Menu
Modern Workplace Blog
  • Home
  • About: Kenneth van Surksum
  • Cookie Policy
Modern Workplace Blog
May 22, 2020October 12, 2020

Some welcome additions to the Admin consent workflow in Azure AD

Update October 7 2020: This functionality is now GA, see Publisher verification and app consent policies are now generally available

In February this year, I wrote an article about Admin consent in Azure Active Directory. The article titled: “Did you already modify your Azure AD consent defaults settings? Here is why you should“, explained why giving end-users within your Azure AD the ability to give consent for every Application might not be such a good idea.

While disabling this option for the end-users is recommended by Microsoft, and having a workflow in place to review any requests and approve if found valid is a more secure solution it introduced an administrative burden since each request must be reviewed by one of the defined users in the list of users to review admin consent requests.

In order to address this, Microsoft made some changes to the way the Admin consent workflow is working which allows an Azure AD administrator more control over which requests must be approved and which are allowed automatically.

Note: This post reflects the status of Admin consent as of May 22, 2020. Functionality may change, even right after this post has been published.

Enterprise Applications User Settings

Within the user settings page of the Enterprise Applications the following changes have been made.

There is now an extra configurable option called: “Users can consent to apps accessing company data for the groups they own”. This options allows you to define the following settings:

  • If this option is set to yes, then all users who are owners of a group may consent to allow third-party multi-tenant applications to access the data of the groups they own.
  • If this option is set to no, then no user can consent to those application to access the data of the groups they own.
  • If this option is set to limited, then only the members of the group selected can consent to those applications to access the data of the groups they own. When enabled, you can add selected groups in the User settings blade.
Machine generated alternative text:
Enterprise applications I User settings 
Enterprise app 
—t to apss æirg 
data t her O 
O Ettng: 
Sig 
Audit 
log: 
Admin 
Supp«t 
—t to 
data grups thO' 
apps to 
Admin consent requests (Preview) 
admin —t to apgs 
are to —t to O 
(days) CO 
Office SES Settings 
3ES apps in 
Of-eæ pMal
Enterprise Applications, user settings

Consent and permissions

Under Enterprise Applications another blade has been added, titled: “Consent and permissions”

In this page the following options are available.

Machine generated alternative text:
Dashboard > Consent and permissions I user consent settings (Preview) 
o Consent and permissions I User consent settings (Preview) 
x 
Manage 
@ user consent settings (Preview) 
Permission classifications (Previ.. 
Save X Discard 
When a user grants consent to en application, the user cen sign in end the application may be granted access to the organization's data. 
user consent for applications 
Configure whether users are allowed to consent far applications to access ßur organization's data. 
@ Do not allow user consent 
An administrator will be required for all apps. 
C) Allow user consent for apps from verified publishers, far selected permissions (Recommended) 
All users can consent for permissions classified as "low impact", far apps from verified publishers or apps registered in this 
organization. 
C) Allow user consent for apps 
All users can consent for any app to access the organization's data. 
Group owner consent for apps accessing data 
Configure whether group owners are allowed to consent far applications to access your organization's data in the groups they own 
@ Do not allow group owner consent 
Group owners cannot allow applications to access data in the groups they own. 
C) Allow group owner consent for selected group owners 
Only selected group owners can allow applications to access data in the groups they awn. 
C) Allow group owner consent for all group owners 
All group owners can allow applications to access data in the groups they own.
User consent settings

You can define user consent for applications to either:

  • Do not allow users to consent for apps, this is the default setting and will require an admin to do the consent on behalf of the user
  • Allow user consent for apps from verified publishers, for selected permissions. This is the new recommended option, which I will address later on
  • Allow user consent for all applications, which means that users can give consent to any app who want to access organizational data.

Here you can also define the options group owners have:

  • Do not allow group owner consent, which is the default settings. Where group owners cannot allow applications to access data in the groups they own
  • Allow group owner consent for selected group owners, if selected an extra option appears allowing you to specify the groups in scope
  • Allow group owner consent for all group owners, which allows all group owners to allow applications to access data in the groups they own.

