Popup Window: Stay signed in to all your apps

%3CLINGO-SUB%20id%3D%22lingo-sub-2282584%22%20slang%3D%22en-US%22%3EPopup%20Window%3A%20Stay%20signed%20in%20to%20all%20your%20apps%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2282584%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20post%20is%20maybe%20not%20the%20right%20place%20for%20the%20discussion%2C%20but%20feel%20free%20to%20place%20it%20in%20the%20right%20discussion%20board.%20The%20issue%20came%20to%20light%20when%20using%20Teams%20though.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhen%20using%20Microsoft%20applications%20like%20Teams%2C%20after%20you%20login%20with%20your%20credentials%20the%20window%20%22Stay%20signed%20in%20to%20all%20your%20apps%22%20will%20popup.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22stay.png%22%20style%3D%22width%3A%20519px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F274965i15E013D7EC28B558%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22stay.png%22%20alt%3D%22stay.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20found%20this%20is%20a%20security%20risk%20when%20logging%20in%20from%20a%20public%20windows%2010%20system.%20The%20risk%20is%20that%20when%20the%20user%20doesn't%20pay%20attention%20and%20click%20%22Ok%22%20button%2C%20the%20device%20will%20be%20AAD%20joined.%20After%20this%20you%20will%20be%20able%20to%20logon%20Teams%20without%20a%20password.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20want%20to%20disable%20this%20popup%2C%20to%20prevent%20users%20from%20just%20pressing%20the%20ok%20button.%20Is%20this%20possible%3F%20And%20if%20yes%2C%20is%20this%20only%20possible%20for%20the%20Teams%20app%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOnline%20people%20talk%20about%20conditional%20access%2C%20but%20this%20is%20a%20MEM(Intune)%20feature%20and%20not%20everyone%20have%20the%20license%20to%20do%20that.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHere%20is%20an%20article%20that%20explains%20very%20well%20regarding%20the%20%22Stay%20signed%20in%20to%20all%20your%20apps%22%20popup%20in%20Teams%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.kapilarya.com%2Faccidentally-clicked-allow-my-organization-to-manage-my-device-in-microsoft-teams%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ehttps%3A%2F%2Fwww.kapilarya.com%2Faccidentally-clicked-allow-my-organization-to-manage-my-device-in-microsoft-teams%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20found%20an%20article%20that%20describes%20a%20way%20to%20prevent%20the%20system%20from%20AAD%20joining%20with%20a%20registry%20setting%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fcloudrun.co.uk%2Foffice365%2Fprevent-use-this-account-everywhere-on-your-device-screen-when-installing-office-365-proplus%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ehttps%3A%2F%2Fcloudrun.co.uk%2Foffice365%2Fprevent-use-this-account-everywhere-on-your-device-screen-when-installing-office-365-proplus%2F%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHandy%20when%20you%20want%20to%20prevent%20this%20in%20your%20organisation.%20But%20users%20will%20login%20from%20there%20private%20home%20systems%20and%20maybe%20from%20public%20systems.%20What%20then%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIf%20things%20are%20unclear%2C%20please%20let%20me%20know.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2282584%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EHow-to%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2306484%22%20slang%3D%22en-US%22%3ERe%3A%20Popup%20Window%3A%20Stay%20signed%20in%20to%20all%20your%20apps%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2306484%22%20slang%3D%22en-US%22%3ENobody%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2367144%22%20slang%3D%22en-US%22%3ERe%3A%20Popup%20Window%3A%20Stay%20signed%20in%20to%20all%20your%20apps%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2367144%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1034916%22%20target%3D%22_blank%22%3E%40SekoBayo%3C%2FA%3E%26nbsp%3BHi%20there%20did%20you%20get%20anywhere%20with%20this%3F%20This%20window%20is%20a%20liability.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2368416%22%20slang%3D%22en-US%22%3ERe%3A%20Popup%20Window%3A%20Stay%20signed%20in%20to%20all%20your%20apps%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2368416%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1034916%22%20target%3D%22_blank%22%3E%40SekoBayo%3C%2FA%3E%26nbsp%3BAppreciate%20your%20response.%20Yes%2C%20the%20reg%20key%20is%20of%20no%20value%20on%20users'%20home%20computers.%20You%20can%20block%20enrolment%20of%20personal%20devices%20in%20Endpoint%20Manager%20but%20it%20doesn't%20stop%20this%20message%20and%20the%20user%20still%20gets%20an%20ugly%20error%20message%20that%20they%20don't%20understand.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20don't%20get%20why%20Microsoft%20wants%20personal%20computers%20to%20end%20up%20in%20Endpoint%20Manager.%20I%20still%20feel%20like%20there%20HAS%20to%20be%20a%20tenant%20level%20setting%20somewhere%20for%20blocking%20this%20window.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2369084%22%20slang%3D%22en-US%22%3ERe%3A%20Popup%20Window%3A%20Stay%20signed%20in%20to%20all%20your%20apps%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2369084%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1057586%22%20target%3D%22_blank%22%3E%40bnfcorbett%3C%2FA%3E%26nbsp%3Bgreat%20to%20hear%20that%20I%20am%20not%20the%20only%20one%20that%20is%20thinking%20this%20way.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EYou%20could%20check%20the%20setting%20below%2C%20but%20do%20not%20know%20if%20it%20will%20do%20the%20trick.%20I%20don't%20have%20have%20a%20tenant%20where%20I%20just%20can%20test%20this.%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22device%20settings.png%22%20style%3D%22width%3A%20483px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F281883i24E626FDBADB5421%2Fimage-dimensions%2F483x243%3Fv%3Dv2%22%20width%3D%22483%22%20height%3D%22243%22%20role%3D%22button%22%20title%3D%22device%20settings.png%22%20alt%3D%22device%20settings.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EAlso%20am%20not%20able%20to%20check%20it%20at%20all%20because%20this%20option%20is%20greyed%20on%20my%20customers%20tenant%2C%20cannot%20figure%20out%20why.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EYou%20can%20find%20this%20setting%20under%20Azure%20AD%20%26gt%3B%20Devices%20%26gt%3B%20Device%20settings.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2584888%22%20slang%3D%22en-US%22%3ERe%3A%20Popup%20Window%3A%20Stay%20signed%20in%20to%20all%20your%20apps%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2584888%22%20slang%3D%22en-US%22%3EYou%20say%20it%20Joins%20the%20device%20to%20Azure%20AD%20but%20it%20registers.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2584906%22%20slang%3D%22en-US%22%3ERe%3A%20Popup%20Window%3A%20Stay%20signed%20in%20to%20all%20your%20apps%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2584906%22%20slang%3D%22en-US%22%3EI%20have%20the%20same%20grayed%20out%20issue.%20I%20found%20this%20saying%20how%20to%20get%20it%20enabled%2C%20however%20I%20get%20a%20command%20error%20about%20%22-accoutnenabled%22%20so%20I%20cannot%20do%20it.%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.reddit.com%2Fr%2FAZURE%2Fcomments%2Fnfm05l%2Fusers_may_register_their_devices_with_azuread%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.reddit.com%2Fr%2FAZURE%2Fcomments%2Fnfm05l%2Fusers_may_register_their_devices_with_azuread%2F%3C%2FA%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2585078%22%20slang%3D%22en-US%22%3ERe%3A%20Popup%20Window%3A%20Stay%20signed%20in%20to%20all%20your%20apps%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2585078%22%20slang%3D%22en-US%22%3EYes%2C%20you%20are%20right.%20Thanks%20for%20correcting.%3C%2FLINGO-BODY%3E
Occasional Contributor

