Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The Microsoft Entra Suite provides capabilities to govern who can access restricted websites. Microsoft Entra Internet Access protects access to SaaS apps and entitlement management enables organizations to manage identity and access lifecycle at scale, by automating access request workflows, access assignments, reviews, and expiration.
In this scenario, you set up Global Secure Access and Conditional Access to block access to a specific unauthorized website such as an unsanctioned AI app, while using entitlement management to provide governed access to users who should be exempt from the policy. This scenario is useful for generative AI applications and other web applications that don't support provisioning or federation with Microsoft Entra.
Prerequisites
To complete this scenario, you must have the following prerequisites in your Microsoft Entra tenant:
- Microsoft Entra Suite, or Microsoft Entra ID Governance along with Microsoft Global Secure Access
- Required roles: Conditional Access Administrator, Identity Governance Administrator, and Global Secure Access Administrator
- A Microsoft Entra ID joined device where the Global Secure Access client can be installed.
Step 1: Set up Global Secure Access
If Global Secure Access isn't already configured, you need to set this up first. Visit Get started with Global Secure Access for a step-by-step guide. The four steps include:
Enable the Internet Access profile and Microsoft traffic forwarding profile.
Install and configure the Global Secure Access Client on end-user devices.
Step 2: Create a Global Secure Access web content filtering policy
In this step, you create a Global Secure Access web content filtering policy to block access to a specific website. See How to configure Global Secure Access web content filtering.
Identify the internet domain that you want to restrict access to and define the process for how users who are blocked should get access. In the following guide, we use a security group to provide users with access.
Go to Global Secure Access > Secure > Web content filtering policies and select Create policy.
Choose a name for the policy and select Block as the Action.
Under the Policy Rules tab, select “Add rule.” Choose a name, select “fqdn” for Destination type, and enter the destination you would like to block. Select add.
Review and create the policy.
Step 3: Create a Global Secure Access security profile and link the filtering policy
Go to Global Secure Access > Secure > Security profiles and select Create profile.
Choose a profile name, leave “enabled” for State, and select a Priority.
Under the Link policies tab, choose “Link a policy” and select the web content filtering policy.
Step 4: Create a security group for exempted users
Go to Groups and select New group.
Choose Group type Security, enter a group name, and leave membership as Assigned.
Create the group.
Step 5: Configure a Conditional Access Policy
Once Global Secure Access is set up, you need to create a Conditional Access policy to restrict access to a specific website.
Browse to Protection > Conditional Access > Policies and select New policy.
Choose a name for the policy.
Under Users, select the Include tab and choose All users. Select the Exclude tab, choose Users and groups, and select the group that you created in Step 4 that is used as an exception group to the policy.
Under Target resources, select All internet resources with Global Secure Access.
Under Session select Use Global Secure Access security profile, and select the name of the security profile that you created in Step 3.
Under Enable policy select On, or leave in Report-only mode for testing.
Save the policy.
Step 6: Create an entitlement management access package to provide governed access to the restricted resource
The last step in the scenario is to create an access package that contains the security group that you specified in Step 4. Users assigned to this access package are assigned to this group, and are exempt from the web content filtering policies that you established.
Like other access packages, you create a policy with rules specifying who can request the package, who must approve, and its lifecycle. Learn more at Create an access package in entitlement management.
Step 7: Test the scenario
Once you complete the previous steps, you're ready to test the scenario.
On the Microsoft Entra ID joined device, attempt to visit the site you restricted in Step 2. You should receive a blocking experience for all browsers with a plaintext browser error for HTTP traffic and a "Connection Reset" browser error for HTTPS traffic.
In entitlement management, assign the access package you created in Step 5 to the user who is signed in on the Microsoft Entra ID joined device. This assigns the user to the access package which provides access to the security group you created in Step 4. Any required approvals need to be completed before the assignment is completed.
On the Microsoft Entra ID joined device, attempt to visit the site you restricted in Step 2. You should now be able to access the site.
Note
It can take up to 60 minutes for the Global Secure Access Policy to take effect.