Skip to main content

Microsoft Azure Approval/Consent Guidance

Guidance for enterprise teams to manage Caddi integration approval and consent configuration.

Updated this week

Azure Entra ID Permissions Configuration for Caddi

Quick Start Guide

This guide covers the essential permission configurations required for Caddi in Azure Entra ID at both the organization and application levels.

Organization-Level Permissions

Navigate to Entra ID → Enterprise Applications to configure the following:

1. Admin Consent Request Management

Path: Activity → Admin consent requests
Action: Configure approval workflow for application access requests across your Azure organization.

2. User Consent Settings

Path: Security → Consent and permissions → User consent settings
Action: Configure user consent controls.

⚠️ Important: If enforcing admin consent, do NOT select "Allow user consent for apps" - proceed to Admin consent settings instead.

3. Admin Consent Settings

Path: Security → Consent and permissions → Admin consent settings
Required Configuration:

  • Set "Users can request admin consent to apps they are unable to consent to" to Yes

  • Without this setting, users cannot access applications when admin consent is enforced

Additional Configuration:

  • Assign appropriate users/roles/groups as consent approvers (applies organization-wide)

  • App-specific approvers can be configured separately

4. Permission Classifications

Path: Security → Consent and permissions → Permission classifications
Action: Verify that required permissions are not classified as high-risk, which could block consent prompts.

Application-Specific Permissions (Caddi)

Navigate to Entra ID → Enterprise Applications → [Caddi Application] to configure:

1. Application Properties

Path: Manage → Properties
Required Settings:

  • "Enabled for users to sign-in": Yes

  • "Assignment required?": Configure based on organizational requirements

2. Self-Service Access

Path: Manage → Self-service
Required Settings:

  • "Allow users to request access to this application?": Yes

  • "To which group should assigned users be added?": Create and assign a dedicated Caddi group

  • "Require approval before granting access to this application?": If Yes, ensure approvers are configured

  • "Default Access role": Standard configuration is sufficient

3. Application Permissions

Path: Security → Permissions
Optional Action: Click "Grant admin consent for Caddi" to pre-approve permissions for all users

4. Access Reviews

Path: Activity → Access reviews
Action: Monitor and audit user access and permission levels

General Recommendations for Standard Organizations

For organizations with standard security requirements, the following configuration provides a good balance of security and user convenience:

Recommended Settings

  • User consent settings: Allow user consent for apps from verified publishers

  • Assignment required?: Set to No for easier user onboarding

  • Self-service access: Enable with automatic approval (no approvers required)

  • Admin consent: Pre-grant admin consent for Caddi to eliminate permission prompts

  • Dedicated group: Optional - only create if you need to track or manage Caddi users specifically

Benefits of This Approach

  • Users can access Caddi immediately without waiting for approvals

  • Reduces administrative overhead

  • Maintains reasonable security through verified publisher requirements

  • Simplifies the user experience

Recommendations for Organizations with Strict Permission Controls

Essential Configuration

  • Enable admin consent requests in admin consent settings - without this, users cannot request access when admin consent is enforced

  • Create a dedicated Caddi user group for simplified access management and clear visibility

  • Test the consent workflow early with an end-user to ensure smooth deployment

Simplifying Access Management

Access to the application and permission consent are separate processes. To streamline administration:

  • Pre-approve application permissions (grant admin consent)

  • Require approval only for application access (group membership)

  • This approach allows admins to focus solely on group membership management

Critical Warning

⚠️ Incorrect configuration combinations will prevent user access. Test thoroughly with a basic-permission test account or actual end-user before widespread deployment to avoid access issues during onboarding.

Did this answer your question?