You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Automatically onboard Microsoft Entra ID apps
3
+
description: Learn how to automatically onboard Microsoft Entra ID apps to Microsoft Defender for Cloud Apps conditional access app control
4
+
author: Adipkmic
5
+
ms.author: adipavekatz
6
+
manager: raynew
7
+
ms.date: 10/10/2024
8
+
ms.topic: concept-article
9
+
ms.service: defender-for-cloud-apps
10
+
ms.custom: QuickDraft, ai-usage
11
+
ms.reviewer: adipavekatz
12
+
search.appverid: MET150
13
+
---
14
+
15
+
# Automatically onboard Microsoft Entra ID apps to conditional access app control
16
+
17
+
All SaaS applications that exist in the Microsoft Entra ID catalog will be available automatically in the policy app filter. The following image shows the high-level process for configuring and implementing Conditional Access app control:
18
+
19
+
:::image type="content" source="media/caac-app-onboarding/process.png" alt-text="Diagram of the process for configuring and implementing conditional access app control.":::
20
+
21
+
## Prerequisites
22
+
23
+
- Your organization must have the following licenses to use Conditional Access App Control:
24
+
- Microsoft Defender for Cloud Apps
25
+
- Apps must be configured with single sign-on in Microsoft Entra ID
26
+
27
+
Fully performing and testing the procedures in this article requires that you have a session or access policy configured. For more information, see:
28
+
29
+
-[Create Microsoft Defender for Cloud Apps access policies](https://example.com)
30
+
-[Create Microsoft Defender for Cloud Apps session policies](https://example.com)
31
+
32
+
## Supported Apps
33
+
34
+
All SaaS apps listed in the Microsoft Entra ID catalog will be available for filtering within the Microsoft Defender for Cloud Apps session and access policies. Each app chosen in the filter will automatically be onboarded into the system and will be controlled.
35
+
36
+
:::image type="content" source="media/caac-app-onboarding/filter.png" alt-text="Screenshot of the filter showing automatically onboarded apps.":::
37
+
38
+
If an application isn't listed, you have the option to manually onboard it as outlined in the provided instructions.
39
+
40
+
**Note:** Dependency on Microsoft Entra ID Conditional Access policy:
41
+
42
+
All apps listed in the Microsoft Entra ID catalog will be available for filtering within Microsoft Defender for Cloud Apps session and access policies. However, only those applications that are included in Microsoft Entra ID's conditional policy with Microsoft Defender for Cloud Apps permissions will be actively managed within access or session policies.
43
+
44
+
When creating a policy, if the relevant Microsoft Entra ID's conditional policy is missing, an alert will appear, both during the policy creation process and upon saving the policy.
45
+
46
+
**Note:** To ensure that this policy runs as expected, we recommend checking the Microsoft Entra Conditional Access policies created in Microsoft Entra ID. You can see the full Microsoft Entra Conditional Access policies list in a banner on the create policy page.
47
+
48
+
:::image type="content" source="media/caac-app-onboarding/recommendation.png" alt-text="Screenshot of the recommendation shown in the portal.":::
49
+
50
+
## Conditional Access App Control Configuration Page
51
+
52
+
Admins will be able to control app configurations such as:
53
+
54
+
-**Status:** App status - Disable or Enable
55
+
-**Policies:** Does at least one inline policy connect
56
+
-**IDP:** Onboarded app via IDP via Microsoft Entra or Non-MS IDP
57
+
-**Edit app:** Edit app configuration such as adding domains or disabling the app.
58
+
59
+
All apps that automatically onboarded will be set to "enabled" by default. Following the initial sign-in by a user, administrators will have the ability to view the application under **Settings**\>**Connected apps**\>**Conditional Access App Control apps**.
60
+
61
+
62
+
## Common App Misconfigurations
63
+
64
+
-[Second sign-in (also known as 'second sign-in')](troubleshooting-proxy.md#second-sign-in-also-known-as-second-login)
0 commit comments