Terms of use in Azure Active Directory - Microsoft Entra (2023)

  • Article
  • 18 minutes to read

Azure AD terms of use policies provide a simple method that organizations can use to present information to end users. This presentation ensures users see relevant disclaimers for legal or compliance requirements. This article describes how to get started with terms of use (ToU) policies.

Note

This article provides steps about how to delete personal data from the device or service and can be used to support your obligations under the GDPR. For general information about GDPR, see the GDPR section of the Microsoft Trust Center and the GDPR section of the Service Trust portal.

Overview videos

The following video provides a quick overview of ToU policies.

For more videos, see:

What can I do with terms of use?

Azure AD terms of use policies have the following capabilities:

  • Require employees or guests to accept your terms of use policy before getting access.
  • Require employees or guests to accept your terms of use policy on every device before getting access.
  • Require employees or guests to accept your terms of use policy on a recurring schedule.
  • Require employees or guests to accept your terms of use policy before registering security information in Azure AD Multi-Factor Authentication (MFA).
  • Require employees to accept your terms of use policy before registering security information in Azure AD self-service password reset (SSPR).
  • Present a general terms of use policy for all users in your organization.
  • Present specific terms of use policies based on a user attributes (such as doctors versus nurses, or domestic versus international employees) by using dynamic groups).
  • Present specific terms of use policies when accessing high business impact applications, like Salesforce.
  • Present terms of use policies in different languages.
  • List who has or hasn't accepted to your terms of use policies.
  • Help meeting privacy regulations.
  • Display a log of terms of use policy activity for compliance and audit.
  • Create and manage terms of use policies using Microsoft Graph APIs.

Prerequisites

To use and configure Azure AD terms of use policies, you must have:

  • Azure AD Premium P1, P2, EMS E3, or EMS E5 licenses.
    • If you don't have one of these subscriptions, you can get Azure AD Premium or enable Azure AD Premium trial.
  • One of the following administrator accounts for the directory you want to configure:
    • Global Administrator
    • Security Administrator
    • Conditional Access Administrator

Terms of use document

Azure AD terms of use policies use the PDF format to present content. The PDF file can be any content, such as existing contract documents, allowing you to collect end-user agreements during user sign-in. To support users on mobile devices, the recommended font size in the PDF is 24 point.

Add terms of use

Once you've completed your terms of use policy document, use the following procedure to add it.

  1. Sign in to the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.

  2. Browse to Azure Active Directory > Security > Conditional Access > Terms of use.

  3. Select, New terms.

    Terms of use in Azure Active Directory - Microsoft Entra (1)

  4. In the Name box, enter a name for the terms of use policy that will be used in the Azure portal.

  5. For Terms of use document, browse to your finalized terms of use policy PDF and select it.

  6. Select the language for your terms of use policy document. The language option allows you to upload multiple terms of use policies, each with a different language. The version of the terms of use policy that an end user will see will be based on their browser preferences.

  7. In the Display name box, enter a title that users see when they sign in.

  8. To require end users to view the terms of use policy before accepting them, set Require users to expand the terms of use to On.

  9. To require end users to accept your terms of use policy on every device they're accessing from, set Require users to consent on every device to On. Users may be required to install other applications if this option is enabled. For more information, see Per-device terms of use.

  10. If you want to expire terms of use policy consents on a schedule, set Expire consents to On. When set to On, two more schedule settings are displayed.

    Terms of use in Azure Active Directory - Microsoft Entra (2)

  11. Use the Expire starting on and Frequency settings to specify the schedule for terms of use policy expirations. The following table shows the result for a couple of example settings:

    Expire starting onFrequencyResult
    Today's dateMonthlyStarting today, users must accept the terms of use policy and then reaccept every month.
    Date in the futureMonthlyStarting today, users must accept the terms of use policy. When the future date occurs, consents will expire, and then users must reaccept every month.

