Universal tenant restrictions

Universal tenant restrictions enhance the functionality of tenant restriction v2 using Global Secure Access to tag all traffic no matter the operating system, browser, or device form factor. It allows support for both client and remote network connectivity. Administrators no longer have to manage proxy server configurations or complex network configurations.

Universal Tenant Restrictions does this enforcement using Global Secure Access based policy signaling for both the authentication plane (Generally Available) and data plane (Preview). Tenant restrictions v2 enables enterprises to prevent data exfiltration by users using external tenant identities for Microsoft Entra integrated applications like Microsoft Graph, SharePoint Online, and Exchange Online. These technologies work together to prevent data exfiltration universally across all devices and networks.

Diagram showing how tenant restrictions v2 protects against malicious users.

The following table explains the steps taken at each point in the previous diagram.

Step Description
1 Contoso configures a **tenant restrictions v2 ** policy in their cross-tenant access settings to block all external accounts and external apps. Contoso enforces the policy using Global Secure Access universal tenant restrictions.
2 A user with a Contoso-managed device tries to access a Microsoft Entra integrated app with an unsanctioned external identity.
3 Authentication plane protection: Using Microsoft Entra ID, Contoso's policy blocks unsanctioned external accounts from accessing external tenants.
4 Data plane protection: If the user again tries to access an external unsanctioned application by copying an authentication response token they obtained outside of Contoso's network and pasting it into the device, they're blocked. The token mismatch triggers reauthentication and blocks access. For SharePoint Online, any attempt at anonymously accessing resources will be blocked.

Universal tenant restrictions help to prevent data exfiltration across browsers, devices, and networks in the following ways:

  • It enables Microsoft Entra ID, Microsoft Accounts, and Microsoft applications to look up and enforce the associated tenant restrictions v2 policy. This lookup enables consistent policy application.
  • Works with all Microsoft Entra integrated third-party apps at the auth plane during sign in.
  • Works with Exchange, SharePoint, and Microsoft Graph for data plane protection (Preview)

Prerequisites

Known limitations

  • Data plane protection capabilities are in preview (authentication plane protection is generally available)
  • When you use Universal Tenant Restrictions and access the Microsoft Entra admin center to manage a partner tenant allowed by the Tenant Restrictions v2 policy, you may get authorization errors. To work around this issue, you need to add ?exp.msaljsoptedoutextensions=%7B%7D query parameter to the Microsoft Entra admin center URL (for example, https://entra.microsoft.com/?exp.msaljsoptedoutextensions=%7B%7D).

Configure Tenant Restrictions v2 policy

Before an organization can use universal tenant restrictions, they must configure both the default tenant restrictions and tenant restrictions for any specific partners.

For more information to configure these policies, see the article Set up tenant restrictions v2.

Enable tagging for Tenant Restrictions v2

Once you have created the tenant restriction v2 policies, you can utilize Global Secure Access to apply tagging for tenant restrictions v2. An administrator with both the Global Secure Access Administrator and Security Administrator roles must take the following steps to enable enforcement with Global Secure Access.

  1. Sign in to the Microsoft Entra admin center as a Global Secure Access Administrator.
  2. Browse to Global Secure Access > Settings > Session Management > Universal Tenant Restrictions.
  3. Select the toggle to Enable Tenant Restrictions for Entra ID (covering all cloud apps).

Try Universal Tenant Restrictions

Tenant restrictions are not enforced when a user (or a guest user) tries to access resources in the tenant where the policies are configured. Tenant Restrictions v2 policies are processed only when an identity from a different tenant attempts to signs in and/or accesses resources. For example, if you configure a Tenant Restrictions v2 policy in the tenant contoso.com to block all organizations except fabrikam.com, the policy will apply according to this table:

User Type Tenant TRv2 policy processed? Authenticated access allowed? Anonymous access allowed?
alice@contoso.com Member contoso.com No(same tenant) Yes No
alice@fabrikam.com Member fabrikam.com Yes Yes(tenant allowed by policy) No
bob@northwinds.com Member northwinds.com Yes No(tenant not allowed by policy) No
alice@contoso.com Member contoso.com No(same tenant) Yes No
bob_northwinds.com#EXT#@contoso.com Guest contoso.com No(guest user) Yes No

Validate the authentication plane protection

  1. Ensure that Universal Tenant Restrictions signaling is turned off in Global Secure Access settings.
  2. Use your browser to navigate to https://myapps.microsoft.com/ and sign in with the identity from a tenant different than yours that isn't allow-listed in a tenant restrictions v2 policy. Note that you may need to use a private browser window and/or log out of your primary account to perform this step.
    1. For example, if your tenant is Contoso, sign in as a Fabrikam user in the Fabrikam tenant.
    2. The Fabrikam user should be able to access the MyApps portal, since Tenant Restrictions signaling is disabled in Global Secure Access.
  3. Turn on universal tenant restrictions in the Microsoft Entra admin center -> Global Secure Access -> Session Management -> Universal Tenant Restrictions.
  4. Sign out from the MyApps portal and restart your browser.
  5. As an end-user, with the Global Secure Access client running, access https://myapps.microsoft.com/ using the same identity (Fabrikam user in the Fabrikam tenant).
    1. The Fabrikam user should be blocked from authenticating to MyApps with the error message: Access is blocked, The Contoso IT department has restricted which organizations can be accessed. Contact the Contoso IT department to gain access.

Validate the data plane protection

  1. Ensure that the Universal Tenant Restrictions signaling is turned off in Global Secure Access settings.
  2. Use your browser to navigate to https://yourcompany.sharepoint.com/ and sign in with the identity from a tenant different than yours that isn't allow-listed in a Tenant Restrictions v2 policy. Note that you may need to use a private browser window and/or log out of your primary account to perform this step.
    1. For example, if your tenant is Contoso, sign in as a Fabrikam user in the Fabrikam tenant.
    2. The Fabrikam user should be able to access SharePoint, since Tenant Restrictions v2 signaling is disabled in Global Secure Access.
  3. Optionally, in the same browser with SharePoint Online open, open Developer Tools, or press F12 on the keyboard. Start capturing the network logs. You should see HTTP requests returning status 200 as you navigate SharePoint when everything is working as expected.
  4. Ensure the Preserve log option is checked before continuing.
  5. Keep the browser window open with the logs.
  6. Turn on Universal Tenant Restrictions in the Microsoft Entra admin center -> Global Secure Access -> Session Management -> Universal Tenant Restrictions.
  7. As the Fabrikam user, in the browser with SharePoint Online open, within a few minutes, new logs appear. Also, the browser may refresh itself based on the request and responses happening in the back-end. If the browser doesn't automatically refresh after a couple of minutes, refresh the page.
    1. The Fabrikam user sees that their access is now blocked with the message: Access is blocked, The Contoso IT department has restricted which organizations can be accessed. Contact the Contoso IT department to gain access.
  8. In the logs, look for a Status of 302. This row shows universal tenant restrictions being applied to the traffic.
    1. In the same response, check the headers for the following information identifying that universal tenant restrictions were applied:
      1. Restrict-Access-Confirm: 1
      2. x-ms-diagnostics: 2000020;reason="xms_trpid claim was not present but sec-tenant-restriction-access-policy header was in requres";error_category="insufficiant_claims"

Next steps