Universal tenant restrictions
Universal tenant restrictions enhance the functionality of tenant restriction v2 using Global Secure Access to tag all traffic no matter the operating system, browser, or device form factor. It allows support for both client and remote network connectivity. Administrators no longer have to manage proxy server configurations or complex network configurations.
Universal Tenant Restrictions does this enforcement using Global Secure Access based policy signaling for both the authentication plane (Generally Available) and data plane (Preview). Tenant restrictions v2 enables enterprises to prevent data exfiltration by users using external tenant identities for Microsoft Entra integrated applications like Microsoft Graph, SharePoint Online, and Exchange Online. These technologies work together to prevent data exfiltration universally across all devices and networks.
The following table explains the steps taken at each point in the previous diagram.
Step | Description |
---|---|
1 | Contoso configures a **tenant restrictions v2 ** policy in their cross-tenant access settings to block all external accounts and external apps. Contoso enforces the policy using Global Secure Access universal tenant restrictions. |
2 | A user with a Contoso-managed device tries to access a Microsoft Entra integrated app with an unsanctioned external identity. |
3 | Authentication plane protection: Using Microsoft Entra ID, Contoso's policy blocks unsanctioned external accounts from accessing external tenants. |
4 | Data plane protection: If the user again tries to access an external unsanctioned application by copying an authentication response token they obtained outside of Contoso's network and pasting it into the device, they're blocked. The token mismatch triggers reauthentication and blocks access. For SharePoint Online, any attempt at anonymously accessing resources will be blocked. |
Universal tenant restrictions help to prevent data exfiltration across browsers, devices, and networks in the following ways:
- It enables Microsoft Entra ID, Microsoft Accounts, and Microsoft applications to look up and enforce the associated tenant restrictions v2 policy. This lookup enables consistent policy application.
- Works with all Microsoft Entra integrated third-party apps at the auth plane during sign in.
- Works with Exchange, SharePoint, and Microsoft Graph for data plane protection (Preview)
Prerequisites
- Administrators who interact with Global Secure Access features must have one or more of the following role assignments depending on the tasks they're performing.
- The Global Secure Access Administrator role role to manage the Global Secure Access features.
- The Conditional Access Administrator to create and interact with Conditional Access policies.
- The product requires licensing. For details, see the licensing section of What is Global Secure Access. If needed, you can purchase licenses or get trial licenses.
Known limitations
- Data plane protection capabilities are in preview (authentication plane protection is generally available)
- If you have enabled universal tenant restrictions and you are accessing the Microsoft Entra admin center for one of the allow listed tenants, you may see an "Access denied" error. Add the following feature flag to the Microsoft Entra admin center:
?feature.msaljs=true&exp.msaljsexp=true
- For example, you work for Contoso and you have allow listed Fabrikam as a partner tenant. You may see the error message for the Fabrikam tenant's Microsoft Entra admin center.
- If you received the "access denied" error message for this URL:
https://entra.microsoft.com/
then add the feature flag as follows:https://entra.microsoft.com/?feature.msaljs%253Dtrue%2526exp.msaljsexp%253Dtrue#home
- If you received the "access denied" error message for this URL:
Configure Tenant Restrictions v2 policy
Before an organization can use universal tenant restrictions, they must configure both the default tenant restrictions and tenant restrictions for any specific partners.
For more information to configure these policies, see the article Set up tenant restrictions v2.
Enable tagging for Tenant Restrictions v2
Once you have created the tenant restriction v2 policies, you can utilize Global Secure Access to apply tagging for tenant restrictions v2. An administrator with both the Global Secure Access Administrator and Security Administrator roles must take the following steps to enable enforcement with Global Secure Access.
- Sign in to the Microsoft Entra admin center as a Global Secure Access Administrator.
- Browse to Global Secure Access > Settings > Session Management > Universal Tenant Restrictions.
- Select the toggle to Enable Tenant Restrictions for Entra ID (covering all cloud apps).
