title | description | services | keywords | author | manager | ms.author | ms.reviewer | ms.date | ms.service | ms.component | ms.devlang | ms.topic | ms.tgt_pltfrm | ms.workload |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Developer guidance for Azure Active Directory conditional access |
Developer guidance and scenarios for Azure AD conditional access |
active-directory |
CelesteDG |
mtillman |
celested |
dadobali |
09/24/2018 |
active-directory |
develop |
na |
article |
na |
identity |
The conditional access feature in Azure Active Directory (Azure AD) offers one of several ways that you can use to secure your app and protect a service. Conditional access enables developers and enterprise customers to protect services in a multitude of ways including:
- Multi-factor authentication
- Allowing only Intune enrolled devices to access specific services
- Restricting user locations and IP ranges
For more information on the full capabilities of conditional access, see Conditional access in Azure Active Directory.
For developers building apps for Azure AD, this article shows how you can use conditional access and you'll also learn about the impact of accessing resources that you don't have control over that may have conditional access policies applied. The article also explores the implications of conditional access in the on-behalf-of flow, web apps, accessing Microsoft Graph, and calling APIs.
Knowledge of single and multi-tenant apps and common authentication patterns is assumed.
In most common cases, conditional access does not change an app's behavior or requires any changes from the developer. Only in certain cases when an app indirectly or silently requests a token for a service, an app requires code changes to handle conditional access "challenges". It may be as simple as performing an interactive sign-in request.
Specifically, the following scenarios require code to handle conditional access "challenges":
- Apps accessing Microsoft Graph
- Apps performing the on-behalf-of flow
- Apps accessing multiple services/resources
- Single-page apps using ADAL.js
- Web Apps calling a resource
Conditional access policies can be applied to the app, but also can be applied to a web API your app accesses. To learn more about how to configure a conditional access policy, see Quickstart: Require MFA for specific apps with Azure Active Directory conditional access.
Depending on the scenario, an enterprise customer can apply and remove conditional access policies at any time. In order for your app to continue functioning when a new policy is applied, you need to implement the "challenge" handling. The following examples illustrate challenge handling.
Some scenarios require code changes to handle conditional access whereas others work as is. Here are a few scenarios using conditional access to do multi-factor authentication that gives some insight into the difference.
- You are building a single-tenant iOS app and apply a conditional access policy. The app signs in a user and doesn't request access to an API. When the user signs in, the policy is automatically invoked and the user needs to perform multi-factor authentication (MFA).
- You are building a multi-tenant web app that uses Microsoft Graph to access Exchange, among other services. An enterprise customer who adopts this app sets a policy on Exchange. When the web app requests a token for MS Graph, the app will not be challenged to comply with the policy. The end user is signed in with valid tokens. When the app attempts to use this token against the Microsoft Graph to access Exchange data, a claims "challenge" is returned to the web app through the
WWW-Authenticate
header. The app can then use theclaims
in a new request, and the end user will be prompted to comply with the conditions. - You are building a native app that uses a middle tier service to access a downstream API. An enterprise customer at the company using this app applies a policy to the downstream API. When an end user signs in, the native app requests access to the middle tier and sends the token. The middle tier performs on-behalf-of flow to request access to the downstream API. At this point, a claims "challenge" is presented to the middle tier. The middle tier sends the challenge back to the native app, which needs to comply with the conditional access policy.
For several different app topologies, a conditional access policy is evaluated when the session is established. As a conditional access policy operates on the granularity of apps and services, the point at which it is invoked depends heavily on the scenario you're trying to accomplish.
When your app attempts to access a service with a conditional access policy, it may encounter a conditional access challenge. This challenge is encoded in the claims
parameter that comes in a response from Azure AD or Microsoft Graph. Here's an example of this challenge parameter:
claims={"access_token":{"polids":{"essential":true,"Values":["<GUID>"]}}}
Developers can take this challenge and append it onto a new request to Azure AD. Passing this state prompts the end user to perform any action necessary to comply with the conditional access policy. In the following scenarios, specifics of the error and how to extract the parameter are explained.
Azure AD conditional access is a feature included in Azure AD Premium. You can learn more about licensing requirements in the unlicensed usage report. Developers can join the Microsoft Developer Network, which includes a free subscription to the Enterprise Mobility Suite, which includes Azure AD Premium.
The following information only applies in these conditional access scenarios:
- Apps accessing Microsoft Graph
- Apps performing the on-behalf-of flow
- Apps accessing multiple services/resources
- Single-page apps using ADAL.js
The following sections discuss common scenarios that are more complex. The core operating principle is conditional access policies are evaluated at the time the token is requested for the service that has a conditional access policy applied unless it's being accessed through Microsoft Graph.
In this scenario, learn how a web app requests access to Microsoft Graph. The conditional access policy in this case could be assigned to SharePoint, Exchange, or some other service that is accessed as a workload through Microsoft Graph. In this example, let's assume there's a conditional access policy on Sharepoint Online.
The app first requests authorization to Microsoft Graph which requires accessing a downstream workload without conditional access. The request succeeds without invoking any policy and the app receives tokens for Microsoft Graph. At this point, the app may use the access token in a bearer request for the endpoint requested. Now, the app needs to access a Sharepoint Online endpoint of Microsoft Graph, for example: https://graph.microsoft.com/v1.0/me/mySite
The app already has a valid token for Microsoft Graph, so it can perform the new request without being issued a new token. This request fails and a claims challenge is issued from Microsoft Graph in the form of an HTTP 403 Forbidden with a WWW-Authenticate
challenge.
Here's an example of the response:
HTTP 403; Forbidden
error=insufficient_claims
www-authenticate="Bearer realm="", authorization_uri="https://login.windows.net/common/oauth2/authorize", client_id="<GUID>", error=insufficient_claims, claims={"access_token":{"polids":{"essential":true,"values":["<GUID>"]}}}"
The claims challenge is inside the WWW-Authenticate
header, which can be parsed to extract the claims parameter for the next request. Once it's appended to the new request, Azure AD knows to evaluate the conditional access policy when signing in the user and the app is now in compliance with the conditional access policy. Repeating the request to the Sharepoint Online endpoint succeeds.
The WWW-Authenticate
header does have a unique structure and is not trivial to parse in order to extract values. Here's a short method to help.
/// <summary>
/// This method extracts the claims value from the 403 error response from MS Graph.
/// </summary>
/// <param name="wwwAuthHeader"></param>
/// <returns>Value of the claims entry. This should be considered an opaque string.
/// Returns null if the wwwAuthheader does not contain the claims value. </returns>
private String extractClaims(String wwwAuthHeader)
{
String ClaimsKey = "claims=";
String ClaimsSubstring = "";
if (wwwAuthHeader.Contains(ClaimsKey))
{
int Index = wwwAuthHeader.IndexOf(ClaimsKey);
ClaimsSubstring = wwwAuthHeader.Substring(Index, wwwAuthHeader.Length - Index);
string ClaimsChallenge;
if (Regex.Match(ClaimsSubstring, @"}$").Success)
{
ClaimsChallenge = ClaimsSubstring.Split('=')[1];
}
else
{
ClaimsChallenge = ClaimsSubstring.Substring(0, ClaimsSubstring.IndexOf("},") + 1);
}
return ClaimsChallenge;
}
return null;
}
For code samples that demonstrate how to handle the claims challenge, refer to the On-behalf-of code sample for ADAL .NET.
In this scenario, we walk through the case in which a native app calls a web service/API. In turn, this service does [he "on-behalf-of" flow to call a downstream service. In our case, we've applied our conditional access policy to the downstream service (Web API 2) and are using a native app rather than a server/daemon app.
The initial token request for Web API 1 does not prompt the end user for multi-factor authentication as Web API 1 may not always hit the downstream API. Once Web API 1 tries to request a token on-behalf-of the user for Web API 2, the request fails since the user has not signed in with multi-factor authentication.
Azure AD returns an HTTP response with some interesting data:
Note
In this instance it's a multi-factor authentication error description, but there's a wide range of interaction_required
possible pertaining to conditional access.