Verified publishers

In the blogpost on the Techcommunity site last Wednesday (May 20, 2020) titled: “Enhanced programs to help Microsoft 365 admins verify third-party apps” Microsoft made some announcements related to the option “Allow user consent for apps from verified publishers, for selected permissions” which I described above.

From the article: “At Build Microsoft introduced a Publisher Verification program that allows developers to add a verified organizational identity to their apps. This helps admins and end users understand the authenticity of applications requesting access to your organizational data.”

Basically this means that developers can have their Microsoft Partner Network (ID) verified and associated with their application, and therefore the publisher can be considered trusted. If verified the publisher receives a blue verified badge on the Azure AD consent prompt and other screens. More information can be found here: “Publisher verification (preview)” and “Mark your app as publisher verified (preview)“

Machine generated alternative text:
Publisher verification (preview) 
Associate a verified Microsoft Partner Center (MAN) account with your application. A verified badge will appear in 
various places, including the application consent screen. Learn morecå 
MPN ID 
Publisher display name 
Add MPN ID to verify publisher 
Not provided
Publisher verification (Empty)
Machine generated alternative text:
Contoso Organizer I Branding 
Integratkn 
CetiSat6 & wets 
Expos. an 
of @ 
statement URL @ 
C Orgarå:e 
Select a 
htt%'/CCnt 
Suwt • 
Neo request 
pub"sher @ 
Publisher verification (preview) 
a Mifv« A apper 
screen. e 
NPN 10 
to app to AD
Publisher verification (Verified)

Permission classifications

When you enable the option “Allow user consent for apps from verified publishers, for selected permissions (Recommended)” you get an extra option to select the permissions to classify as low impact. Which will bring you to the Permission classifications page

Machine generated alternative text:
Dashboard > Consent and permissions I Permission classifications (Preview) 
Consent and permissions I Permission classifications (Preview) 
x 
Manage 
@ user consent settings (Preview) 
Permission classifications (Previ... 
Add permissions 
Classify user consent permissions 
Define delegated permissions to which the users can consent to on behalf of your organization. 
API used 
Permissions 
Description 
Get started by adding the most used permissions. 
The following permissions are the most requested application permissions with law 
risk access. Get started managing consent end permissions for all users by adding 
these delegated permissions with only one click. Learn more 
user.Read - sign in and read user profile 
offline_access - maintain access to data that users have given it access to 
openid - sign users in 
profile - view users basic profile 
Yes, add selected permissions 
No, I'll add permissions
Permission classification (default)

On the permission classifications page you can define which permissions you find acceptable for your organization data. Microsoft provides the most requested application permissions with low-risk access which you can select and add to the list. These permissions are:

  • User.Read – sign in and read user profile
  • offline_access – maintain access to data that users have given it access to
  • openid – sign users in
  • profile – view user’s basic profile
Machine generated alternative text:
Dashboard > Consent and permissions I Permission classifications (Preview) 
Consent and permissions I Permission classifications (Preview) 
x 
Manage 
@ user consent settings (Preview) 
Permission classifications (Previ... 
Add permissions 
Classify user consent permissions 
Define delegated permissions to which the users can consent to on behalf of your organization. 
API used 
Microsoft Graph 
Microsoft Graph 
Microsoft Graph 
Microsoft Graph 
Permissions 
offline access 
openid 
profile 
user.Read 
Description 
Maintain access to date you have given it access to 
Sign users in 
View users' basic profile 
Sign in and read user profile
Permission classification, recommended rights.