    For example, if you set the expire starting on date to Jan 1 and frequency to Monthly, this is how expirations might occur for two users:

    UserFirst accept dateFirst expire dateSecond expire dateThird expire date
    AliceJan 1Feb 1Mar 1Apr 1
    BobJan 15Feb 1Mar 1Apr 1
  12. Use the Duration before re-acceptance required (days) setting to specify the number of days before the user must reaccept the terms of use policy. This allows users to follow their own schedule. For example, if you set the duration to 30 days, this is how expirations might occur for two users:

    UserFirst accept dateFirst expire dateSecond expire dateThird expire date
    AliceJan 1Jan 31Mar 2Apr 1
    BobJan 15Feb 14Mar 16Apr 15

    It's possible to use the Expire consents and Duration before re-acceptance required (days) settings together, but typically you use one or the other.

  13. Under Conditional Access, use the Enforce with Conditional Access policy template list to select the template to enforce the terms of use policy.

    TemplateDescription
    Custom policySelect the users, groups, and apps that this terms of use policy will be applied to.
    Create Conditional Access policy laterThis terms of use policy will appear in the grant control list when creating a Conditional Access policy.

    Important

    Conditional Access policy controls (including terms of use policies) do not support enforcement on service accounts. We recommend excluding all service accounts from the Conditional Access policy.

    Custom Conditional Access policies enable granular terms of use policies, down to a specific cloud application or group of users. For more information, see Quickstart: Require terms of use to be accepted before accessing cloud apps.

  14. Select Create.

    If you selected a custom Conditional Access template, then a new screen appears that allows you to create the custom Conditional Access policy.

    Terms of use in Azure Active Directory - Microsoft Entra (3)

    You should now see your new terms of use policies.

View report of who has accepted and declined

The Terms of use blade shows a count of the users who have accepted and declined. These counts and who accepted/declined are stored for the life of the terms of use policy.

  1. Sign in to Azure and navigate to Terms of use at https://aka.ms/catou.

    Terms of use in Azure Active Directory - Microsoft Entra (4)

  2. For a terms of use policy, select the numbers under Accepted or Declined to view the current state for users.

    Terms of use in Azure Active Directory - Microsoft Entra (5)

  3. To view the history for an individual user, select the ellipsis (...) and then View History.

    Terms of use in Azure Active Directory - Microsoft Entra (6)

    In the view history pane, you see a history of all the accepts, declines, and expirations.

    Terms of use in Azure Active Directory - Microsoft Entra (7)

View Azure AD audit logs

If you want to view more activity, Azure AD terms of use policies include audit logs. Each user consent triggers an event in the audit logs that is stored for 30 days. You can view these logs in the portal or download as a .csv file.

To get started with Azure AD audit logs, use the following procedure:

  1. Sign in to the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.

  2. Browse to Azure Active Directory > Security > Conditional Access > Terms of use.

  3. Select a terms of use policy.

  4. Select View audit logs.

  5. On the Azure AD audit logs screen, you can filter the information using the provided lists to target specific audit log information.

    You can also select Download to download the information in a .csv file for use locally.

    Terms of use in Azure Active Directory - Microsoft Entra (8)

    If you select a log, a pane appears with more activity details.

    Terms of use in Azure Active Directory - Microsoft Entra (9)

What terms of use looks like for users

Once a ToU policy is created and enforced, users, who are in scope, will see the following screen during sign-in.

Terms of use in Azure Active Directory - Microsoft Entra (10)

Users can view the terms of use policy and, if necessary, use buttons to zoom in and out.

Terms of use in Azure Active Directory - Microsoft Entra (11)

The following screen shows how a ToU policy looks on mobile devices.

Terms of use in Azure Active Directory - Microsoft Entra (12)

Users are only required to accept the terms of use policy once, and they won't see the terms of use policy again on later sign-ins.

How users can review their terms of use

Users can review and see the terms of use policies that they've accepted by using the following procedure.

  1. Sign in to https://myaccount.microsoft.com/.
  2. Select Settings & Privacy.
  3. Select Privacy.
  4. Under Organization's notice, select View next to the terms of use statement you want to review.

Edit terms of use details

You can edit some details of terms of use policies, but you can't modify an existing document. The following procedure describes how to edit the details.

