App Management Policies Can Now Be Defined Directly From the Microsoft Entra Admin Center

app management policies in Microsoft Entra ID

Previously, configuring app management policies required Microsoft Graph API calls. Now, you can set every restriction straight from the Microsoft Entra admin center, making it simpler to tighten app security without writing a single line of code.

Configurable restrictions include:

π‘·π’‚π’”π’”π’˜π’π’“π’… π’“π’†π’”π’•π’“π’Šπ’„π’•π’Šπ’π’π’”
– Block password addition
– Restrict max password lifetime
– Block custom passwords

π‘ͺπ’†π’“π’•π’Šπ’‡π’Šπ’„π’‚π’•π’† π’“π’†π’”π’•π’“π’Šπ’„π’•π’Šπ’π’π’”
– Restrict max certificate lifetime

π‘°π’…π’†π’π’•π’Šπ’‡π’Šπ’†π’“ 𝑼𝑹𝑰 π’“π’†π’”π’•π’“π’Šπ’„π’•π’Šπ’π’π’”
– Block custom identifier URIs
– Block identifier URIs without unique tenant identifier

You can apply these for all applications, for all applications with exclusions, or for selected applications – right from the Entra portal.

Sign in to the Entra admin center today and start configuring these policies to strengthen your app security posture!

Learn more: https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/configure-app-management-policies/

Write a Comment

Leave a Comment

Your email address will not be published. Required fields are marked *

Subscribe to Newsletter

Subscribe to our email newsletter to get the latest posts delivered right to your email.
Powered by Amail.