Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Generative artificial intelligence (AI) services like Microsoft Security Copilot can bring value to your organization when used appropriately.
Apply Conditional Access policy to these generative AI services by following our recommendation to target all resources. These policies might include those for all users, risky users, sign-ins, device compliance, and users with insider risk.
Some organizations target these services directly by using the underlying service principals and custom security attributes in their Conditional Access policies:
- 43d7b169-1d9e-4d32-8cd8-06c5974ed90c - Security Copilot Agent Management
- bb5ffd56-39eb-458c-a53a-775ba21277da - Security Copilot Portal
- bb3d68c2-d09e-4455-94a0-e323996dbaa3 - Security Copilot API
- b0cf1501-8e0f-4fbb-b70a-52ca5ea7bda6 - Security Copilot Logic Apps Connector
In these cases, admins create, assign, and target these underlying service principals with custom security attributes.
Required roles
Custom security attributes are security sensitive and only delegated users can manage them. Assign one or more of the following roles to the user who manages or reports on these attributes.
Role name | Description |
---|---|
Attribute Assignment Administrator | Assign custom security attribute keys and values to supported Microsoft Entra objects. |
Attribute Assignment Reader | Read custom security attribute keys and values for supported Microsoft Entra objects. |
Attribute Definition Administrator | Define and manage the definition of custom security attributes. |
Attribute Definition Reader | Read the definition of custom security attributes. |
Assign the appropriate role to the users who manage or report on these attributes at the directory scope. For detailed steps, see Assign Microsoft Entra roles.
Important
By default, Global Administrator and other administrator roles do not have permissions to read, define, or assign custom security attributes.
Create custom security attributes
Follow the instructions in the article Add or deactivate custom security attributes in Microsoft Entra ID to add the following Attribute set and New attributes.
- Create an Attribute set named SecurityCopilotAttributeSet.
- Create New attributes named SecurityCopilotAttribute with Allow multiple values to be assigned set to No and Only allow predefined values to be assigned set to Yes. Add the following predefined value:
- MFARequired
Note
Conditional Access filters for applications only work with custom security attributes of type "string". Custom security attributes support creating the Boolean data type, but Conditional Access Policy only supports "string".
Assign custom security attributes to applications
- Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator and Attribute Assignment Administrator.
- Browse to Entra ID > Enterprise apps.
- Select the apps to apply a custom security attribute to:
- 43d7b169-1d9e-4d32-8cd8-06c5974ed90c - Security Copilot Agent Management
- bb5ffd56-39eb-458c-a53a-775ba21277da - Security Copilot Portal
- bb3d68c2-d09e-4455-94a0-e323996dbaa3 - Security Copilot API
- b0cf1501-8e0f-4fbb-b70a-52ca5ea7bda6 - Security Copilot Logic Apps Connector
- Under Manage > Custom security attributes, select Add assignment.
- Under Attribute set, select the attribute set you created.
- Under Attribute name, select the attribute you created.
- Under Assigned values, select Add values, choose the value you created from the list, then select Done.
- Select Save.
Targeting custom security attributes in Conditional Access policy
- Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator and Attribute Definition Reader.
- Browse to Entra ID > Conditional Access.
- Select New policy or select an existing policy to update.
- When configuring your Target resources, select the following options:
- Select what this policy applies to Cloud apps.
- Include Select resources.
- Select Edit filter.
- Set Configure to Yes.
- Select the Attribute you created.
- Set Operator to Contains.
- Set Value to one of your custom attributes.
- Select Done.
Which policy is causing issues?
It's sometimes hard for an admin to check which policy to update when there's an issue. Use the guidance in Troubleshooting sign-in problems with Conditional Access to check which policies apply, which policies don't apply, and run sign-in diagnostics to avoid ongoing issues.