Edit

Share via


Conditional Access policy for Azure Container Registry

Azure Container Registry (ACR) gives you the option to create and configure Microsoft Entra Conditional Access policies to enforce strong authentication and access controls.

The Conditional Access policy is designed to enforce strong authentication. The policy helps your organization meet compliance requirements and keeps data and user accounts safe.

Conditional access policies apply after a user authenticates to the Azure Container Registry. You can configure options to block or grant access based on your policy decisions.

Azure Container Registry supports Conditional Access policy for Microsoft Entra user accounts only. Conditional Access policy for service principal accounts isn't currently supported.

Important

To configure Conditional Access policy for the registry, first configure all registries in your tenant to accept only ACR-scoped Microsoft Entra authentication for all the registries within the desired tenant.

This article shows you how to create and configure a Conditional Access policy for Azure Container Registry, and how to troubleshoot common issues.

Prerequisites

Create and configure a Conditional Access policy

Create a Conditional Access policy and assign your test group of users as follows:

  1. Sign in to the Azure portal with an account that has the Conditional Access Administrator role.

  2. Search for and select Microsoft Entra ID.

  3. In the service menu, under Manage, select Security.

  4. Select Conditional Access, select + New policy, and then select Create new policy.

  5. Enter a name for the policy, such as demo.

  6. Under What does this policy apply to?, select Users and groups.

  7. Under Include, choose Select users and groups, and then select All users.

    A screenshot of the page for creating a new policy, where you select options to specify users.

  8. Under Exclude, choose Select users and groups, then make any selections for users or groups to exclude from the policy.

  9. Under Cloud apps or actions, choose Cloud apps.

  10. Under Include, choose Select apps.

    A screenshot of the page for creating a new policy, where you select options to specify cloud apps.

  11. Select Azure Container Registry, then choose Select.

  12. Under Conditions, set the conditions that you want to apply.

  13. Under Access controls, select Grant. Select Grant access with Require multifactor authentication, then choose Select.

    Tip

    For details about how to configure and grant multifactor authentication, see Configure the conditions for multifactor authentication.

  14. Under Session, optionally choose options to enable any control on session level experience of the cloud apps.

  15. Set Enable policy to On, then select Create

You have now created a Conditional Access policy for your Azure Container Registry.

Troubleshoot Conditional Access policy problems

For problems with Conditional Access sign-in, see Troubleshoot Conditional Access sign-in.

For problems with Conditional Access policy, see Troubleshoot Conditional Access policy.

Next steps