Hi,

 

This post is maybe not the right place for the discussion, but feel free to place it in the right discussion board. The issue came to light when using Teams though.

 

When using Microsoft applications like Teams, after you login with your credentials the window "Stay signed in to all your apps" will popup.

 

stay.png

 

I found this is a security risk when logging in from a public windows 10 system. The risk is that when the user doesn't pay attention and click "Ok" button, the device will be AAD joined. After this you will be able to logon Teams without a password.

 

I want to disable this popup, to prevent users from just pressing the ok button. Is this possible? And if yes, is this only possible for the Teams app?

 

Online people talk about conditional access, but this is a MEM(Intune) feature and not everyone have the license to do that.

 

Here is an article that explains very well regarding the "Stay signed in to all your apps" popup in Teams;

https://www.kapilarya.com/accidentally-clicked-allow-my-organization-to-manage-my-device-in-microsof... 

 

I found an article that describes a way to prevent the system from AAD joining with a registry setting;

https://cloudrun.co.uk/office365/prevent-use-this-account-everywhere-on-your-device-screen-when-inst...

 

Handy when you want to prevent this in your organisation. But users will login from there private home systems and maybe from public systems. What then?

 

If things are unclear, please let me know.

20 Replies

@SekoBayo Hi there did you get anywhere with this? This window is a liability.

Hi @bnfcorbett,

 

Not at all. Opened a Microsoft support ticket and have been told it's by design.

Have also been referred to the Registry change what I have mentioned in my initial post, which only make sense if you are in your own organisation environment. And did get a link to raise up my voice; https://microsoftteams.uservoice.com/forums/555103-public/suggestions/40588795-please-stop-allow-my-... 

 

Didn’t do it yet, but now just did.

@SekoBayo Appreciate your response. Yes, the reg key is of no value on users' home computers. You can block enrolment of personal devices in Endpoint Manager but it doesn't stop this message and the user still gets an ugly error message that they don't understand.

 

I don't get why Microsoft wants personal computers to end up in Endpoint Manager. I still feel like there HAS to be a tenant level setting somewhere for blocking this window.

@bnfcorbett great to hear that I am not the only one that is thinking this way.

 

You could check the setting below, but do not know if it will do the trick. I don't have have a tenant where I just can test this.

device settings.png

Also am not able to check it at all because this option is greyed on my customers tenant, cannot figure out why.

