%3CLINGO-SUB%20id%3D%22lingo-sub-1257374%22%20slang%3D%22en-US%22%3EPublisher%20verification%20and%20app%20consent%20policies%20are%20now%20generally%20available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1257374%22%20slang%3D%22en-US%22%3E%3CP%3EHowdy%20folks%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20usage%20of%20cloud%20apps%20on%20the%20rise%20to%20enable%20remote%20work%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fblogs.microsoft.com%2Fon-the-issues%2F2020%2F07%2F07%2Fdigital-crimes-unit-covid-19-cybercrime%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eattackers%20have%20been%20looking%20to%20leverage%20application-based%20attacks%3C%2FA%3E%2C%20such%20as%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F%3Fp%3D91507%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Econsent%20phishing%3C%2FA%3E%2C%20to%20gain%20unwarranted%20access%20to%20valuable%20data%20in%20cloud%20services.%20To%20protect%20our%20customers%20from%20such%20attacks%20while%20continuing%20to%20foster%20a%20secure%20and%20trustworthy%20app%20ecosystem%20we're%20announcing%20three%20new%20updates%3A%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EGeneral%20availability%20of%20publisher%20verification%3C%2FLI%3E%0A%3CLI%3EUser%20consent%20updates%20for%20unverified%20publishers%3C%2FLI%3E%0A%3CLI%3EGeneral%20availability%20of%20app%20consent%20policies%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH2%20id%3D%22toc-hId--1381251221%22%20id%3D%22toc-hId--1381251221%22%20id%3D%22toc-hId--1381251221%22%3E%3CSPAN%3EGeneral%20availability%20of%20publ%3C%2FSPAN%3E%3CSPAN%3Eisher%20verification%3CBR%20%2F%3E%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3E%3CBR%20%2F%3ELast%20week%20at%20Microsoft%20Ignite%2C%20we%20announced%20that%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fdevelop%2Fpublisher-verification-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%3Ep%3C%2FSPAN%3Eublisher%20%3CSPAN%3Ev%3C%2FSPAN%3Eerification%3C%2FA%3E%20is%20now%20generally%20available.%20This%20capability%20allows%20developers%20to%20add%20a%20verified%20identity%20to%20their%20app%20registrations%20and%20demonstrate%20to%20customers%20that%20the%20app%20comes%20from%20an%20authentic%20source.%20%3CSPAN%3EWe%20announced%3C%2FSPAN%3E%20public%20preview%20at%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fbuild-2020-fostering-a-secure-and-trustworthy-app-ecosystem-for%2Fba-p%2F1257360%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EBuild%20in%20May%3C%2FA%3E%3C%2FSPAN%3E%2C%20and%20over%20%3CSPAN%3E700%3C%2FSPAN%3E%20app%20publishers%20have%20%3CSPAN%3Esince%20%3C%2FSPAN%3Eadded%20a%20verified%20publisher%20to%20over%201300%20app%20registrations.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22DBada_0-1602024378764.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F224688iAFB7D9F29E85C8D4%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22DBada_0-1602024378764.png%22%20alt%3D%22DBada_0-1602024378764.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CBR%20%2F%3EFor%20developers%2C%20%3C%2FSPAN%3E%3CSPAN%3Ep%3C%2FSPAN%3E%3CSPAN%3Eublisher%20%3C%2FSPAN%3E%3CSPAN%3Ev%3C%2FSPAN%3E%3CSPAN%3Eerification%20allows%20them%20to%20distinguish%20their%20apps%3C%2FSPAN%3E%3CSPAN%3E%20to%20customers%20by%20recei%3C%2FSPAN%3E%3CSPAN%3Eving%20%3C%2FSPAN%3E%3CSPAN%3Ea%20%E2%80%9Cverified%E2%80%9D%20badge%20%3C%2FSPAN%3E%3CSPAN%3Ethat%20%3C%2FSPAN%3E%3CSPAN%3Eappears%20on%20the%20Azure%20AD%20consent%20prompt%3C%2FSPAN%3E%3CSPAN%3E.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH2%20style%3D%22font-family%3A%20SegoeUI%2C%20Lato%2C%20'Helvetica%20Neue'%2C%20Helvetica%2C%20Arial%2C%20sans-serif%3B%20color%3A%20%23333333%3B%22%20id%3D%22toc-hId-1106261612%22%20id%3D%22toc-hId-1106261612%22%20id%3D%22toc-hId-1106261612%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22DBada_1-1602024378773.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F224686i5FE90F733623FB20%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22DBada_1-1602024378773.png%22%20alt%3D%22DBada_1-1602024378773.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EAdmins%3C%2FSPAN%3E%20%3CSPAN%3Ecan%20also%20%3C%2FSPAN%3E%3CSPAN%3Eset%20%3C%2FSPAN%3E%3CSPAN%3Euser%20consent%20%3C%2FSPAN%3E%3CSPAN%3Epoli%3C%2FSPAN%3E%3CSPAN%3Ecies%20%3C%2FSPAN%3E%3CSPAN%3Ebased%20on%20if%20an%20app%3C%2FSPAN%3E%3CSPAN%3Es%3C%2FSPAN%3E%3CSPAN%3E%20is%20publisher%20verified%20helping%20streamline%20adoption.