Try Universal Tenant Restrictions
Tenant restrictions are not enforced when a user (or a guest user) tries to access resources in the tenant where the policies are configured. Tenant Restrictions v2 policies are processed only when an identity from a different tenant attempts to signs in and/or accesses resources. For example, if you configure a Tenant Restrictions v2 policy in the tenant contoso.com
to block all organizations except fabrikam.com
, the policy will apply according to this table:
User | Type | Tenant | TRv2 policy processed? | Authenticated access allowed? | Anonymous access allowed? |
---|---|---|---|---|---|
alice@contoso.com |
Member | contoso.com | No(same tenant) | Yes | No |
alice@fabrikam.com |
Member | fabrikam.com | Yes | Yes(tenant allowed by policy) | No |
bob@northwinds.com |
Member | northwinds.com | Yes | No(tenant not allowed by policy) | No |
alice@contoso.com |
Member | contoso.com | No(same tenant) | Yes | No |
bob_northwinds.com#EXT#@contoso.com |
Guest | contoso.com | No(guest user) | Yes | No |
Validate the authentication plane protection
- Ensure that Universal Tenant Restrictions signaling is turned off in Global Secure Access settings.
- Use your browser to navigate to
https://myapps.microsoft.com/
and sign in with the identity from a tenant different than yours that isn't allow-listed in a tenant restrictions v2 policy. Note that you may need to use a private browser window and/or log out of your primary account to perform this step.- For example, if your tenant is Contoso, sign in as a Fabrikam user in the Fabrikam tenant.
- The Fabrikam user should be able to access the MyApps portal, since Tenant Restrictions signaling is disabled in Global Secure Access.
- Turn on universal tenant restrictions in the Microsoft Entra admin center -> Global Secure Access -> Session Management -> Universal Tenant Restrictions.
- Sign out from the MyApps portal and restart your browser.
- As an end-user, with the Global Secure Access client running, access
https://myapps.microsoft.com/
using the same identity (Fabrikam user in the Fabrikam tenant).- The Fabrikam user should be blocked from authenticating to MyApps with the error message: Access is blocked, The Contoso IT department has restricted which organizations can be accessed. Contact the Contoso IT department to gain access.
Validate the data plane protection
- Ensure that the Universal Tenant Restrictions signaling is turned off in Global Secure Access settings.
- Use your browser to navigate to
https://yourcompany.sharepoint.com/
and sign in with the identity from a tenant different than yours that isn't allow-listed in a Tenant Restrictions v2 policy. Note that you may need to use a private browser window and/or log out of your primary account to perform this step.- For example, if your tenant is Contoso, sign in as a Fabrikam user in the Fabrikam tenant.
- The Fabrikam user should be able to access SharePoint, since Tenant Restrictions v2 signaling is disabled in Global Secure Access.
- Optionally, in the same browser with SharePoint Online open, open Developer Tools, or press F12 on the keyboard. Start capturing the network logs. You should see HTTP requests returning status
200
as you navigate SharePoint when everything is working as expected. - Ensure the Preserve log option is checked before continuing.
- Keep the browser window open with the logs.
- Turn on Universal Tenant Restrictions in the Microsoft Entra admin center -> Global Secure Access -> Session Management -> Universal Tenant Restrictions.
- As the Fabrikam user, in the browser with SharePoint Online open, within a few minutes, new logs appear. Also, the browser may refresh itself based on the request and responses happening in the back-end. If the browser doesn't automatically refresh after a couple of minutes, refresh the page.
- The Fabrikam user sees that their access is now blocked with the message: Access is blocked, The Contoso IT department has restricted which organizations can be accessed. Contact the Contoso IT department to gain access.
- In the logs, look for a Status of
302
. This row shows universal tenant restrictions being applied to the traffic.- In the same response, check the headers for the following information identifying that universal tenant restrictions were applied:
Restrict-Access-Confirm: 1
x-ms-diagnostics: 2000020;reason="xms_trpid claim was not present but sec-tenant-restriction-access-policy header was in requres";error_category="insufficiant_claims"
- In the same response, check the headers for the following information identifying that universal tenant restrictions were applied: