Azure Conditional Access can't Include or Exclude users - azure-active-directory

Basically my problem can be seen on this picture :
azure conditional access error
When I go to Conditional Access > Assignments, I have red crosses both on Include and Exclude users or groups. My account has Global Administrator role assigned and the tenant has O365 E1 plus EMS E5 licenses. What must I do to enable the option to Include or Exclude users and groups in the Conditional Access policies?

Conditional Access is not supported with O365 E1 license, this feature requires Azure AD Premium P1 license.
Azure AD Premium P1 license is included as part of Enterprise Mobility and Security (EM+S) E3 and Microsoft 365 E3.
Azure AD Premium P2 license is included as part of Enterprise Mobility and Security (EM+S) E5 and Microsoft 365 E5. So, even if you have EMS E5 license you may face difficulty in creating conditional access policy.
Otherwise, you should have Microsoft 365 Business Premium license which includes a subset of Azure AD Premium P1 that supports Conditional Access.
I have Microsoft 365 Business Premium license and I tested in my environment where I am able to include or exclude users successfully.
So, for the workaround, make use of Microsoft 365 Business Premium license and try.
Note: While creating Conditional Access policies, Microsoft recommends to
exclude the Global Administrator group from your Conditional
Access policies to save yourself from losing access(lockout) to Azure.
Please find below links if they are helpful.
References:
What is Conditional Access in Azure Active Directory? | Microsoft Docs
Conditional Access for Office 365 (enowsoftware.com)
How to Set Up Conditional Access in Office 365? – TheITBros
Update:
As you mentioned in the comment, removing Conditional access permissions will take a while to reflect. Make sure you have Security Administrator role while doing all these. Good to know that it's working now. Thanks for the update.

Related

Not able to access any tabs in AAD

I'm not able to access any tabs in AAD. What could be the issue?
Please check if below points can be worked around in your case.
Buttions or options being greyed out maybe because , you may not have had global admin rights/user administrator rights on the azure AD tenant. There are a few roles which can create users within the directory. You may not have any roles within the directory which permit the operations.
Reference: github issue.
Even in Azure AD free edition ,one should be able to create the users if you have proper roles .
On completion of the first 30 days of Microsoft Azure’s free trial,
your ‘Free Trial’ Azure Subscription will be disabled. To fix this,
the subscription needs to be changed to the ‘Pay-As-You-Go’ plan
instead of the ‘Free Trial’ plan which it is currently on.
For example :For applications under Enterprise application, one of the following roles: Global Administrator, Cloud Application
Administrator, Application Administrator, or owner of the service
principal.
You can check Azure AD built-in roles, and by checking the
description of role , assign the required one to manage identity .
You can Assign Azure AD roles to users to manage the identities
if you have global or role administrator rights. Approach the
admin to assign the roles .Also see custom roles in Azure AD
if needed.
Please check if this issue in - Microsoft Q&A can relate .
If issue still remains you can raise a support request in troubleshoot+support blade.

I am looking for the name of Teams's license which will be required to get token from teams

[This question is particularly in continuation of this answer. Can anyone throw some more light on this Team's integration with name of license and Active Directory settings ] 'Unauthorized' error when requesting '/joinedTeams' from Microsoft Graph
I assume you are just referring to the Teams product license that you assign to users to give them permission to use Teams. The license is just called "Microsoft Teams" and can be applied at the user or group level in the Microsoft 365 admin center, or in bulk via Powershell.
You can assign the license by either the Licenses page or the Active Users page.
By default, when a licensing plan (for example, Microsoft 365 Enterprise E3 or Microsoft 365 Business Premium) is assigned to a user, a Teams license is automatically assigned, and the user is enabled for Teams. You can disable or enable Teams for a user by removing or assigning a license at any time.
You can also add add-on licenses for specific features.

Dynamics 365 Human Resource integration with Azure Active Directory

I am working on Dynamics 365 Human Resource implementation. Organization is using Office 365/Azure AD for internal user accounts. The requirement is to connect Azure AD with D365 HR in a way that whenever a new user is created in Active Directory the same user should also be created in D365 HR Users list. This should be done automatically. The objective here is to avoid manual user creation in D365 Apps.
Initially, I thought about achieving this with MS Flow with below approach:
Using Azure AD connector get list of Users in certain Group.
Using CDS connector get list of all Users in Dynamics.
Create new User(s) in CDS/Dynamics HR.
I have the basic understanding that D365 HR uses CDS to store all data but I can't seem to find D365 HR specific Users entity. Hence this approach fails.
So, my question is how to achieve such automatic integration?
I am open to custom development options but can't manage to think of a viable solution. Please share ideas! Thanks.
Azure AD is Microsoft's cloud-based identity and access management service. It is intended for app developers and Microsoft 365, Azure, or Dynamics 365 subscribers. So, each Dynamics 365 tenant is automatically an Azure AD tenant.
Kindly go through the documentation and check whether if it helps .
HR users and security aren't stored in the CDS today. There are ISV products that support the creation of a D365 HR user account (and automatic assignment of D365 security roles by policy) if you're interested in going this route:
http://www.elevate-hr.com/solutions/#_active-directory-integration
https://appsource.microsoft.com/en-us/product/dynamics-365-for-finance-and-operations/elevate-hr.active-directory-integration?tab=Overview

How to secure Azure Active Directory Service Principal?

Is there a way to detect and monitor that a service principal is only being used from a specific set of IP addresses? I do not want to IP restrict my entire directory. I have premium AAD and I think it has features that I might be able to utilized but I cannot do much testing. I’m currently struggling on how to detect if a SP has been jeopardized and how to prevent it.
If you want to use IP as conditions for the user to sign-in, you could use Conditional Access to make it. But the Conditional Access is used for the entire tenant.
And the features of Azure Active Directory Premium includes:
Company branding
Group-based application access
Self-service password reset
Self-service group management
Advanced security reports and alerts
Multi-Factor Authentication
Forefront Identity Manager (FIM)
Enterprise SLA of 99.9%
For the details, please read here.

Is it possible to do Role-Group based Authorization without Azure Active directory Premium

When RBAC was introduced in Azure Active directory, roles can be granted to users or collection of users (groups).We followed this blog post and added that functionality for our apps when it first got introduced. But now, we have to go for active directory premium to assign roles to groups and get roles in bearer token.Going with Azure Active directory is not a feasible solution for us as premium is gonna cost us $6 user/ month and we have lot of groups and each group has lot of users. Looking at the costs our IT team is not willing to go for this package. I was just wondering if there an alternative approach for mapping roles to groups. Or this is only doable using premium.
Using Azure Active Directory (Azure AD) with an Azure AD Premium or Azure AD Basic license, you can use groups to assign access to a SaaS application that's integrated with Azure AD( refer here about detail).
So if you want to manage the roles using the group, we need at least the Azure AD Basic license. If you were using the free edition, we can only assign the roles to the users one by one.
Instead using the role manage the access for the application, we can also use the group which also supports for the Azure AD free edition. You can check the code sample about authorization in a web app using Azure AD groups & group claims from here.

Resources