HTTP 400; Bad Request
error=interaction_required
error_description=AADSTS50076: Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication to access '<Web API 2 App/Client ID>'.
claims={"access_token":{"polids":{"essential":true,"Values":["<GUID>"]}}}
In Web API 1, we catch the error error=interaction_required
, and send back the claims
challenge to the desktop app. At that point, the desktop app can make a new acquireToken()
call and append the claims
challenge as an extra query string parameter. This new request requires the user to do multi-factor authentication and then send this new token back to Web API 1 and complete the on-behalf-of flow.
To try out this scenario, see our .NET code sample. It demonstrates how to pass the claims challenge back from Web API 1 to the native app and construct a new request inside the client app.
In this scenario, we walk through the case in which a web app accesses two services one of which has a conditional access policy assigned. Depending on your app logic, there may exist a path in which your app does not require access to both web services. In this scenario, the order in which you request a token plays an important role in the end user experience.
Let's assume we have web service A and B and web service B has our conditional access policy applied. While the initial interactive auth request requires consent for both services, the conditional access policy is not required in all cases. If the app requests a token for web service B, then the policy is invoked and subsequent requests for web service A also succeeds as follows.
Alternatively, if the app initially requests a token for web service A, the end user does not invoke the conditional access policy. This allows the app developer to control the end user experience and not force the conditional access policy to be invoked in all cases. The tricky case is if the app subsequently requests a token for web service B. At this point, the end user needs to comply with the conditional access policy. When the app tries to acquireToken
, it may generate the following error (illustrated in the following diagram):
HTTP 400; Bad Request
error=interaction_required
error_description=AADSTS50076: Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication to access '<Web API App/Client ID>'.
claims={"access_token":{"polids":{"essential":true,"Values":["<GUID>"]}}}
If the app is using the ADAL library, a failure to acquire the token is always retried interactively. When this interactive request occurs, the end user has the opportunity to comply with the conditional access. This is true unless the request is a AcquireTokenSilentAsync
or PromptBehavior.Never
in which case the app needs to perform an interactive AcquireToken
request to give the end use the opportunity to comply with the policy.
In this scenario, we walk through the case when we have a single-page app (SPA), using ADAL.js to call a conditional access protected web API. This is a simple architecture but has some nuances that need to be taken into account when developing around conditional access.
In ADAL.js, there are a few functions that obtain tokens: login()
, acquireToken(...)
, acquireTokenPopup(…)
, and acquireTokenRedirect(…)
.
login()
obtains an ID token through an interactive sign-in request but does not obtain access tokens for any service (including a conditional access protected web API).acquireToken(…)
can then be used to silently obtain an access token meaning it does not show UI in any circumstance.acquireTokenPopup(…)
andacquireTokenRedirect(…)
are both used to interactively request a token for a resource meaning they always show sign-in UI.
When an app needs an access token to call a Web API, it attempts an acquireToken(…)
. If the token session is expired or we need to comply with a conditional access policy, then the acquireToken function fails and the app uses acquireTokenPopup()
or acquireTokenRedirect()
.
Let's walk through an example with our conditional access scenario. The end user just landed on the site and doesn’t have a session. We perform a login()
call, get an ID token without multi-factor authentication. Then the user hits a button that requires the app to request data from a web API. The app tries to do an acquireToken()
call but fails since the user has not performed multi-factor authentication yet and needs to comply with the conditional access policy.
Azure AD sends back the following HTTP response:
HTTP 400; Bad Request
error=interaction_required
error_description=AADSTS50076: Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication to access '<Web API App/Client ID>'.
Our app needs to catch the error=interaction_required
. The application can then use either acquireTokenPopup()
or acquireTokenRedirect()
on the same resource. The user is forced to do a multi-factor authentication. After the user completes the multi-factor authentication, the app is issued a fresh access token for the requested resource.
To try out this scenario, see our JS SPA On-behalf-of code sample. This code sample uses the conditional access policy and web API you registered earlier with a JS SPA to demonstrate this scenario. It shows how to properly handle the claims challenge and get an access token that can be used for your Web API. Alternatively, checkout the general Angular.js code sample for guidance on an Angular SPA
- To learn more about the capabilities, see Conditional Access in Azure Active Directory.
- For more Azure AD code samples, see Github repo of code samples.
- For more info on the ADAL SDK's and access the reference documentation, see library guide.
- To learn more about multi-tenant scenarios, see How to sign in users using the multi-tenant pattern.