In my previous blog, Microsoft Entra ID Tenant Restrictions V2: Enhanced Security for External Access Control, I covered the fundamentals of Tenant Restrictions V2 (TRv2) and its role in securing external access.
This follow-up dives deeper into Universal Tenant Restrictions, focusing on client-side configurations and their impact on real-world scenarios.
Understanding Universal Tenant Restrictions
Universal Tenant Restrictions extend Tenant Restrictions V2 by using Microsoft Entra Global Secure Access to apply consistent security controls across all network traffic, regardless of:
- The operating system (Windows, macOS, Linux, etc.)
- The browser (Edge, Chrome, Firefox, etc.)
- The device type (PCs, mobile devices, tablets)
This enhancement allows organizations to enforce tenant restrictions across both client and remote network connections without requiring complex proxy server configurations.
Key Benefits
- Simplifies Policy Enforcement: Eliminates the need for manual proxy settings and network reconfigurations.
- Extends Security Across Platforms: Works across any device and operating system with Global Secure Access client or Remote Networks.
- Prevents Unauthorized Access: Ensures users can only authenticate to approved external tenants, reducing the risk of data exfiltration.
How Universal Tenant Restrictions Work
When enabled, Global Secure Access adds Tenant Restrictions V2 policy metadata to authentication-related network traffic, including:
- Microsoft Entra ID authentication traffic
- Microsoft Graph API requests
This ensures that only authorized external tenants can be accessed from within the organization, preventing unauthorized data access across all applications integrated with Microsoft Entra ID SSO.
Enforcement Scenarios
Universal Tenant Restrictions enforce security policies across browsers, devices, and networks through:
1. Microsoft Entra ID & Microsoft Account Authentication
- Ensures authentication requests comply with Tenant Restrictions V2 policies.
- Works across all Microsoft Entra-integrated third-party apps.
2. Microsoft Graph API Protection
- Prevents unauthorized data access via imported authentication artifacts (e.g., stolen access tokens).
- Ensures attackers cannot replay authentication tokens from another device to bypass security policies.
Enforcement Points: Authentication and Data Plane Protection
Universal Tenant Restrictions apply policy enforcement at two levels:
1. Authentication Plane (Microsoft Entra ID & Microsoft Accounts)
At the authentication plane, enforcement occurs when a user attempts to sign in with Microsoft Entra ID or a Microsoft Account:
If the user is connecting through Global Secure Access (client or remote network), Tenant Restrictions V2 policies determine whether authentication should proceed.
Scenario-based enforcement:
- Allowed: The user signs in to their organization’s tenant (no restrictions applied).
- Blocked: The user attempts to sign in to an unauthorized external tenant (policy enforcement applied).
Applies to all applications integrated with Microsoft Entra ID or Microsoft Accounts.
2. Data Plane (Microsoft Graph Protection)
At the data plane, Universal Tenant Restrictions protect Microsoft Graph API traffic:
- Prevents unauthorized access tokens from being replayed across different devices.
- Blocks unauthorized data exfiltration, ensuring security policies apply beyond authentication.
- Applies across all devices and browsers, preventing cross-device security bypass attempts.
Prerequisites for Enabling Universal Tenant Restrictions
Before enabling Universal Tenant Restrictions, ensure that the following prerequisites are met:
1. Role & Licensing Requirements
- Global Secure Access Administrator role is required to manage Global Secure Access features.
- Global Secure Access License must be available in your tenant.
2. Network & Policy Configurations
- Microsoft Traffic Profile must be enabled.
- FQDNs/IP addresses of services requiring Universal Tenant Restrictions must be set to ‘Tunnel’ mode.
- Global Secure Access clients must be deployed, or Remote Network connectivity must be configured.
- Tenant Restrictions V2 policies must be configured, including:
- Default tenant restrictions
- Partner-specific restrictions (as covered in my previous blog)
Enabling Global Secure Access Signaling for Tenant Restrictions
Once Tenant Restrictions V2 policies are configured, administrators must enable Global Secure Access enforcement to activate Universal Tenant Restrictions.
Step-by-Step Configuration
Sign in to the Microsoft Entra admin center as a Global Secure Access Administrator.
Navigate to Global Secure Access > Settings > Session Management > Universal Tenant Restrictions.
