Menu
Modern Workplace Blog
  • Home
  • About: Kenneth van Surksum
  • Cookie Policy
Modern Workplace Blog
October 12, 2025October 20, 2025

Configuring Conditional Access for Guest Users: Allowing Only Office 365 and Essential Apps

Introduction

Configuring Conditional Access (CA) for guest users can be challenging when you want to strictly limit access to Office 365 and a few essential Microsoft services. Many Entra administrators have encountered scenarios where applying a “block all resources” policy breaks necessary functionality such as managing authentication methods, accepting invitations, or accessing user profile pages. This article explains how to properly configure such policies using the recently visible My Sign-ins app in Conditional Access, along with other required service exclusions.

Table of Contents

  1. Introduction
  2. Background: The “Block All” Conditional Access Approach
  3. Problem Scenario: Authentication Management Fails for Guest Users
  4. The New “My Sign-ins” App Availability
  5. Required Exclusions for Functionality
  6. Modifying Supporting Conditional Access Policies
  7. Summary
  8. References

Background: The “Block All” Conditional Access Approach

When configuring guest access, administrators often rely on a block all cloud resources Conditional Access policy. This approach ensures that guest users cannot access unintended applications or endpoints. However, such a configuration blocks not only user-facing apps but also essential background services and endpoints required for normal operation, including authentication management and sign-in pages.

Previous attempts to selectively allow access using attribute-based filtering in Conditional Access did not yield the expected outcome. While this method could successfully restrict guest users to Office 365 resources, it prevented them from changing authentication methods, for example when a user replaced their mobile device and needed to re-register MFA. The result was an error indicating that “no authentication methods were available.”

The New “My Sign-ins” App Availability

This situation changed when David Nündel highlighted that the My Sign-ins app (AppID: 19db86c3-b2b9-44cc-b339-36da233a3be2) has become selectable in Conditional Access. Microsoft updated its visibility metadata, allowing administrators to include or exclude it directly in CA configurations.

This update provides a long-awaited solution for environments that block all cloud apps but need to preserve user self-service functionality such as MFA management.

Required Exclusions for Functionality

Testing revealed that enabling My Sign-ins alone was not sufficient. Other Conditional Access policies, particularly those requiring MFA for guest access to all cloud apps, continued to block certain dependencies. Microsoft documentation confirms that when an “all cloud apps” policy is configured, exclusions extend beyond the directly selected apps, covering related services such as Graph API and Windows Azure Active Directory.

To maintain a functional self-service experience for guest users while upholding security boundaries, the following applications (including their AppIDs) should be excluded from the Block All Cloud Apps Conditional Access policy:

  • Office 365 (00000003-0000-0ff1-ce00-000000000000)
  • AADReporting (1b912ec3-a9dd-4c4d-a53e-76aa7adb28d7)
  • Azure Credential Configuration (ea890292-c8c8-4433-b5ea-b09d0668e1a6)
  • Microsoft App Access Panel (0000000c-0000-0000-c000-000000000000)
  • Microsoft Approval Management (65d91a3d-ab74-42e6-8a2f-0add61688c74)
  • Microsoft Invitation Acceptance Portal (4660504c-45b3-4674-a709-71951a6b0763)
  • My Apps (2793995e-0a7d-40d7-bd35-6968ba142197)
  • My Profile (8c59ead7-d703-4a27-9e55-c96a0054c8d2)
  • My Sign-ins (19db86c3-b2b9-44cc-b339-36da233a3be2)
  • Windows Azure Active Directory (00000002-0000-0000-c000-000000000000)

If any of these apps are not visible in the CA picker, create their Service Principal manually using Microsoft Graph PowerShell:

New-MgServicePrincipal -BodyParameter @{ AppId = "<AppID>" }

The resulting Conditional Access policy should look similar to the displayed CA policy below:

Only allow access to Office 365 and other necessary apps for Guest users

Modifying Supporting Conditional Access Policies

In addition to the main block policy, the Require MFA for all cloud apps policy must be adjusted to ensure dependent services are accessible. A recent article by Tony Redmond (Office365ITPros, February 2024) explains that Microsoft Rights Management should be excluded to allow users to open protected documents under MFA enforcement.

Exclude Microsoft Rights Management from MFA cloud policy for Guest users

It is also advisable to create a separate Conditional Access policy targeting Windows Azure Active Directory specifically to require MFA, aligning with Microsoft’s documented recommendations for maintaining secure access to Entra ID core services.

Protect Windows Azure Active Directory resource as advised by Microsoft

Summary

With the introduction of the My Sign-ins app as a selectable resource in Conditional Access, administrators can now achieve a configuration where guest users can:

  • Access only Office 365 and other explicitly allowed resources.
  • Manage and re-register authentication methods without helpdesk intervention.
  • Remain protected under strict Conditional Access enforcement.

This configuration requires fine-tuning multiple Conditional Access policies to ensure essential dependencies are not unintentionally blocked.

