Ensure that only Microsoft Entra ID administrators are allowed to provide consent for third-party multi-tenant applications before users may use them by disabling "Users can consent to apps accessing company data on their behalf" feature.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
Unless your Microsoft Entra ID is running as an identity provider for third-party applications, do not allow users to use their identity outside the Azure cloud environment. By switching "Users can consent to apps accessing company data on their behalf" to "No" within the Microsoft Entra ID user settings, you can deny third-party applications to access Microsoft Entra ID user profile data as this data contains private information such as email addresses and phone numbers which can be sold to other third parties without requiring any further consent from the user.
Audit
To determine if Microsoft Entra ID administrators are enforced to provide consent for applications before users may use them, perform the following actions:
Remediation / Resolution
By setting "Users can consent to apps accessing company data on their behalf" to "No", Microsoft Entra ID administrators are enforced consent to third-party multi-tenant applications before users may use them. To disable Microsoft Entra ID users' ability to grant consent to applications, perform the following actions:
References
- Azure Official Documentation
- Managing user consent for applications using Office 365 APIs
- Configure how users consent to applications
- CIS Microsoft Azure Foundations
- Azure PowerShell Documentation
- Microsoft Entra ID (MSOnline)
- MSOnline
- Get-MsolCompanyInformation
- Set-MsolCompanySettings