%20%3C%2FSPAN%3EDevelopers%20who%20are%20building%20for%20Microsoft%20365%20that%20want%20to%20further%20distinguish%20their%20apps%20can%20also%20participate%20in%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmicrosoft-365-app-certification%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20365%20App%20Certification%3C%2FA%3E%20program.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--701192851%22%20id%3D%22toc-hId--701192851%22%20id%3D%22toc-hId--701192851%22%3E%3CSPAN%3EUser%20consent%20updates%20for%20unverified%20publishers%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3E%3CBR%20%2F%3EWith%20%3CSPAN%3Ep%3C%2FSPAN%3Eublisher%20%3CSPAN%3Ev%3C%2FSPAN%3Eerification%20now%20generally%20available%2C%20we%20will%20be%20making%20changes%20that%20%3CSPAN%3Ehelp%20protect%20users%20from%20%3C%2FSPAN%3E%3CSPAN%3Eapp-based%20attacks.%20%3C%2FSPAN%3E%3CSTRONG%3EEnd%20users%20will%20no%20longer%20be%20able%20to%20consent%20to%20new%20multi-tenant%20apps%20registered%20after%20November%208%3CSUP%3Eth%3C%2FSUP%3E%2C%202020%20coming%20from%20unverified%20publishers%3CU%3E%3C%2FU%3E.%3C%2FSTRONG%3E%20These%20apps%20may%20be%20flagged%20as%20risky%20and%20will%20be%20shown%20as%20unverified%20on%20the%20consent%20screen.%20Apps%20requesting%20basic%20sign-in%20and%20permissions%20to%20read%20user%20profile%20will%20not%20be%20affected%2C%20nor%20will%3CSPAN%3E%20a%3C%2FSPAN%3Epps%20requesting%20consent%20in%20their%20own%20tenants.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ET%3C%2FSPAN%3Eo%20prepare%20for%20this%20change%20if%20you%20are%20an%20app%20developer%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fdevelop%2Fmark-app-as-publisher-verified%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eadd%20a%20verified%20publisher%3C%2FA%3E%20to%20all%20your%20multi-tenant%20app%20registrations.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1786319982%22%20id%3D%22toc-hId-1786319982%22%20id%3D%22toc-hId-1786319982%22%3E%3CSPAN%3EGeneral%20availability%20of%20app%20consent%20policies%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ETo%20help%20admins%20control%20what%20apps%20their%20users%20can%20consent%20to%2C%20we%E2%80%99re%20announcing%20general%20availability%20of%3C%2FSPAN%3E%26nbsp%3Bthe%20new%26nbsp%3B%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fmanage-apps%2Fconfigure-user-consent%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eapp%20policies%20for%20end%20user%20consent%3C%2FA%3E%3C%2FSPAN%3E%3CSPAN%3E.%20%3C%2FSPAN%3E%3CSPAN%3EWith%20%3C%2FSPAN%3Eapp%20%3CSPAN%3Econsent%20policies%3C%2FSPAN%3E%3CSPAN%3E%2C%20admins%20%3C%2FSPAN%3E%3CSPAN%3Ehave%20more%20controls%20over%20%3C%2FSPAN%3E%3CSPAN%3Ethe%20apps%20and%20permissions%20to%20which%20users%20can%20consent%3C%2FSPAN%3E.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ECustomers%20can%20%3C%2FSPAN%3E%3CSPAN%3Emanage%20%3C%2FSPAN%3Esettings%20for%3CSPAN%3E%20user%20consent%20%3C%2FSPAN%3E%3CSPAN%3Eby%20choosing%20%3C%2FSPAN%3E%3CSPAN%3Efrom%20the%20following%20%3C%2FSPAN%3E%3CSPAN%3Ebuilt-in%20%3C%2FSPAN%3Eapp%20%3CSPAN%3Econsent%20policies%3C%2FSPAN%3E%3CSPAN%3E%20in%20the%20screenshot%20below%3C%2FSPAN%3E%3CSPAN%3E%3A%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22appconsent3.png%22%20style%3D%22width%3A%20622px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F224693i452AB25E419BAE8B%2Fimage-dimensions%2F622x212%3Fv%3D1.0%22%20width%3D%22622%22%20height%3D%22212%22%20title%3D%22appconsent3.png%22%20alt%3D%22appconsent3.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ECustomers%20can%20also%20use%20Azure%20AD%20PowerShell%20or%20Microsoft%20Graph%20to%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fconsent.policies-create-powershell%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ecreate%20custom%20consent%20policies%3C%2FA%3E%26nbsp%3Bfor%20even%20more%20control.%20These%20policies%20can%20include%20conditions%20that%20apply%20to%20the%20app%2C%20the%20publisher%2C%20or%20the%20permissions%26nbsp%3Bthe%20app%20is%20requesting.