Azure AD B2C tenant pricing tier is Premium P2, you can view detailed Identity Protection risk events in the Azure portal. You can also use [Conditional Access](../active-directory/conditional-access/overview.md) policies based on these risk detections to determine actions and enforce organizational policies. |
| 22 | + |
| 23 | +## Prerequisites |
| 24 | + |
| 25 | +- Your Azure AD B2C tenant must be [linked to an Azure AD subscription](billing.md#link-an-azure-ad-b2c-tenant-to-a-subscription). |
| 26 | +- Azure AD B2C Premium P2 is required to use sign-in and user risk-based Conditional Access. If necessary, [change your Azure AD B2C pricing tier to Premium P2](https://aka.ms/exid-pricing-tier). |
| 27 | +- To manage Identity Protection and Conditional Access in your B2C tenant, you'll need an account that is assigned the Global Administrator role or the Security administrator role. |
| 28 | +- To use these features in your tenant, you first need to switch to the Azure AD B2C Premium P2 pricing tier. |
| 29 | + |
| 30 | +## Set up Identity Protection |
| 31 | + |
| 32 | +Identity Protection is on by default. To be able to view Identity Protection risk events in your Azure AD B2C tenant, simply link your Azure AD B2C tenant to an Azure AD subscription and select the Azure AD B2C Premium P2 pricing tier. You can view detailed risk event reports in the Azure portal. |
| 33 | + |
| 34 | +### Supported Identity Protection risk detections |
| 35 | + |
| 36 | +The following risk detections are currently supported for Azure AD B2C: |
| 37 | + |
| 38 | +|Risk detection type |Description | |
| 39 | +|---------|---------| |
| 40 | +| Atypical travel | Sign in from an atypical location based on the user's recent sign-ins. | |
| 41 | +|Anonymous IP address | Sign in from an anonymous IP address (for example: Tor browser, anonymizer VPNs) | |
| 42 | +|Unfamiliar sign-in properties | Sign in with properties we've not seen recently for the given user. | |
| 43 | +|Malware linked IP address | Sign in from a malware linked IP address | |
| 44 | +|Azure AD threat intelligence | Microsoft's internal and external threat intelligence sources have identified a known attack pattern | |
| 45 | + |
| 46 | +## View risk events for your Azure AD B2C tenant |
| 47 | + |
| 48 | +1. Sign in to the [Azure portal](https://portal.azure.com/). |
| 49 | + |
| 50 | +1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant. |
| 51 | + |
| 52 | +1. In the Azure portal, search for and select **Azure AD B2C**. |
| 53 | + |
| 54 | +1. Under **Security**, select **Risky users (Preview)**. |
| 55 | + |
| 56 | +  |
| 57 | + |
| 58 | +1. Under **Security**, select **Risk detections (Preview)**. |
| 59 | + |
| 60 | +  |
| 61 | + |
| 62 | +## Add a Conditional Access policy |
| 63 | + |
| 64 | +To add a Conditional Access policy based on the Identity Protection risk detections, make sure security defaults are disabled for your Azure AD B2C tenant, and then create Conditional Access policies. |
| 65 | + |
| 66 | +### To disable security defaults |
| 67 | + |
| 68 | +1. Sign in to the [Azure portal](https://portal.azure.com/). |
| 69 | + |
| 70 | +2. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant. |
| 71 | + |
| 72 | +3. In the Azure portal, search for and select **Azure Active Directory**. |
| 73 | + |
| 74 | +4. Select **Properties**, and then select **Manage Security defaults**. |
| 75 | + |
| 76 | +  |
| 77 | + |
| 78 | +5. Under Enable Security defaults, select No. |
| 79 | + |
| 80 | +  |
| 81 | + |
| 82 | +### To create a Conditional Access policy |
| 83 | + |
| 84 | +1. Sign in to the [Azure portal](https://portal.azure.com/). |
| 85 | + |
| 86 | +1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant. |
| 87 | + |
| 88 | +1. In the Azure portal, search for and select **Azure AD B2C**. |
| 89 | + |
| 90 | +1. Under **Security**, select **Conditional Access (Preview)**. The **Conditional Access Policies** page opens. |
| 91 | + |
| 92 | +1. Select **New policy** and follow the Azure AD Conditional Access documentation to create a new policy. The following is an example: |
| 93 | + |
| 94 | + - [Sign-in risk-based Conditional Access: Enable with Conditional Access policy](../active-directory/conditional-access/howto-conditional-access-policy-risk.md#enable-with-conditional-access-policy) |
| 95 | + |
| 96 | + > [!IMPORTANT] |
| 97 | + > When selecting the users you want to apply the policy to, don't select **All users** only, or you could block yourself from signing in. |
| 98 | +
|
| 99 | +## Test the Conditional Access Policy |
| 100 | + |
| 101 | +1. Create a Conditional Access policy as noted above, with the following settings: |
| 102 | + |
| 103 | + - For **Users and groups**, select the test user. Don't select **All users** or you'll block yourself from signing in. |
| 104 | + - For **Cloud apps or actions**, choose **Select apps**, and then choose your relying party application. |
| 105 | + - For Conditions, select **Sign-in risk** and **High**, **Medium**, and **Low** risk levels. |
| 106 | + - For **Grant**, choose **Block access**. |
| 107 | + |
| 108 | +  |
| 109 | + |
| 110 | +1. Enable your test Conditional Access policy by selecting **Create**. |
| 111 | + |
| 112 | +1. Simulate a risky sign-in by using the [Tor browser](https://www.torproject.org/download/). |
| 113 | + |
| 114 | +1. In the jwt.ms decoded token for the attempted sign-in, you should see that the sign-in was blocked: |
| 115 | + |
| 116 | +  |
| 117 | + |
| 118 | +## Review Conditional Access Outcomes in the Audit Report |
| 119 | + |
| 120 | +To review the result of a Conditional Access event: |
| 121 | + |
| 122 | +1. Sign in to the [Azure portal](https://portal.azure.com/). |
| 123 | + |
| 124 | +2. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant. |
| 125 | + |
| 126 | +3. In the Azure portal, search for and select **Azure AD B2C**. |
| 127 | + |
| 128 | +4. Under **Activities**, select **Audit logs**. |
| 129 | + |
| 130 | +5. Filter the audit log by setting **Category** to **B2C** and setting **Activity Resource Type** to **IdentityProtection**. Then select **Apply**. |
| 131 | + |
| 132 | +6. Review audit activity for up to the last 7 days. The following types of activity are included: |
| 133 | + |
| 134 | + - **Evaluate conditional access policies**: This audit log entry indicates that a Conditional Access evaluation was performed during an authentication. |
| 135 | + - **Remediate user**: This entry indicates that the grant or requirements of a Conditional Access policy were met by the end user, and this activity was reported to the risk engine to reduce the risk of (mitigate) the user. |
| 136 | + |
| 137 | +7. Select an **Evaluate conditional access policy** log entry in the list to open the **Activity Details: Audit log** page, which shows the audit log identifiers, along with this information in the **Additional Details** section: |
| 138 | + |
| 139 | + - ConditionalAccessResult: The grant required by the conditional policy evaluation. |
| 140 | + - AppliedPolicies: A list of all the Conditional Access policies where the conditions were met and the policies are ON. |
| 141 | + - ReportingPolicies: A list of the Conditional Access policies that were set to report-only mode and where the conditions were met. |
| 142 | + |
| 143 | +## Next steps |
| 144 | + |
| 145 | +[Add Conditional Access to a user flow](conditional-access-user-flow.md). |
0 commit comments