References

  • Official Microsoft documentation on Conditional Access app exclusions
  • David Nündel on LinkedIn: My Sign-ins app visibility update
  • Tony Redmond: Conditional Access MFA configuration
  • Ru Campbell & Claus Jespersen discussion on guest access configuration

Tweet
Follow me
Tweet #WPNinjasNL

5 thoughts on “Configuring Conditional Access for Guest Users: Allowing Only Office 365 and Essential Apps”

  1. Pingback: Configuring Conditional Access for Guest Users: Allowing Only Office 365 and Essential Apps – blog by Kenneth van Surksum – 365ForAll
  2. Pingback: The My Sign-Ins Portal, Applications, and Conditional Access
  3. Vinc says:
    October 23, 2025 at 2:04 pm

    Doesn’t “Windows Azure Active Directory” exception create a bigger gap opening doors for some attacks?
    It doesn’t look safe to exclude it.

    Reply
    1. Kenneth says:
      October 23, 2025 at 3:58 pm

      Hi Vinc,

      If you come from a situation where you allowed guests full access and only MFA, the Windows Azure Active Directory app was already open. Besides that I defined a add-on policy (per MS recommendation) which enforces MFA again on Windows Azure Active Directory: CAU001A-Windows Azure Active Directory: Grant Require MFA for guests when Browser and Modern Auth Clients-v1.0

      So what Gap do you see? Maybe I missed something, would love to learn

      Reply
  4. Pingback: Beware including “My Sign-ins” in Conditional Access policies – rakhesh.com

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Founding member of:

Recent Posts

  • Bringing Order to Microsoft’s Fast‑Moving Copilot Rollout in Microsoft 365
  • Governing access to app stores in Microsoft 365 apps
  • Configure Browser Policy to Preserve OneDrive and SharePoint Web Performance and Offline Capability needed for upcoming Chromium versions
  • Balancing Control and Convenience: Preventing Edge Password Sync on Unmanaged Devices
  • Conditional Access Baseline October 2025 (v2025-10) Available on GitHub

Books

System Center 2012 Service Manager Unleashed
Amazon
System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager
Amazon
System Center Configuration Manager Current Branch Unleashed
Amazon
Mastering Windows 7 Deployment
Amazon
System Center 2012 Configuration Manager (SCCM) Unleashed
Amazon

Archives

  • October 2025
  • February 2025
  • January 2025
  • September 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • September 2023
  • August 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • May 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • August 2019
  • July 2019
  • November 2016
  • November 2015
  • June 2015
  • May 2015
  • November 2014
  • July 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • November 2013
  • August 2013
  • April 2013
  • March 2013
  • January 2013
  • December 2012
  • November 2012
  • August 2012
  • July 2012
  • June 2012

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • ABM (4)
  • Advanced Threat Protection (4)
  • Announcement (44)
  • Azure (3)
  • AzureAD (73)
  • Certification (2)
  • Cloud App Security (5)
  • Conditional Access (61)
  • Configuration Manager (24)
  • Entra (4)
  • Entra Id (8)
  • Events (14)
  • Exchange Online (10)
  • Identity Protection (5)
  • Intune (30)
  • Licensing (2)
  • Microsoft Defender (1)
  • Microsoft Defender for Endpoint (1)
  • Microsoft Endpoint Manager (35)
  • Mobile Application Management (5)
  • Modern Workplace (76)
  • Office 365 (12)
  • Overview (11)
  • Power Platform (1)
  • PowerShell (2)
  • Presentations (9)
  • Privileged Identity Management (5)
  • Role Based Access Control (2)
  • Security (65)
  • Service Manager (4)
  • Speaking (30)
  • Troubleshooting (4)
  • Uncategorized (11)
  • Windows 10 (15)
  • Windows 11 (5)
  • Windows Update for Business (4)
  • WMUG.nl (16)
  • WPNinjasNL (32)

Tags

#ABM #AzureAD #community #conditionalaccess #ConfigMgr #IAM #Intune #m365 #MEM #MEMCM #microsoft365 #modernworkplace #office365 #security #webinar #wmug_nl ATP authentication strength AzureAD Branding Community Conditional Access ConfigMgr ConfigMgr 2012 Email EXO Identity Intune Licensing M365 MCAS MFA Modern Workplace Office 365 OSD PIM Policy Sets Presentation RBAC roles Security System Center Task Sequence troubleshooting webinar

Recent Comments

  • Beware including “My Sign-ins” in Conditional Access policies – rakhesh.com on Configuring Conditional Access for Guest Users: Allowing Only Office 365 and Essential Apps
  • Bringing Order to Microsoft’s Fast‑Moving Copilot Rollout in Microsoft 365 - Modern Workplace Blog on Governing access to app stores in Microsoft 365 apps
  • Kenneth on Configuring Conditional Access for Guest Users: Allowing Only Office 365 and Essential Apps
  • Vinc on Configuring Conditional Access for Guest Users: Allowing Only Office 365 and Essential Apps
  • Conditional Access Baseline October 2025 (v2025-10) Available on GitHub – by Kenneth van Surksum – 365ForAll on Conditional Access Baseline October 2025 (v2025-10) Available on GitHub

This information is provided “AS IS” with no warranties, confers no rights and is not supported by the author.

Copyright © 2021 by Kenneth van Surksum. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

Shorthand: Don’t pass off my work as yours, it’s not nice.

©2025 Modern Workplace Blog | Powered by WordPress and Superb Themes!
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT