Learn Plan and Implement Workload Identities (SC-300) with Interactive Flashcards

Master key concepts in Plan and Implement Workload Identities through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.

Managed Identities for Azure Resources

Managed Identities for Azure Resources is a feature of Microsoft Entra ID (formerly Azure AD) that provides Azure services with an automatically managed identity. This eliminates the need for developers to manage credentials such as secrets, certificates, or keys in their code, significantly reducing the risk of credential exposure.

There are two types of managed identities:

1. **System-assigned Managed Identity**: This is directly tied to a specific Azure resource (e.g., a Virtual Machine, App Service, or Azure Function). When the resource is created and the identity is enabled, Azure automatically creates an identity in the Microsoft Entra ID tenant. The lifecycle of this identity is tied to the resource — when the resource is deleted, the identity is automatically removed.

2. **User-assigned Managed Identity**: This is created as a standalone Azure resource independent of any specific service. It can be assigned to one or more Azure resources, making it ideal for scenarios where multiple resources need to share the same identity. Its lifecycle is managed independently from the resources it is associated with.

Managed identities work by leveraging Azure's Instance Metadata Service (IMDS) to obtain tokens from Microsoft Entra ID without requiring any credentials in the application code. The Azure platform handles token rotation and credential management behind the scenes.

Key benefits include:
- **Enhanced security**: No credentials stored in code or configuration files
- **Simplified management**: Azure handles credential rotation automatically
- **Seamless integration**: Works natively with Azure services that support Microsoft Entra authentication, such as Azure Key Vault, Azure Storage, Azure SQL Database, and many more
- **Role-Based Access Control (RBAC)**: Managed identities can be assigned Azure roles and Microsoft Entra roles to control access to resources

As a workload identity, managed identities are essential for implementing zero-trust security principles, ensuring that applications and services authenticate securely without human intervention or hardcoded credentials.

Service Principals and Application Identities

In Microsoft Entra ID (formerly Azure AD), Application Identities and Service Principals are fundamental concepts for managing workload identities.

**Application Object:**
An application object is a global definition of an application, registered in a home tenant. It serves as a blueprint or template that defines the application's properties, including its name, authentication settings, API permissions, and credentials (certificates or secrets). The application object exists only in the tenant where it was registered and is identified by a unique Application (client) ID.

**Service Principal:**
A service principal is a local representation (instance) of the application object within a specific tenant. When an application is granted access to resources in a tenant, a service principal object is automatically created. While the application object is the global definition, the service principal is what actually gets assigned roles, permissions, and policies within a given tenant. There are three types of service principals:

1. **Application Service Principal** – Created when an app registration is made; it references back to the application object.
2. **Managed Identity Service Principal** – Created for managed identities, providing an automatically managed identity for Azure resources without credential management.
3. **Legacy Service Principal** – Represents legacy apps created before modern app registrations existed.

**Relationship:**
An application object has a one-to-one relationship with its software application and a one-to-many relationship with service principals. A single application object can have multiple service principals across different tenants, each governing access and permissions locally.

**Key Use Cases:**
Service principals enable non-human workloads (such as applications, automation scripts, and Azure services) to authenticate and access resources securely. Administrators can apply Conditional Access policies, assign RBAC roles, and manage consent through service principals.

Understanding these concepts is critical for Identity and Access Administrators to securely manage workload identities, enforce least-privilege access, and maintain proper governance across multi-tenant environments.

Managed Identity Assignment and Resource Access

Managed Identity Assignment and Resource Access is a critical concept within Microsoft Identity and Access Administration, specifically under workload identities. Managed identities are a feature of Azure Active Directory (now Microsoft Entra ID) that eliminate the need for developers to manage credentials by providing an automatically managed identity for Azure resources to authenticate to services that support Azure AD authentication.

There are two types of managed identities: System-assigned and User-assigned. A system-assigned managed identity is directly tied to a specific Azure resource (such as a Virtual Machine, App Service, or Azure Function). When the resource is created and the identity is enabled, Azure automatically provisions an identity in the Azure AD tenant. When the resource is deleted, the identity is automatically removed. A user-assigned managed identity, on the other hand, is created as a standalone Azure resource and can be assigned to one or more Azure resources, providing greater flexibility and reusability across multiple services.

