Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Microsoft Graph supports defining and assinging policy to applications to modify behavior such as allowing additional attributes to be emitted in claims or authenticating directly against Entra IDEntra ID uses policies to control behavior of Microsoft Entra features. A policy is defined globally in the Entra ID tenant and then applied to the entire tenant or to one or more more applications, service principals, or groups.

Create policy

  1. Define the policy on the following page:
  2. Create the policy per the following page:

Assign policy

...

...

The utexas tenant currently permits the following policy types:

Expand
titleClaims Mapping Policy

claims mapping policy modifies the claims that are included in tokens. This policy type can select which claims are included, create new claims, or modify the source of an existing claim and each policy can be assigned to one or more service principal objects.

Expand
titleHome Realm Discovery Policy
  • A home realm discovery policy modifies the authentication behavior for federated users. This policy type can bypass home realm discovery and send authentication requests directly to a federated IDP such as ADFS, bypass federation and authenticate directly against the cloud when Password Hash Synchronization is enabled, or enable sign-in with an alternate ID such as an e-mail address that does not match a user principal name. Each policy can be assigned to one or more service principal objects. One policy can be assigned to the entire tenant via the IsOrganizationDefault property.

References