Description:

This policy allows users to provide consent for selected permissions when a request is coming from a verified publisher.


Rationale:

If Azure Active Directory is running as an identity provider for third-party applications, permissions and consent should be limited to administrators or pre-approved. Malicious applications may attempt to exfiltrate data or abuse privileged user accounts.


Impact:

Enforcing this setting may create additional requests that administrators need to review.


Audit:

From Azure Portal

1. From Azure Home select the Portal Menu

2. Select Azure Active Directory

3. Select Enterprise Applications

4. Select Consent and permissions

5. Select User consent settings

6. Under User consent for applications, ensure Allow user consent for apps from verified publishers, for selected permissions is selected


From PowerShell

Connect-MsolService
Get-MsolCompanyInformation | Select-Object
UsersPermissionToUserConsentToAppEnabled

Command should return UsersPermissionToUserConsentToAppEnabled with the value of False


Remediation:

From Azure Portal

1. From Azure Home select the Portal Menu

2. Select Azure Active Directory

3. Select Enterprise Applications

4. Select Consent and permissions

5. Select User consent settings

6. Under User consent for applications, select Allow user consent for apps from verified publishers, for selected permissions

7. Select Save


From PowerShell

Connect-MsolService
Set-MsolCompanyInformation --UsersPermissionToUserConsentToAppEnabled $False


Default Value:

By default, User consent for applications is set to Allow user consent for apps.


References:

1. https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/configureuser-consent#configure-user-consent-to-applications

2. https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-privileged-access#pa-1-protect-and-limit-highly-privileged-users

3. https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-privileged-access#pa-2-restrict-administrative-access-to-business-criticalsystems

4. https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-governance-strategy#gs-2-define-enterprise-segmentation-strategy

5. https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-governance-strategy#gs-6-define-identity-and-privileged-access-strategy

6. https://docs.microsoft.com/en-us/powershell/module/msonline/setmsolcompanysettings?view=azureadps-1.0

7. https://docs.microsoft.com/en-us/powershell/module/msonline/getmsolcompanyinformation?view=azureadps-1.0