For Resource Access, managed identities leverage Azure Role-Based Access Control (RBAC) to grant permissions. Once a managed identity is assigned to a resource, administrators can grant it specific roles on target resources such as Azure Key Vault, Azure Storage, Azure SQL Database, or other Azure services. For example, a VM with a managed identity can be granted the 'Storage Blob Data Reader' role on a storage account, allowing the application running on the VM to read blob data without storing any credentials in code.

The authentication flow works seamlessly: the workload requests a token from the Azure Instance Metadata Service (IMDS), which communicates with Azure AD to obtain an access token. This token is then used to authenticate against the target resource.

Key benefits include enhanced security through credential-free authentication, simplified secret management, reduced risk of credential leakage, centralized identity governance, and seamless integration with Azure RBAC. Administrators should follow the principle of least privilege when assigning roles to managed identities, ensuring workloads only have the minimum permissions necessary to function.

Enterprise Application Settings and Configuration

Enterprise Application Settings and Configuration in Microsoft Entra ID (formerly Azure AD) is a critical aspect of managing workload identities. Enterprise applications represent instances of applications that are registered in your tenant, including service principals, managed identities, and third-party SaaS applications.

**Key Configuration Areas:**

1. **Properties:** Administrators can configure basic settings such as enabling/disabling user sign-in, requiring user assignment, and controlling visibility in the My Apps portal. The 'Enabled for users to sign-in' toggle controls whether users can authenticate to the application.

2. **User and Group Assignment:** When assignment is required, only explicitly assigned users and groups can access the application. This enforces least-privilege access and ensures proper authorization controls.

3. **Permissions and Consent:** Administrators manage API permissions granted to applications, including delegated and application permissions. Admin consent can be granted tenant-wide, and consent policies can restrict which permissions users can grant independently.

4. **Conditional Access Policies:** Enterprise applications can be targeted by Conditional Access policies to enforce MFA, device compliance, location-based restrictions, and session controls.

5. **Single Sign-On (SSO):** Configuration options include SAML, OpenID Connect, password-based, and linked SSO methods. SAML-based SSO requires configuring identifiers, reply URLs, signing certificates, and attribute mappings.

6. **Token Configuration:** Administrators can customize claims emitted in tokens, configure optional claims, and manage token lifetime policies.

7. **Provisioning:** Automated user provisioning via SCIM protocol enables lifecycle management of user accounts in third-party applications.

8. **Self-Service:** Settings allow users to request access to applications and manage their own group memberships with approval workflows.

**Tenant-Wide Settings:**
Under Enterprise Applications > User Settings, administrators can control whether users can consent to applications, register applications, and access the My Apps portal. These global settings establish the security baseline for application access across the organization, ensuring proper governance of workload identities.

Microsoft Entra Roles for Application Management

Microsoft Entra roles for application management are specialized role-based access control (RBAC) roles that allow administrators to delegate and manage application-related tasks within Microsoft Entra ID (formerly Azure AD). These roles follow the principle of least privilege, ensuring users only have the permissions necessary for their specific responsibilities.

**Key Roles for Application Management:**

1. **Application Administrator**: This is one of the most comprehensive roles. It can create and manage all aspects of app registrations, enterprise applications, application proxy settings, and consent requests. However, it cannot manage directory-level permissions beyond applications.

2. **Cloud Application Administrator**: Similar to the Application Administrator but without the ability to manage Application Proxy settings. This role is ideal for organizations that don't use on-premises application publishing.

3. **Application Developer**: Can create new application registrations regardless of the 'Users can register applications' setting. This is a more limited role suited for developers who need to register apps but not manage enterprise-wide settings.

4. **Global Administrator**: Has full access to all administrative features, including application management, though using this role is discouraged for routine app management tasks.

**Important Considerations:**

- **Consent Management**: Application Administrators can grant tenant-wide admin consent for delegated and application permissions, making this a sensitive role that should be carefully assigned.

- **Custom Roles**: Microsoft Entra ID supports custom roles where administrators can define specific permissions for application management, such as managing only specific properties of app registrations.

- **Owner Assignments**: Individual application owners can manage their specific applications without requiring a directory-level role, providing granular control.

- **Workload Identity Context**: When planning workload identities (service principals, managed identities), these roles determine who can create, configure, and manage credentials for non-human identities, which is critical for security.

Proper role assignment ensures secure governance of applications while enabling efficient administration across the organization, reducing the risk of over-privileged access to application configurations.