  1. Sign in to the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.

  2. Browse to Azure Active Directory > Security > Conditional Access > Terms of use.

  3. Select the terms of use policy you want to edit.

  4. Select Edit terms.

  5. In the Edit terms of use pane, you can change the following options:

    • Name – the internal name of the ToU that isn't shared with end users
    • Display name – the name that end users can see when viewing the ToU
    • Require users to expand the terms of use – Setting this option to On will force the end user to expand the terms of use policy document before accepting it.
    • (Preview) You can update an existing terms of use document
    • You can add a language to an existing ToU

    If there are other settings you would like to change, such as PDF document, require users to consent on every device, expire consents, duration before reacceptance, or Conditional Access policy, you must create a new ToU policy.

    Terms of use in Azure Active Directory - Microsoft Entra (13)

  6. Once you're done, select Save to save your changes.

Update the version or pdf of an existing terms of use

  1. Sign in to the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.

  2. Browse to Azure Active Directory > Security > Conditional Access > Terms of use.

  3. Select the terms of use policy you want to edit.

  4. Select Edit terms.

  5. For the language that you would like to update a new version, select Update under the action column

    Terms of use in Azure Active Directory - Microsoft Entra (14)

  6. In the pane on the right, upload the pdf for the new version

  7. There's also a toggle option here Require reaccept if you want to require your users to accept this new version the next time they sign in. If you require your users to reaccept, next time they try to access the resource defined in your conditional access policy they'll be prompted to accept this new version. If you don’t require your users to reaccept, their previous consent will stay current and only new users who haven't consented before or whose consent expires will see the new version. Until the session expires, Require reaccept not require users to accept the new TOU. If you want to ensure reaccept, delete and recreate or create a new TOU for this case.

    Terms of use in Azure Active Directory - Microsoft Entra (15)

  8. Once you've uploaded your new pdf and decided on reaccept, select Add at the bottom of the pane.

  9. You'll now see the most recent version under the Document column.

View previous versions of a ToU

  1. Sign in to the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.

  2. Browse to Azure Active Directory > Security > Conditional Access > Terms of use.

  3. Select the terms of use policy for which you want to view a version history.

  4. Select Languages and version history

  5. Select See previous versions.

    Terms of use in Azure Active Directory - Microsoft Entra (16)

  6. You can select the name of the document to download that version

See who has accepted each version

  1. Sign in to the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.
  2. Browse to Azure Active Directory > Security > Conditional Access > Terms of use.
  3. To see who has currently accepted the ToU, select the number under the Accepted column for the ToU you want.
  4. By default, the next page will show you the current state of each user's acceptance to the ToU
  5. If you would like to see the previous consent events, you can select All from the Current State drop-down. Now you can see each user's events in details about each version and what happened.
  6. Alternatively, you can select a specific version from the Version drop-down to see who has accepted that specific version.

Add a ToU language

The following procedure describes how to add a ToU language.

  1. Sign in to the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.

  2. Browse to Azure Active Directory > Security > Conditional Access > Terms of use.

  3. Select the terms of use policy you want to edit.

  4. Select Edit Terms

  5. Select Add language at the bottom of the page.

  6. In the Add terms of use language pane, upload your localized PDF, and select the language.

    Terms of use in Azure Active Directory - Microsoft Entra (17)

  7. Select Add language.

  8. Select Save

  9. Select Add to add the language.

Per-device terms of use

The Require users to consent on every device setting enables you to require end users to accept your terms of use policy on every device they're accessing from. The end user will be required to register their device in Azure AD. When the device is registered, the device ID is used to enforce the terms of use policy on each device.

Supported platforms and software.

iOSAndroidWindows 10Other
Native appYesYesYes
Microsoft EdgeYesYesYes
Internet ExplorerYesYesYes
Chrome (with extension)YesYesYes

Per-device terms of use has the following constraints:

  • A device can only be joined to one tenant.
  • A user must have permissions to join their device.
  • The Intune Enrollment app isn't supported. Ensure that it's excluded from any Conditional Access policy requiring Terms of Use policy.
  • Azure AD B2B users aren't supported.

If the user's device isn't joined, they'll receive a message that they need to join their device. Their experience will be dependent on the platform and software.

