🛡️ Microsoft Entra ID Guest Users restricted to their own directory objects🟢
- Contextual name: 🛡️ Guest Users restricted to their own directory objects🟢
- ID:
/ce/ca/azure/microsoft-entra-id/guest-users-restricted-to-their-own-directory - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logic
Similar Policies
- Cloud Conformity: Guest User Permissions Are Limited
Description
Description
Limit guest user permissions.
Rationale
Limiting guest access ensures that guest accounts do not have permission for certain directory tasks, such as enumerating users, groups or other directory resources, and cannot be assigned to administrative roles in your directory. Guest access has three levels of restriction.
- Guest users have the same access as members (most inclusive).
- Guest users have limited access to properties and memberships of directory objects (default value).
- Guest user access is restricted to properties and memberships of their own directory objects (most restrictive).
The recommended option is the 3rd, most restrictive: "Guest user access is restricted to their own directory object".
Impact
This may create additional requests for permissions to access resources that administrators will need to approve.
Service without current support might have compatibility issues with the new guest restriction setting.
... see more
Remediation
Remediation
From Azure Portal
- From Azure Home select the Portal Menu.
- Select
Microsoft Entra ID.- Then
External Identities.- Select
External collaboration settings.- Under
Guest user access, changeGuest user access restrictionsto beGuest user access is restricted to properties and memberships of their own directory objects.From PowerShell
- From a PowerShell session enter:
Set-AzureADMSAuthorizationPolicy -GuestUserRoleId '2af84b1e-32c8-42b7-82bc-daa82404023b'
- Check that the setting was applied by entering:
Get-AzureADMSAuthorizationPolicy
- Make certain that the
GuestUserRoleIdis equal to the earlier entered value of2af84b1e-32c8-42b7-82bc-daa82404023b.