On-Premises App Integration with Application Proxy

On-Premises App Integration with Application Proxy is a feature in Microsoft Entra ID (formerly Azure AD) that enables secure remote access to on-premises web applications without requiring a VPN. It acts as a bridge between external users and internal applications, providing a seamless and secure authentication experience.

**How It Works:**
Application Proxy consists of two key components: a cloud-based service running in Microsoft Entra ID and an on-premises connector installed on a Windows Server within your network. When a user requests access to an on-premises application, the request flows through Microsoft Entra ID, which authenticates the user. The Application Proxy connector then forwards the request to the internal application and returns the response to the user.

**Key Components:**
1. **Application Proxy Service** – Runs in the cloud and handles external user requests.
2. **Application Proxy Connector** – A lightweight agent installed on-premises that establishes outbound connections to the cloud service, eliminating the need to open inbound firewall ports.
3. **Microsoft Entra ID** – Performs authentication and applies Conditional Access policies.

**Benefits:**
- **No VPN Required** – Users access on-premises apps securely through the cloud.
- **Single Sign-On (SSO)** – Supports SSO using Kerberos Constrained Delegation, header-based authentication, and SAML.
- **Conditional Access** – Enforces MFA, device compliance, and risk-based policies for on-premises apps.
- **Security** – No inbound connections are needed; connectors use outbound HTTPS connections only.
- **Workload Identity Integration** – Applications published through Application Proxy are registered as enterprise applications in Microsoft Entra ID, enabling managed identities and service principal configurations.

**Planning Considerations:**
Administrators should plan connector group placement for high availability, configure appropriate authentication methods, assign users and groups, and apply Conditional Access policies. Network latency between connectors and applications should be minimized for optimal performance.

Application Proxy is essential for organizations transitioning to hybrid environments, securely extending identity-driven access to legacy on-premises applications.

SaaS Application Integration

SaaS Application Integration in the context of Microsoft Identity and Access Administration refers to the process of connecting third-party Software-as-a-Service applications with Microsoft Entra ID (formerly Azure AD) to enable centralized identity management, single sign-on (SSO), and automated provisioning for workload identities.

When integrating SaaS applications, administrators register them in Microsoft Entra ID, either through the Azure AD App Gallery, which contains thousands of pre-integrated applications, or through custom application registrations for non-gallery apps. This integration establishes a trust relationship between the identity provider (Microsoft Entra ID) and the SaaS application (service provider).

Key components of SaaS Application Integration include:

1. **Single Sign-On (SSO):** Enables users to access SaaS applications using their organizational credentials. Protocols such as SAML 2.0, OpenID Connect, and OAuth 2.0 are commonly used to facilitate secure authentication.

2. **Automated User Provisioning:** Using SCIM (System for Cross-domain Identity Management), administrators can automate the creation, updating, and deprovisioning of user accounts in SaaS applications, ensuring consistent access lifecycle management.

3. **Workload Identities:** Service principals and managed identities are used when applications or services need to authenticate and access resources programmatically without user interaction. These workload identities are critical for secure application-to-application communication.

4. **Conditional Access Policies:** Administrators can enforce security policies that govern how users and workload identities access SaaS applications, including requiring MFA, device compliance, or location-based restrictions.

5. **Consent and Permissions:** Managing application permissions through OAuth consent frameworks ensures that SaaS applications only access the data they need, following the principle of least privilege.

6. **Monitoring and Governance:** Integration enables centralized auditing, sign-in logs, and access reviews to maintain visibility and compliance across all connected SaaS applications.

By integrating SaaS applications with Microsoft Entra ID, organizations achieve a unified identity plane that simplifies access management, strengthens security posture, and enhances the user experience across cloud services.

User, Group, and App Role Assignment

In Microsoft Identity and Access Management, User, Group, and App Role Assignment are critical components for controlling access to applications and resources within Azure Active Directory (Azure AD).

**User Assignment** involves directly assigning individual users to specific application roles. When an application is registered in Azure AD, administrators can define app roles that represent different permission levels or functional responsibilities. Users are then assigned to these roles, granting them the corresponding access rights. This provides granular control over who can access what within an application.

**Group Assignment** simplifies access management by allowing administrators to assign entire Azure AD groups to application roles instead of individual users. When a group is assigned to an app role, all members of that group automatically inherit the associated permissions. This approach is highly scalable and reduces administrative overhead, especially in large organizations. Security groups, Microsoft 365 groups, and dynamic groups can all be leveraged for role assignments.

