1.12 Ensure that 'Users can consent to apps accessing company data on their behalf' is set to 'No'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Require administrators to provide consent for the apps before use.

Rationale:

Unless Azure Active Directory is running as an identity provider for third-party applications, do not allow users to use their identity outside of the cloud environment. User profiles contain private information such as phone numbers and email addresses which could then be sold off to other third parties without requiring any further consent from the user.

Impact:

Enforcing this setting may create additional requests that administrators need to fulfill quite often.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From Azure Portal

From Azure Home select the Portal Menu

Select Azure Active Directory

Then Users

Select User settings

Then Manage how end users launch and view their applications

Under the Enterprise applications heading, set Users can consent to apps accessing company data on their behalf to No

Default Value:

By default, Users can consent to apps accessing company data on their behalf is set to Yes.

See Also

https://workbench.cisecurity.org/files/4052