5.1.5.2 (L1) Ensure the admin consent workflow is enabled

Information

The admin consent workflow gives admins a secure way to grant access to applications that require admin approval. When a user tries to access an application but is unable to provide consent, they can send a request for admin approval. The request is sent via email to admins who have been designated as reviewers. A reviewer takes action on the request, and the user is notified of the action.

The admin consent workflow (Preview) gives admins a secure way to grant access to applications that require admin approval. When a user tries to access an application but is unable to provide consent, they can send a request for admin approval. The request is sent via email to admins who have been designated as reviewers. A reviewer acts on the request, and the user is notified of the action.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To remediate using the UI:

- Navigate to Microsoft Entra admin center

https://entra.microsoft.com/

.
- Click to expand Identity > Applications select Enterprise applications
- Under Security select Consent and permissions
- Under Manage select Admin consent settings
- Set Users can request admin consent to apps they are unable to consent to to Yes under Admin consent requests
- Under the Reviewers choose the Roles and Groups that will review user generated app consent requests.
- Set Selected users will receive email notifications for requests to Yes
- Select Save at the top of the window.

Impact:

To approve requests, a reviewer must be a global administrator, cloud application administrator, or application administrator. The reviewer must already have one of these admin roles assigned; simply designating them as a reviewer doesn't elevate their privileges.

See Also

https://workbench.cisecurity.org/benchmarks/17682

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7(5), 800-53|CM-10, CSCv7|18.3

Plugin: microsoft_azure

Control ID: 75b60b2501549dc5ca6fedeb639e1a2ef2291edddea326a7e01bbd3d2ea8f8ff