**App Role Assignment** refers to the broader mechanism of defining custom roles within an application's manifest and assigning them to users, groups, or even other service principals (workload identities). App roles are declared in the application registration and can be configured for users/groups, applications, or both. These roles appear as claims in tokens issued by Azure AD, enabling applications to make authorization decisions based on assigned roles.

In the context of **workload identities**, app role assignments are particularly important for service principals and managed identities. Administrators can assign app roles to workload identities to control service-to-service access, ensuring that applications and automated processes only have the permissions they need (principle of least privilege).

Key considerations include enabling the **User Assignment Required** property on enterprise applications to restrict access only to assigned users and groups, configuring role assignments through the Azure Portal, Microsoft Graph API, or PowerShell, and regularly reviewing assignments to maintain a strong security posture. These mechanisms collectively form the foundation of role-based access control (RBAC) for both human and workload identities in Azure AD.

User and Admin Consent Configuration

User and Admin Consent Configuration is a critical aspect of managing workload identities in Microsoft Entra ID (formerly Azure AD). It governs how applications gain access to organizational resources and data by defining the approval process for permissions requested by applications.

**User Consent** allows end users to grant permissions to applications on their own behalf. Administrators can configure user consent settings to control whether users can consent to apps independently. Options include: disabling user consent entirely, allowing consent only for apps from verified publishers with selected low-risk permissions, or allowing consent for all apps. Organizations can restrict user consent to minimize the risk of malicious applications gaining unauthorized access to data.

**Admin Consent** requires an administrator to approve permissions on behalf of the entire organization. This is essential for applications requesting high-privilege permissions, such as accessing all users' mailboxes or modifying directory data. Admin consent ensures that sensitive permissions are reviewed and approved by authorized personnel before being granted.

**Admin Consent Workflow** enables users to request admin approval when they encounter an application requiring permissions they cannot consent to themselves. Administrators can review, approve, or deny these requests through the Azure portal. This workflow balances security with usability by giving users a structured path to request access.

**Configuration Options** include:
- **Permission Classifications**: Administrators can classify permissions as low-risk, allowing users to consent to these without admin involvement.
- **Consent Policies**: Custom policies can be created to define specific conditions under which consent is permitted.
- **Verified Publishers**: Organizations can restrict user consent to applications from verified publishers only, reducing exposure to malicious apps.

Proper configuration of consent settings is fundamental to Zero Trust security principles, ensuring that applications receive only the minimum necessary permissions while maintaining productivity. Administrators should regularly review granted permissions and revoke unnecessary consents to maintain a strong security posture across all workload identities.

Application Collections Management

Application Collections Management in Microsoft Entra ID (formerly Azure AD) is a feature that enables administrators to organize, group, and manage enterprise applications into logical collections for improved governance, visibility, and streamlined access management of workload identities.

In the context of planning and implementing workload identities, Application Collections Management plays a critical role in maintaining order and control over the growing number of applications within an organization's identity ecosystem. As enterprises adopt more cloud services, SaaS applications, and custom-built solutions, managing these workload identities becomes increasingly complex.

Key aspects of Application Collections Management include:

1. **Logical Grouping**: Administrators can organize applications into meaningful collections based on business units, departments, functions, compliance requirements, or any other organizational criteria. This helps in quickly identifying and managing related applications.

2. **Simplified Governance**: By grouping applications into collections, administrators can apply governance policies more efficiently, conduct access reviews, and ensure compliance across related sets of applications rather than managing each one individually.

3. **Delegated Administration**: Collections allow for delegated management, where specific teams or administrators can be assigned responsibility for particular groups of applications, reducing the burden on central IT teams while maintaining oversight.

4. **Enhanced Visibility**: Collections provide a structured view of the application landscape, making it easier to audit, monitor, and report on application usage, permissions, and security posture across the organization.

5. **Lifecycle Management**: Managing application collections helps track the lifecycle of workload identities, including provisioning, updating permissions, rotating credentials, and decommissioning applications when no longer needed.

6. **Integration with My Apps Portal**: Application collections can be reflected in the My Apps portal, allowing end users to see organized groupings of applications relevant to their roles.

For identity and access administrators, effective Application Collections Management ensures that workload identities are properly categorized, governed, and secured throughout their lifecycle, supporting zero-trust principles and reducing the attack surface associated with unmanaged or orphaned application identities.

