Upgrade your tenant restrictions to v2 (2024)

In a previous blog in the Data Exfiltration series, we discussed different types of tenant restrictions policy. In this blog, we’ll discuss migrating from tenant restrictions v1 to authentication plane tenant restrictions v2. In future blogs, we’ll discuss migrating to Universal tenant restrictions v2.

Tenant restrictions are a vital tool to help prevent data exfiltration from unauthorized access to external Microsoft Entra ID tenants and consumer Microsoft accounts. Tenant restrictions v1 lets you create an allow list of tenant IDs and Microsoft sign-in endpoints to ensure that users access external tenants that your organization authorizes. While tenant restrictions v1 served well for many years, tenant restrictions v2 offers more granularity and easier policy management with no additional licensing requirements.

Tenant restrictions v2 has several benefits over tenant restrictions v1. For example, admins can:

  • Update the policy from the Microsoft Entra portal rather than from each network proxy. There’s no need to update the header.
  • Increase the size limitations of your maximum proxy header length. There’s no limit to the number of partners you can add with tenant restrictions v2.
  • Selectively indicate which user groups access which apps in external tenants rather than allowing entire tenants for all identities.

In this blog post, I’ll explain the differences between how the two tenant restriction types work independently from, and in tandem with, cross-tenant access settings (outbound) to highlight the benefits of upgrading to tenant restrictions v2.

Getting started with tenant restrictions

Tenant restrictions require routing all user authentication traffic through a proxy. Typically, the proxy is the on-premises network egress, but it can also be a cloud-based proxy. The proxy injects a header indicating that an allow list of destinations is enforced on the traffic, regardless of the originating device or network location. In tenant restrictions v1, the destination allow list is in the header. In tenant restrictions v2, the header has a tenant ID and policy ID. Traffic arrives at Microsoft Entra ID, which reads the header and enforces the policy. If the traffic destination isn’t in the allow list, the user receives an error message.

Upgrade your tenant restrictions to v2 (1)Figure 1: Example of a user getting blocked by tenant restrictions

How tenant restrictions v1 works

There are two types of identities: internal and external. Your organization creates and manages internal identities with your identity provider (IdP) but doesn’t manage external identities such as personal accounts or those created by an external organization. Tenant restrictions v1 applies to both account types.

In the following diagrams, two types of identities (green is internal and black is external) are on the corporate network or connected with a virtual private network (VPN). Both identity types go through the corporate network egress proxy when attempting to access Microsoft 365 services. Typically, both receive the same header injection of allowed destinations. This enforcement has some limitations. If you maintain the allow list in the network proxies, administrators update the header at each proxy when you add or remove a tenant. It’s also important to note that the headers have size limitations.

Upgrade your tenant restrictions to v2 (2)Figure 2: Tenant restrictions v1 applies to external tenant destinations equally with no user or app granularity

You can improve tenant restrictions v1 by adding cross-tenant access settings.

Tenant restrictions v1 with outbound cross-tenant access settings

In Microsoft Entra ID, you can configure the cross-tenant access settings feature to control outbound access on a per-user, per-group, and per-application basis. This policy applies to your internal identities, regardless of device or network location.

In the following diagram, the users go through the egress proxy. Cross-tenant access settings and tenant restrictions are applied. However, the tenant restrictions v1 allow list is the only policy that applies to external identities. This option improves internal user management, but the architecture has limitations.

Both tenant restriction v1 and cross-tenant access settings are evaluated, and the most restrictive policy is applied. However, cross-tenant access settings only apply to internal identities. If you allow access to an external tenant for your users, even with group or application restrictions, you enable all external identities to access any resource in those tenants.

Upgrade your tenant restrictions to v2 (3)Figure 3: Cross-tenant access settings adds user and app granularity for internal identities

Tenant restriction v2 with cross-tenant access settings

Tenant restriction v2 works in tandem with cross-tenant access settings. Tenant restriction v2 is a cloud-based policy that applies to external identities. Internal users’ access is controlled by cross-tenant access settings. This separation allows per-user and per-application granularity for internal and external identity scenarios.

In the following example, the organization puts group and application restrictions on their internal identities. However, they can block other external identities from accessing external tenants unless they create exceptions. In this case, an exception is made for Bob from Tenant C. He is allowed access to only Microsoft Exchange so he can check email while on the corporate network.