%20Additionally%2C%20custom%20directory%20roles%20now%20support%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fconsent-policies-custom-role%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Epermission%20to%20grant%20consent%3C%2FA%3E%2C%20limited%20by%20app%20consent%20policies.%20This%20can%20enable%20scenarios%20such%20as%20delegating%20the%20ability%20to%20consent%20only%20for%20some%20permissions%2C%20and%20creating%20least-privileged%20automation%20to%20manage%20authorization%20for%20apps.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWe%20recommend%20that%20customer%20set%20their%20policy%20to%20allow%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fmanage-apps%2Fconfigure-user-consent%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Euser%20consent%20for%20apps%3C%2FA%3E%26nbsp%3Bfrom%20verified%20publishers%20and%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3Eto%3C%2FSPAN%3E%20configure%3CSPAN%3E%20the%20%3C%2FSPAN%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fmanage-apps%2Fconfigure-admin-consent-workflow%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eadmin%20consent%20workflow%3C%2FA%3E%3C%2FSPAN%3E%20%3CSPAN%3Eto%20streamline%20%3C%2FSPAN%3E%3CSPAN%3Eaccess%20for%20end%20user%3C%2FSPAN%3E%3CSPAN%3Es%3C%2FSPAN%3E%20who%20are%20not%20allowed%20to%20consent%3CSPAN%3E.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20always%2C%20we'd%20love%20to%20hear%20any%20feedback%20or%20suggestions%20you%20may%20have.%20Please%20let%20us%20know%20what%20you%20think%20in%20the%20comments%20below.%20For%20additional%20best%20practices%20to%20protect%20your%20organization%20from%20app-based%20attacks%2C%20be%20sure%20to%20check%20out%20the%20resources%20below%3A%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fmanage-apps%2Fmanage-consent-requests%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EManage%20consent%20to%20applications%20and%20evaluate%20consent%20requests%3C%2FA%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F%3Fp%3D91507%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EProtecting%20your%20remote%20workforce%20from%20application-based%20attacks%20like%20consent%20phishing%3C%2FA%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fdetect-and-remediate-illicit-consent-grants%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EDetect%20and%20Remediate%20Illicit%20Consent%20Grants%20in%20Office%20365%3C%2FA%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Ffundamentals%2Fsteps-secure-identity%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EFive%20steps%20to%20securing%20your%20identity%20infrastructure%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EBest%20regards%2C%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EAlex%20Simons%20(Twitter%3A%E2%80%AF%3CA%20href%3D%22http%3A%2F%2Ftwitter.com%2Falex_a_simons%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%40Alex_A_Simons%3C%2FA%3E)%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ECorporate%20Vice%20President%20of%20Program%20Management%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EMicrosoft%20Identity%20Division%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1257374%22%20slang%3D%22en-US%22%3E%3CP%3ELearn%20about%20additional%20steps%20we're%20taking%20to%20increase%20security%20and%20transparency%20in%20our%20app%20ecosystem.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1257374%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EProduct%20Announcements%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1757497%22%20slang%3D%22en-US%22%3ERe%3A%20Publisher%20verification%20and%20app%20consent%20policies%20are%20now%20generally%20available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1757497%22%20slang%3D%22en-US%22%3E%3CP%3EHello%3C%2FP%3E%3CP%3EAwesome%20features%2C%20would%20be%20great%20to%20have%20kind%20of%20the%20same%20for%20guest%20users%2C%20i%20know%20there%20is%20the%20role%20of%20guest%20inviters%20role%20but%20coupled%20with%20guest%20inviting%20policies%20like%20domain%20or%20pre-approved%20list%20or%20already%20existing%20in%20other%20internal%20systems%20that%20we%20can%20request%20with%20an%20API%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAwesome%20work!%3C%2FP%3E%3CP%3ECongrats%20to%20the%20team!%3C%2FP%3E%3C%2FLINGO-BODY%3E