App Registration and Authentication Configuration

App Registration and Authentication Configuration are fundamental concepts in Microsoft Identity and Access Management, particularly when dealing with workload identities in Azure Active Directory (Azure AD).

**App Registration** is the process of registering an application in Azure AD to establish a trust relationship between the application and the Microsoft identity platform. When you register an app, you receive key identifiers: an Application (Client) ID, a Directory (Tenant) ID, and optionally, client credentials (secrets or certificates). App registrations define what permissions the application needs, what APIs it can access, and how it authenticates. Each registration creates both an Application Object (the global definition) and a Service Principal (the local instance in the tenant), which together form the workload identity.

During registration, administrators configure essential properties such as supported account types (single-tenant, multi-tenant, or personal accounts), redirect URIs, and API permissions (delegated or application-level). These settings determine how the application interacts with Azure AD-protected resources.

**Authentication Configuration** involves setting up how the registered application proves its identity. This includes configuring platform settings (web, SPA, mobile/desktop), redirect URIs for token delivery, implicit grant flows, and token types (ID tokens, access tokens). Administrators can configure client credentials using client secrets (shared secrets with expiration dates) or certificates (more secure, recommended for production). For enhanced security, federated identity credentials allow workloads running in external environments (like GitHub Actions or Kubernetes) to authenticate without managing secrets.

Additionally, authentication configuration encompasses setting token lifetime policies, configuring conditional access policies for workload identities, and enabling managed identities where applicable. Administrators must also consider least-privilege principles when assigning API permissions and ensure proper consent frameworks are in place.

Together, App Registration and Authentication Configuration form the backbone of securing workload identities, enabling applications, services, and automated processes to securely authenticate and access protected resources within the Microsoft ecosystem.

API Permissions and App Roles

API Permissions and App Roles are critical concepts in Microsoft Entra ID (formerly Azure AD) for managing workload identities and securing application access.

**API Permissions** define what resources and operations an application can access. There are two types:

1. **Delegated Permissions**: Used when a signed-in user is present. The application acts on behalf of the user, and the effective permissions are the intersection of the app's permissions and the user's privileges.

2. **Application Permissions**: Used when no signed-in user is present, such as background services or daemons. These permissions grant the app direct access to resources and typically require admin consent due to their broad scope.

Permissions follow the principle of least privilege, meaning applications should only request the minimum permissions necessary. Admin consent may be required for high-privilege permissions, while user consent can be configured for lower-risk ones. Common examples include Microsoft Graph API permissions like `User.Read`, `Mail.Send`, or `Directory.ReadWrite.All`.

**App Roles** are custom roles defined within an application registration that enable role-based access control (RBAC). They allow developers to restrict functionality within their applications based on assigned roles. App Roles can be assigned to:

- **Users and Groups**: For controlling user access to application features.
- **Applications**: For controlling service-to-service access, acting as application-level permissions for the API.

App Roles are defined in the application manifest and can be assigned through the Azure portal, PowerShell, or Microsoft Graph API. When a user or application authenticates, assigned roles appear in the token's `roles` claim, which the application can evaluate to enforce authorization decisions.

Together, API Permissions and App Roles provide a comprehensive authorization framework. API Permissions govern what external APIs an application can call, while App Roles control who can access the application's own resources and functionalities, ensuring secure and granular access management for workload identities.

Defender for Cloud Apps Configuration and Discovery

Defender for Cloud Apps Configuration and Discovery is a critical component in managing workload identities within Microsoft's identity and access management ecosystem. It serves as a Cloud Access Security Broker (CASB) that provides visibility, control, and protection for cloud applications and services used across an organization.

**Configuration** involves setting up Defender for Cloud Apps to monitor and govern cloud application usage. Administrators begin by connecting cloud apps through API connectors, enabling real-time monitoring of activities, files, and user accounts. Configuration includes defining policies for access control, session management, threat detection, and data loss prevention. Administrators can configure app connectors for Microsoft 365, Azure, AWS, Google Workspace, and other third-party applications. Conditional Access App Control can be configured to enforce real-time session policies, restricting actions like downloads or uploads based on risk conditions.

**Discovery** refers to the process of identifying and analyzing all cloud applications being used within an organization, including shadow IT. Cloud Discovery analyzes traffic logs collected from firewalls and proxies to catalog cloud apps, assess their risk levels, and provide detailed reports. This helps administrators understand which applications are sanctioned, unsanctioned, or need further review. Discovery can be set up through automatic log upload using log collectors, integration with Microsoft Defender for Endpoint, or manual log uploads.

In the context of workload identities, Defender for Cloud Apps helps monitor service principals, managed identities, and application behaviors across cloud environments. It detects anomalous activities such as unusual OAuth app behavior, suspicious application permissions, and compromised workload identities. Administrators can create policies specifically targeting app governance to detect malicious application activity and overprivileged applications.

Key benefits include comprehensive visibility into cloud app usage, risk assessment of discovered applications, real-time threat protection, governance actions to sanction or block applications, and integration with Microsoft Sentinel for advanced security analytics. This ensures organizations maintain robust security postures while managing workload identities effectively across multi-cloud environments.

Conditional Access App Control and Session Policies

Conditional Access App Control and Session Policies are critical components in Microsoft's identity and access management framework, particularly relevant when managing workload identities and securing cloud applications.

**Conditional Access App Control** is a feature within Microsoft Defender for Cloud Apps that acts as a reverse proxy, enabling real-time monitoring and control of user sessions when accessing cloud applications. It integrates with Azure AD Conditional Access policies to enforce granular access controls based on conditions such as user identity, device state, location, and risk level. When a Conditional Access policy routes a session through Defender for Cloud Apps, organizations gain visibility and control over data and activities within that session.

**Session Policies** define what happens during an active user session after access has been granted. These policies operate in real-time and allow administrators to:

1. **Monitor activities** - Track user actions within cloud apps for auditing and compliance purposes.
2. **Block downloads** - Prevent sensitive files from being downloaded to unmanaged or non-compliant devices.
3. **Protect on download** - Apply Azure Information Protection labels or encrypt files automatically when downloaded.
4. **Block uploads** - Prevent uploading of sensitive content based on DLP policies.
5. **Block custom activities** - Restrict specific application actions that pose security risks.

For workload identities specifically, these controls help secure service principals, managed identities, and application registrations that access organizational resources. Administrators can enforce policies ensuring that workload identities comply with security requirements before accessing sensitive data.

The implementation process involves configuring Azure AD Conditional Access policies to route sessions through Defender for Cloud Apps, selecting target applications (both catalog and custom apps), and then creating specific session policies within the Defender for Cloud Apps portal. This layered approach ensures that even after authentication, organizations maintain continuous control over how resources are accessed and data is handled, significantly reducing the risk of data exfiltration and unauthorized activities within cloud environments.

OAuth App Policies and Cloud App Catalog

OAuth App Policies and the Cloud App Catalog are critical components within Microsoft's identity and access management ecosystem, particularly when managing workload identities and securing cloud environments.

**Cloud App Catalog:**
The Cloud App Catalog in Microsoft Defender for Cloud Apps is a comprehensive repository containing over 31,000 cloud applications that are assessed and scored based on more than 90 risk factors. These factors include general security, compliance, legal considerations, and industry-specific benchmarks. The catalog helps administrators evaluate the risk posture of cloud applications being used within their organization, enabling informed decisions about which apps to sanction, unsanction, or monitor. Each app receives a risk score that reflects its trustworthiness, helping organizations maintain governance over shadow IT and third-party integrations.

**OAuth App Policies:**
OAuth App Policies allow administrators to govern and control OAuth applications that have been granted permissions within the organization's environment. When users consent to third-party OAuth apps, those apps receive tokens granting access to organizational data. OAuth App Policies help monitor and manage these permissions by enabling administrators to create policies that automatically detect and respond to potentially risky OAuth applications.

Key capabilities include:
- **Investigating OAuth apps** that have requested specific permissions
- **Setting automated alerts** when apps meet certain risk criteria (e.g., high permission levels, large number of authorized users, or low community usage)
- **Revoking or banning** apps that violate organizational security policies
- **Monitoring consent grants** to detect overprivileged or suspicious applications

Administrators can create app policies based on conditions such as permission level, authorization status, and community use. These policies can trigger alerts or automatic actions like revoking app access.

Together, OAuth App Policies and the Cloud App Catalog provide a layered defense strategy, enabling organizations to discover, assess, and govern third-party cloud applications while protecting workload identities and sensitive organizational resources from unauthorized or malicious access.

More Plan and Implement Workload Identities questions
675 questions (total)