Check provider logo

Ensure 'User consent for applications' is set to 'Do not allow user consent'

entra_policy_restricts_user_consent_for_apps

Severityhigh
Serviceentra
by Prowler

Require administrators to provide consent for applications before use.

Risk

If Microsoft Entra ID is running as an identity provider for third-party applications, permissions and consent should be limited to administrators or pre-approved. Malicious applications may attempt to exfiltrate data or abuse privileged user accounts.

Run this check with Prowler CLI

prowler m365 --checks entra_policy_restricts_user_consent_for_apps

Run in Prowler Cloud

Remediation

Other

1. Navigate to Microsoft Entra admin center (https://entra.microsoft.com/); 2. Click to expand Identity > Applications and select Enterprise applications; 3. Under Security select Consent and permissions > User consent settings; 4. Under User consent for applications select Do not allow user consent; 5. Click the Save option at the top of the window.

WUI

Disable user consent for applications in the Microsoft Entra admin center. This ensures that end users and group owners cannot grant consent to applications, requiring administrator approval for all future consent operations, thereby reducing the risk of unauthorized access to company data.

References:

Source Code

References

Resource Type

Authorization Policy

Related URL