 

You can find this setting under Azure AD > Devices > Device settings.

You say it Joins the device to Azure AD but it registers.
I have the same grayed out issue. I found this saying how to get it enabled, however I get a command error about "-accoutnenabled" so I cannot do it.
https://www.reddit.com/r/AZURE/comments/nfm05l/users_may_register_their_devices_with_azuread/
Yes, you are right. Thanks for correcting.
In the past few days I had to learn as much as I could about difference in registering and joining!

Following MS document https://docs.microsoft.com/en-us/azure/active-directory/devices/faq#how-can-i-block-users-from-addin...

Highlights the following FAQ

How can I block users from adding more work accounts (Azure AD registered) on my corporate Windows 10 devices?

And the solution is to create the following registry key

HKLM\SOFTWARE\Policies\Microsoft\Windows\WorkplaceJoin, "BlockAADWorkplaceJoin"=dword:00000001


This key will block your users from adding additional work accounts to your corporate domain joined, Azure AD joined, or hybrid Azure AD joined Windows 10 devices. This policy can also be used to block domain joined machines from inadvertently getting Azure AD registered with the same user account.

After creating this key you will not recevie this pop up anymore.

 

 

Alaa, thank you so much for pointing me towards this documentation.  I've been looking for this so long as this has been a huge pain point for our front line help desk support!  Our users keep clicking "OK" when that box pops up no matter how many times we train them not to. 

This is already known. I already mentioned the registry key in my initial post. See second link where this register key is mentioned.

The goal of this post was to prevent other systems who are not part of an organization or enterprise. For example, home computers, shared computers, or even worse public computers where you don’t have control of as an organization/enterprise.

I still see this “popup” as a potential security risk, because when people login to check their account temporarily on a system which is not their own personal system, then know the potential risks.

I will describe a scenario. User logs in on a friend’s computer system with Teams. User ignores the popup and press ok. User log offs. The owner of that system opens Teams and still see that his friend previous has logged in. When he would click on this account, he would be able to login without any password asked. This is an example of many ways it can occur.

Even though the user reads the popup, it is so unclear what is mentioned there that people would still press ok without understanding it. IT person would understand it, but a normal user often doesn’t.

This popup should not default join your account to the computer. The default should be an extra check box with an option to join and not the other way around.

Hope this helps the understanding of the security risk that exist with this very annoying popup.

By the way. For the people who don’t know how to the delete a joined user account.

 

  1. Click the ‘Start’ button, and then click ‘Settings’.
  2. Click ‘Accounts’.
  3. Click ‘Access work or school’.
  4. Click on the user account and click ‘Disconnect’.

user disconnect.png

 

@bnfcorbett 

Just having the same issue when connecting to AvD using the remote desktop client

Just wanted to say that its not adding the client to the eind point. Its adding the client to Azure Ad devices.

Any how hoorible

SekoBayo
We are having exactly the samen issue when connecting to AvD using the remote desktop client.
The security issue that we see is as follows
1) A user (A) tries to connect to AvD on a PC that is not managed throght Intune.
2) the user (A) logs in AD and chose directly (OK) when getting the pop up.
3) From that moment the user (A) creds are saved on the PC.
4) Lets say another user (B) uses the same PC and browse to (for example) to office.com then are the data of user (A) exposed. That is a big data leak.

Just like you say Microsoft should change this to a default that wil not add the PC to Azure AD and also do not save the users creds op de PC.
(In our case we are using MFA also and that wil work against the data leak sitiuation)

@Wahé Yaghyazaryan 

 

I do not have experience with AvD, but I would think that you can solve this by creating an intune configuration policy to run a powershell script that will add the regarding registry key. I have done this with one of my customers.

 

Of course, to be able to do this, you would need an intune subscription and the device need to join Azure instead of registering. If you don’t have intune, then your only option is to add the registry key manually by hand.

 

Correction on previous posts where I have mentioned that computers will join the device to Azure which is not correct. It will register the device to Azure instead of joining it like @Jacob R  mentioned in a post above.

@Wahé Yaghyazaryan 

 

You wrote "4) Lets say another user (B) uses the same PC and browse to (for example) to office.com then are the data of user (A) exposed. That is a big data leak."

 

You are mentioning here with a web browser. When using Edge it will try to do SSO. But I think Edge will detect that an account is registered and ask if you want to synchronize your account. Here you will get asked in a normal way and get the option to choose ‘Synchronize’ or ‘No, thanks’.

@SekoBayo 

 

Your right. Edge offers to synch.

even if you chose (NO) edge wil sign in with the cached creds. And that is not OK.

Any how it is a NoGo for our AvD project.

 

@SekoBayo I did some checking/testing recently on this between Windows CSP Vs. Registry Fix. I couldn't make Windows CSP - disallow workplace join work using MEM Intune. https://www.anoopcnair.com/disable-stay-signed-in-to-all-your-apps-intune/