Answered by:
Conditional Access MFA for Azure Management is also catching Powerapps

Question
-
Hi all,
We've setup a conditional access rule to force MFA for access to "Microsoft Azure Management" (i.e. azure portal + powershell), however we find that this rule also catches and forces MFA for "web.powerapps.com".
Does anyone have an insight into this behaviour and whether there is a workaround?
I've tried putting "Microsoft Powerapps" as an exception but it doesn't work.
Support ticket is in but I have more confidence in the collective wisdom here.
Thanks,
BenThursday, November 8, 2018 7:07 AM
Answers
-
Hi Neelesh,
Thanks for your interest, the ticket is [REG:118110826001741] Conditional MFA for Azure Management also applied to powerapps.
Response received yesterday is that this is a known issue. The blame is placed on the way the consumer SAAS platform (powerapps) was coded, but this is an overly simplistic redirection of responsibility.
Powerapps is calling graphapi, and somewhere within that it seems there is a call to graph.microsoftazure.us. Why this call is made is not visible to me, but let's assume that it is required. The use of the graph api is normal and expected for a consumer app; Consider please that this rule is catching all users including those who do not have any RBAC privilege to Azure or Azure AD, so whatever the nature of the API calls, they can't be considered as Azure Management.
My takeaway is that the conditional access app-based conditions need to be rethunk - one of the following:
a) to find a way to greenlight "internal" calls
b) to define an appropriate "App" that can be used in an exception rule to allow explicit greenlight for whatever is being caught here by mistake.
c) redefine "Microsoft Azure Management" app to exclude all consumer authentication/consent scenarios
d) create some other new conditional access condition that can legitimately match on Azure Management similar to the way we have now for AAD roles, e.g. according to Azure RBAC roles held (or a simple do you have _any_ RBAC assignment).
The workaround that I can think of for now is to define and use an Azure AD group in the conditional access policy, and use a script to periodically resync group membership against all people with active Azure RBAC roles. This doesn't directly solve the problem but it limits unnecessary MFA on powerapps to just the Azure administrators who will be enrolled and familiar with it for Azure admin purposes.
Regards
Ben
- Marked as answer by Marilee Turscak - MSFTMicrosoft employee, Owner Friday, November 16, 2018 9:55 PM
Friday, November 9, 2018 9:58 PM
All replies
-
Could you provide us the Support Ticket Number for us to check on it ?Friday, November 9, 2018 12:06 PM
-
Hi Neelesh,
Thanks for your interest, the ticket is [REG:118110826001741] Conditional MFA for Azure Management also applied to powerapps.
Response received yesterday is that this is a known issue. The blame is placed on the way the consumer SAAS platform (powerapps) was coded, but this is an overly simplistic redirection of responsibility.
Powerapps is calling graphapi, and somewhere within that it seems there is a call to graph.microsoftazure.us. Why this call is made is not visible to me, but let's assume that it is required. The use of the graph api is normal and expected for a consumer app; Consider please that this rule is catching all users including those who do not have any RBAC privilege to Azure or Azure AD, so whatever the nature of the API calls, they can't be considered as Azure Management.
My takeaway is that the conditional access app-based conditions need to be rethunk - one of the following:
a) to find a way to greenlight "internal" calls
b) to define an appropriate "App" that can be used in an exception rule to allow explicit greenlight for whatever is being caught here by mistake.
c) redefine "Microsoft Azure Management" app to exclude all consumer authentication/consent scenarios
d) create some other new conditional access condition that can legitimately match on Azure Management similar to the way we have now for AAD roles, e.g. according to Azure RBAC roles held (or a simple do you have _any_ RBAC assignment).
The workaround that I can think of for now is to define and use an Azure AD group in the conditional access policy, and use a script to periodically resync group membership against all people with active Azure RBAC roles. This doesn't directly solve the problem but it limits unnecessary MFA on powerapps to just the Azure administrators who will be enrolled and familiar with it for Azure admin purposes.
Regards
Ben
- Marked as answer by Marilee Turscak - MSFTMicrosoft employee, Owner Friday, November 16, 2018 9:55 PM
Friday, November 9, 2018 9:58 PM -
We see that the Case has been Closed on your consent owing to Product Design. Let us know if you need further assistance.Thursday, November 15, 2018 4:46 AM
-
I think this is a larger issue as Ben alluded to regarding Conditional Access and Cloud App conditions. Excluding an app doesn't grab all of it's dependencies. And sometimes, those dependencies aren't selectable within the policy to be excluded.Monday, March 18, 2019 2:07 PM