Once added, you can also define extra permissions for which you find them to have a low risk and to which users can consent without an Admin review. For example, if you want applications to also view a users’ email address you can simply add that to the list

Machine generated alternative text:
Dashboard > Consent and permissions I Permission classifications (Previa 
Consent and permissions I Permission classifica 
Request API permissions 
< All APIs 
Microsoft Graph 
https://graph.microsoft.com/ Docs 
What type of permissions does your application require? 
Delegated permissions 
Your application needs to access the API as the signed-in user. 
Select permissions 
Type to search 
Permission 
email 
View users' email address C) 
offline access 
Maintain access to date you have given it access to O 
Openid 
Sign users in O 
profile 
View users' basic profile O 
> AccessReview 
> Administrativeunit 
> AgreementAcceptence 
x 
Manage 
@ user consent settings (Preview) 
Permission classifications (Previ... 
Add permissions 
Classify user consent perr 
Define delegated permissior 
API used 
Microsoft Graph 
Microsoft Graph 
Microsoft Graph 
Microsoft Graph 
Microsoft Intune API 
Application permissions 
Your application uns as background service or demon without 
signed-in user. 
expand all 
Admin consent required 
> Agreement 
Add permissions 
Discard
Add View users’ email address rights.
Machine generated alternative text:
Dashboard > Consent and permissions I Permission classifications (Preview) 
Consent and permissions I Permission classifications (Preview) 
x 
Manage 
@ user consent settings (Preview) 
Permission classifications (Previ... 
Add permissions 
Classify user consent permissions 
Define delegated permissions to which the users can consent to on behalf of your organization. 
API used 
Microsoft Graph 
Microsoft Graph 
Microsoft Graph 
Microsoft Graph 
Microsoft Graph 
Permissions 
offline access 
openid 
profile 
user.Read 
email 
Description 
Maintain access to date you have given it access to 
Sign users in 
View users' basic profile 
Sign in and read user profile 
View users' email address
Right being added, and considered low-risk.

Conclusion

With these new options, (which are still in preview) Microsoft addresses the administrative burden which was introduced when administrators disabled the option for users to consent to any application accessing company data.

Whether the new options described in this article will work for your company, mainly depends on whether the application publishers will have their MPN id verified and will be working with low risk access rights within their application.

If this is going to work, this will allow for verified publishers who publish applications requiring low risk access to organization data to have the consent request to be automatically approved. This will  increase the chance of adoption.

For applications which require higher risk access rights, or even access rights beyond the user (for the whole tenant), doing a review on the application will still be necessary.

Tweet
Follow me
Tweet #WPNinjasNL

Continue Reading

← Completed the Microsoft 365 Certified Enterprise Administrator Expert Certification
May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation spreadsheet →

5 thoughts on “Some welcome additions to the Admin consent workflow in Azure AD”

  1. Pingback: Did you already modify your Azure AD consent defaults settings? Here is why you should | Modern Workplace Blog
  2. Pingback: Microsoft Secure Score Series – 09 – Do not allow users to grant consent to unmanaged applications - JanBakker.tech
  3. Balint says:
    June 15, 2020 at 10:45 am

    If the user consent is disabled in the “User settings” tab, but it is enabled under this new tab, which one will take effect? Is the difference in the “verified publisher / registered in same AD” part? That would make sense for the “recommended” setting, that all non-Microsoft apps are blocked in User settings tab, but here some rights are included by verified publishers.
    And if this is correct, then the second question is when selecting the 3rd option in this new tab, will it have any effect when it is explicitly denied in the “User settings” tab? Because these two seem to me like the perfect counterparts, and it is very confusing.

    Reply
    1. Kenneth says:
      June 15, 2020 at 12:44 pm

      Hi Balint,

      Thank you for visiting my blog and leaving a comment.

      To answer your questions:
      1. If you disable user consent in the “User Settings” tab, the setting will be set to “Do not allow user consent” in the User consent settings (Preview) window. I think this will evolve over time to one place where this setting can be made, for now the settings are in sync. Interesting example is that if you set the radiobutton to “Allow user consent for apps from verified publishers, for selected persmissions (Recommended)” in the User consent settings (Preview) windows, I cannot change the setting in the “User settings” tab anymore.. resulting in a “Unable to update user settings. Error detail: Unable to complete due to service connection error. Please try again later.” error. (which makes a little sense)
      2. Since I didn’t find any apps in my tenant yet from a publisher classified as “verified publisher” I’m not really sure. The only thing I could find is the screenshot I used in my article to show how it will look, once application developers get their MPN ID verified. I assume that Microsoft’s own applications will be one of the first to get the verified label
      3. About your last question: “then the second question is when selecting the 3rd option in this new tab, will it have any effect when it is explicitly denied in the “User settings” tab? Because these two seem to me like the perfect counterparts, and it is very confusing.” – Did I already answer that in answer 1?