Toggle Enable Tenant Restrictions for Entra ID (applies to all cloud applications).
Setting Up Cloud Policy for Server-Side Tenant Restrictions V2
For a detailed guide on configuring Cloud Policy for Server-Side Tenant Restrictions V2, you can refer to my previous blog:
🔗 Microsoft Entra ID Tenant Restrictions V2: Enhanced Security for External Access Control.
As part of our testing phase, we have configured Tenant Restrictions V2 to block all external tenant logins from corporate-managed devices(With Global Secure access). This setup ensures that only authorized Microsoft Entra tenants can be accessed, effectively preventing unauthorized external authentication and reducing the risk of data exfiltration
User | Type | Tenant | TRv2 Policy Processed? | Authenticated Access Allowed? | Anonymous Access Allowed? |
---|---|---|---|---|---|
alice@contoso.com | Member | contoso.com | No (Same Tenant) | Yes | No |
alice@fabrikam.com | Member | fabrikam.com | Yes | Yes (Tenant Allowed by Policy) | No |
bob@northwinds.com | Member | northwinds.com | Yes | No (Tenant Not Allowed by Policy) | No |
alice@contoso.com | Member | contoso.com | No (Same Tenant) | Yes | No |
bob_northwinds.com#EXT#@contoso.com | Guest | contoso.com | No (Guest User) | Yes | No |
Validating User Access with Tenant Restrictions V2
Scenario: Enforcing Universal Tenant Restrictions
1. User Access Attempt
2. Authentication Plane Protection
3. Data Plane Protection
As part of my validation process, I am going to test Universal Tenant Restrictions (UTR) Data Plane Protection in my Microsoft Entra tenant. Below are the steps I will follow:
- Ensure that Universal Tenant Restrictions signaling is turned off in Global Secure Access settings.
- Open a browser and navigate to Graph Explorer.
- Sign in using an identity from a tenant that is different from my demo tenant, and ensure this tenant is not allow-listed in my Tenant Restrictions V2 policy.
- To avoid session conflicts, I may need to: Use a private/incognito window. or Log out of my primary Microsoft Entra account before signing in with the external identity.
- With Graph Explorer open, I will launch Developer Tools (Press F12 in the browser).
- Start capturing network logs while navigating SharePoint.
- Ensure that the "Preserve log" option is checked before continuing.
- If the setup is correct, I should see HTTP requests returning a status 200, indicating that access is functioning normally.
Enable Universal Tenant Restrictions to enforce access policies.
- In the same browser window (where Graph Explorer is open), wait for a few minutes.
- The browser may automatically refresh as new policies are applied in the background.
- If the browser does not refresh within a couple of minutes, I will manually refresh the page or try to open SharePoint site.
- The External Tenant user should now see an access blocked message, indicating enforcement of Universal Tenant Restrictions
Known Limitations of Universal Tenant Restrictions
If Universal Tenant Restrictions is enabled and you attempt to access the Microsoft Entra admin center for a tenant that is on the allow list, you may encounter an "Access Denied" error.How to Resolve the Access Denied Error
To bypass this issue, add the following feature flag to the Microsoft Entra admin center URL:
- Suppose you work for Contoso, and Fabrikam (a partner tenant) is on the allowlist.
- When trying to access the Microsoft Entra admin center for Fabrikam, you may see the "Access Denied" message.
- If you encounter the error when accessing https://entra.microsoft.com/, modify the URL as follows:
Additional Known Limitations
Universal Tenant Restrictions may have other known issues affecting specific scenarios. For the most up-to-date information on these limitations, refer to:
🔗 Known Limitations for Global Secure Access
Conclusion
Universal Tenant Restrictions enhance Microsoft Entra ID Tenant Restrictions V2 by simplifying enforcement across all platforms, eliminating the need for complex proxy configurations, and ensuring security policies apply consistently across authentication and data access points.
By leveraging Global Secure Access, organizations can:
- Prevent unauthorized external tenant access.
- Protect against cross-device data exfiltration.
- Enforce consistent authentication policies across any network, browser, or device.
For a deeper dive into configuring Tenant Restrictions V2, check out my previous blog:
🔗 Microsoft Entra ID Tenant Restrictions V2: Enhanced Security for External Access Control
0 Comments