Upgrade your tenant restrictions to v2 (4)Figure 4: Tenant restrictions v2 adds granular user and app awareness to external identities

The previous diagram demonstrates the flexibility that tenant restrictions v2 offers. Because tenant restrictions v1 and v2 have the same licensing requirements, the one-time migration involves recreating policies and updating the header injection at your network proxies.

You can learn more in the tenant restrictions v2 migration deployment plan.

To further enhance tenant restrictions, learn about Universal tenant restrictions. This feature adds data layer protection and prevents token infiltration that can bypass your corporate network proxy’s tenant restrictions header injection. The feature injects the headers and has a low latency connection to Microsoft 365 resources without needing to hairpin traffic through your corpnet proxies.

Jeff Bley

Senior Product Manager, Microsoft

LinkedIn

Learn more about Microsoft Entra:

  • Related Articles:
    • Learn more at Configure Tenant Restrictions v2
  • See recent Microsoft Entra blogs
  • Dive into Microsoft Entra technical documentation
  • Learn more at Azure Active Directory (Azure AD) rename to Microsoft Entra ID
  • Join the conversation on the Microsoft Entra discussion space
  • Learn more about Microsoft Security
Upgrade your tenant restrictions to v2 (2024)
Top Articles
Menards vs Home Depot: Which is a Better Choice? - UpDweller
Rcm Loader Stuck On Blue Light
Use Copilot in Microsoft Teams meetings
Bank Of America Financial Center Irvington Photos
Tryst Utah
Avonlea Havanese
Atvs For Sale By Owner Craigslist
Palace Pizza Joplin
Paketshops | PAKET.net
Joe Gorga Zodiac Sign
Derpixon Kemono
litter - tłumaczenie słowa – słownik angielsko-polski Ling.pl
Helloid Worthington Login
R/Afkarena
2016 Ford Fusion Belt Diagram
My.tcctrack
Patrick Bateman Notebook
Nissan Rogue Tire Size
Blackwolf Run Pro Shop
Walmart stores in 6 states no longer provide single-use bags at checkout: Which states are next?
Nz Herald Obituary Notices
Craigslist Lewes Delaware
[PDF] NAVY RESERVE PERSONNEL MANUAL - Free Download PDF
2487872771
Fleet Farm Brainerd Mn Hours
Effingham Daily News Police Report
Downtown Dispensary Promo Code
TJ Maxx‘s Top 12 Competitors: An Expert Analysis - Marketing Scoop
A Plus Nails Stewartville Mn
What Is The Lineup For Nascar Race Today
Lil Durk's Brother DThang Killed in Harvey, Illinois, ME Confirms
Sitting Human Silhouette Demonologist
Amici Pizza Los Alamitos
Weekly Math Review Q4 3
Chris Provost Daughter Addie
Ewwwww Gif
KITCHENAID Tilt-Head Stand Mixer Set 4.8L (Blue) + Balmuda The Pot (White) 5KSM175PSEIC | 31.33% Off | Central Online
888-333-4026
Craigslist Lakeside Az
Panorama Charter Portal
Lovely Nails Prices (2024) – Salon Rates
Lacy Soto Mechanic
Torrid Rn Number Lookup
Lamont Mortuary Globe Az
Haunted Mansion (2023) | Rotten Tomatoes
How To Get To Ultra Space Pixelmon
Santa Ana Immigration Court Webex
Marion City Wide Garage Sale 2023
Duffield Regional Jail Mugshots 2023
Haunted Mansion Showtimes Near The Grand 14 - Ambassador
Gainswave Review Forum
Latest Posts
Article information

Author: Tuan Roob DDS

Last Updated:

Views: 5960

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Tuan Roob DDS

Birthday: 1999-11-20

Address: Suite 592 642 Pfannerstill Island, South Keila, LA 74970-3076

Phone: +9617721773649

Job: Marketing Producer

Hobby: Skydiving, Flag Football, Knitting, Running, Lego building, Hunting, Juggling

Introduction: My name is Tuan Roob DDS, I am a friendly, good, energetic, faithful, fantastic, gentle, enchanting person who loves writing and wants to share my knowledge and understanding with you.