Howdy folks,

 

With usage of cloud apps on the rise to enable remote work, attackers have been looking to leverage application-based attacks, such as consent phishing, to gain unwarranted access to valuable data in cloud services. To protect our customers from such attacks while continuing to foster a secure and trustworthy app ecosystem we're announcing three new updates: 

 

  • General availability of publisher verification
  • User consent updates for unverified publishers
  • General availability of app consent policies

General availability of publisher verification


Last week at Microsoft Ignite, we announced that publisher verification is now generally available. This capability allows developers to add a verified identity to their app registrations and demonstrate to customers that the app comes from an authentic source. We announced public preview at Build in May, and over 700 app publishers have since added a verified publisher to over 1300 app registrations.

 

DBada_0-1602024378764.png


For developers,
publisher verification allows them to distinguish their apps to customers by receiving a “verified” badge that appears on the Azure AD consent prompt.

DBada_1-1602024378773.png

 

Admins can also set user consent policies based on if an apps is publisher verified helping streamline adoption. Developers who are building for Microsoft 365 that want to further distinguish their apps can also participate in the Microsoft 365 App Certification program.

User consent updates for unverified publishers


With publisher verification now generally available, we will be making changes that help protect users from app-based attacks. End users will no longer be able to consent to new multi-tenant apps registered after November 8th, 2020 coming from unverified publishers. These apps may be flagged as risky and will be shown as unverified on the consent screen. Apps requesting basic sign-in and permissions to read user profile will not be affected, nor will apps requesting consent in their own tenants.

To prepare for this change if you are an app developer, add a verified publisher to all your multi-tenant app registrations.

General availability of app consent policies

 

To help admins control what apps their users can consent to, we’re announcing general availability of the new app policies for end user consent. With app consent policies, admins have more controls over the apps and permissions to which users can consent.

Customers can manage settings for user consent by choosing from the following built-in app consent policies in the screenshot below:

 

appconsent3.png

 

Customers can also use Azure AD PowerShell or Microsoft Graph to create custom consent policies for even more control. These policies can include conditions that apply to the app, the publisher, or the permissions the app is requesting. Additionally, custom directory roles now support the permission to grant consent, limited by app consent policies. This can enable scenarios such as delegating the ability to consent only for some permissions, and creating least-privileged automation to manage authorization for apps. 

 

We recommend that customer set their policy to allow user consent for apps from verified publishers and to configure the admin consent workflow to streamline access for end users who are not allowed to consent.

 

As always, we'd love to hear any feedback or suggestions you may have. Please let us know what you think in the comments below. For additional best practices to protect your organization from app-based attacks, be sure to check out the resources below: 

 

 

Best regards,

Alex Simons (Twitter: @Alex_A_Simons)

Corporate Vice President of Program Management

Microsoft Identity Division

 

1 Comment
New Contributor

Hello

Awesome features, would be great to have kind of the same for guest users, i know there is the role of guest inviters role but coupled with guest inviting policies like domain or pre-approved list or already existing in other internal systems that we can request with an API

 

Awesome work!

Congrats to the team!