      Please let me know If I understood and answered your questions – if not I’m more than willing to further explain.

      Regards,
      Kenneth

      Reply
      1. Balint says:
        June 15, 2020 at 2:09 pm

        Thanks Kenneth, you did answer all my questions perfectly!
        Wanted some clarity on this before I start “experimenting”, sec team is very jumpy lately here.
        In one of my accounts the User settings section is grayed out for me, but in the same time, I can access the Consent and permissions tab, let’s see if saving these settings after changing them is possible at all : )

        Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Founding member of:

Recent Posts

  • MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • Navigating New Authentication Methods: SMS for Password Reset, Not for MFA
  • From SPF to DANE: Securing Microsoft 365 Email Communications
  • Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals

Books

System Center 2012 Service Manager Unleashed
Amazon
System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager
Amazon
System Center Configuration Manager Current Branch Unleashed
Amazon
Mastering Windows 7 Deployment
Amazon
System Center 2012 Configuration Manager (SCCM) Unleashed
Amazon

Archives

  • February 2025
  • January 2025
  • September 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • September 2023
  • August 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • May 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • August 2019
  • July 2019
  • November 2016
  • November 2015
  • June 2015
  • May 2015
  • November 2014
  • July 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • November 2013
  • August 2013
  • April 2013
  • March 2013
  • January 2013
  • December 2012
  • November 2012
  • August 2012
  • July 2012
  • June 2012

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • ABM (4)
  • Advanced Threat Protection (4)
  • Announcement (44)
  • Azure (3)
  • AzureAD (73)
  • Certification (2)
  • Cloud App Security (5)
  • Conditional Access (58)
  • Configuration Manager (24)
  • Entra (2)
  • Entra Id (8)
  • Events (14)
  • Exchange Online (9)
  • Identity Protection (5)
  • Intune (27)
  • Licensing (2)
  • Microsoft Defender (1)
  • Microsoft Defender for Endpoint (1)
  • Microsoft Endpoint Manager (35)
  • Mobile Application Management (4)
  • Modern Workplace (74)
  • Office 365 (10)
  • Overview (11)
  • Power Platform (1)
  • PowerShell (2)
  • Presentations (9)
  • Privileged Identity Management (5)
  • Role Based Access Control (2)
  • Security (63)
  • Service Manager (4)
  • Speaking (30)
  • Troubleshooting (4)
  • Uncategorized (11)
  • Windows 10 (15)
  • Windows 11 (5)
  • Windows Update for Business (4)
  • WMUG.nl (16)
  • WPNinjasNL (32)

Tags

#ABM #AzureAD #community #conditionalaccess #ConfigMgr #IAM #Intune #m365 #MEM #MEMCM #microsoft365 #modernworkplace #office365 #security #webinar #wmug_nl ATP authentication strength AzureAD Branding Community Conditional Access ConfigMgr ConfigMgr 2012 Email EXO Identity Intune Licensing M365 MCAS MFA Modern Workplace Office 365 OSD PIM Policy Sets Presentation RBAC roles Security System Center Task Sequence troubleshooting webinar

Recent Comments

  • brc on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • [m365weekly] #186 – M365 Weekly Newsletter on MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Dean Gross on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • nikhil tech on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • Kenneth on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)

This information is provided “AS IS” with no warranties, confers no rights and is not supported by the author.

Copyright © 2021 by Kenneth van Surksum. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

Shorthand: Don’t pass off my work as yours, it’s not nice.

©2025 Modern Workplace Blog | Powered by WordPress and Superb Themes!
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT