Restrict Guest Access Permission in Azure Active Directory
Allowing Guest users to access the Azure Active Directory might be one of the compliance issues for the organization. Although, It’s great that the Guest users member of M365 Groups can access the resources like Plan, Sites, and Teams. When we talk about the Guest users, we always try to limit the access to these users. By default, Guest users do have Limited Access (i.e. Guest can se membership of all non-hidden groups) as of below:
|Permission level||Access level|
|Same as member users||Guests have the same access to Azure AD resources as member users|
|Limited access (default)||Guests can see membership of all non-hidden groups|
|Restricted access (new)||Guests can’t see membership of any groups|
So, there is a new feature on which we can Restrict Guest not to display membership of any groups. When guest access is restricted, guests can view only their own user profile. Permission to view other users isn’t allowed even if the guest is searching by User Principal Name or objectId. Restricted access also restricts guest users from seeing the membership of groups they’re in.
To configure this setting, you need to get login into your Azure Active Directory Admin Center.
Select Azure Active Directory ->External Identities.
Select External Collaboration Settings and select ‘Guest User access is restricted to properties and memberships of their own directory objects (most restrictive)‘.
Similarly, we can configure this using Cmdlet too. To make changes, we can simply follow below cmdlet.
We can see that the GuestUserRoleID is configured as 10dae51f-b6af-4016-8d66-8c2a99b929b3 Which says to Limited Access.
The value of the GuestUserRoleId property contains the identifier (GUID) for the chosen template policy. The values of the identifier are:
- a0b1b346-4d3e-4e8b-98f8-753987be4970: Same access as Tenant members
- 10dae51f-b6af-4016-8d66-8c2a99b929b3: Limited access (default)
- 2af84b1e-32c8-42b7-82bc-daa82404023b: Most Restrictive
If we need to change it to restricted access, we need to use below cmdlet.
Set-AzureADMSAuthorizationPolicy -Id authorizationPolicy -GuestUserRoleId '2af84b1e-32c8-42b7-82bc-daa82404023b'
I hope this will help you to make your Azure AD more secure.
[Solved]ERR_SPDY_INADEQUATE_TRANSPORT_SECURITY issue in OWA
[Fix] Windows 7 Black Screens for Some AMD/ATI GPUs
Configuring Teams Webinar to Everyone
Prashant is a Microsoft MVP for Office Servers and Services. He works as Technical Lead on Thakral One and a Microsoft Certified Trainer for Windows Server, Exchange Server and office 365.