Join a Windows 10 device

If a user is using Windows 10 and Microsoft Edge, they receive a message similar to the following to join their device.

Terms of use in Azure Active Directory - Microsoft Entra (18)

If they're using Chrome, they'll be prompted to install the Windows 10 Accounts extension.

Register an iOS device

If a user is using an iOS device, they'll be prompted to install the Microsoft Authenticator app.

Register an Android device

If a user is using an Android device, they'll be prompted to install the Microsoft Authenticator app.

Browsers

If a user is using browser that isn't supported, they'll be asked to use a different browser.

Terms of use in Azure Active Directory - Microsoft Entra (19)

Delete terms of use

You can delete old terms of use policies using the following procedure.

  1. Sign in to the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.

  2. Browse to Azure Active Directory > Security > Conditional Access > Terms of use.

  3. Select the terms of use policy you want to remove.

  4. Select Delete terms.

  5. In the message that appears asking if you want to continue, select Yes.

    Terms of use in Azure Active Directory - Microsoft Entra (20)

    You should no longer see your terms of use policy.

User acceptance record deletion

User acceptance records are deleted:

  • When the admin explicitly deletes the ToU. When this change happens, all the acceptance records associated with that specific ToU are also deleted.
  • When the tenant loses its Azure Active Directory Premium license.
  • When the tenant is deleted.

Policy changes

Conditional Access policies take effect immediately. When this happens, the administrator will start to see “sad clouds” or "Azure AD token issues". The administrator must sign out and sign in to satisfy the new policy.

Important

Users in scope will need to sign-out and sign-in in order to satisfy a new policy if:

  • a Conditional Access policy is enabled on a terms of use policy
  • or a second terms of use policy is created

B2B guests

Most organizations have a process in place for their employees to consent to their organization's terms of use policy and privacy statements. But how can you enforce the same consents for Azure AD business-to-business (B2B) guests when they're added via SharePoint or Teams? Using Conditional Access and terms of use policies, you can enforce a policy directly towards B2B guest users. During the invitation redemption flow, the user is presented with the terms of use policy.

Terms of use policies will only be displayed when the user has a guest account in Azure AD. SharePoint Online currently has an ad hoc external sharing recipient experience to share a document or a folder that doesn't require the user to have a guest account. In this case, a terms of use policy isn't displayed.

Terms of use in Azure Active Directory - Microsoft Entra (21)

Support for cloud apps

Terms of use policies can be used for different cloud apps, such as Azure Information Protection and Microsoft Intune. This support is currently in preview.

Azure Information Protection

You can configure a Conditional Access policy for the Azure Information Protection app and require a terms of use policy when a user accesses a protected document. This configuration will trigger a terms of use policy before a user accessing a protected document for the first time.

Terms of use in Azure Active Directory - Microsoft Entra (22)

Microsoft Intune Enrollment

You can configure a Conditional Access policy for the Microsoft Intune Enrollment app and require a terms of use policy before enrollment of a device in Intune. For more information, see the Read Choosing the right Terms solution for your organization blog post.

Terms of use in Azure Active Directory - Microsoft Entra (23)

Note

The Intune Enrollment app is not supported for Per-device terms of use.

Frequently asked questions

Q: I cannot sign in using PowerShell when terms of use is enabled.
A: Terms of use can only be accepted when authenticating interactively.

Q: How do I see when/if a user has accepted a terms of use?
A: On the Terms of use blade, select the number under Accepted. You can also view or search the accept activity in the Azure AD audit logs. For more information, see View report of who has accepted and declined and View Azure AD audit logs.

Q: How long is information stored?
A: The user counts in the terms of use report and who accepted/declined are stored for the life of the terms of use. The Azure AD audit logs are stored for 30 days.

Q: Why do I see a different number of consents in the terms of use details overview versus the Azure AD audit logs?
A: The terms of use details overview data is stored for the lifetime of that terms of use policy, while the Azure AD audit logs are stored for 30 days.

Q: Why do I see a different number of consents in the terms of use details overview versus the exported CSV report?
A: The terms of use details overview reflects aggregated acceptances of the current version of the policy (updated once every day). If expiration is enabled or a TOU agreement is updated (with re-acceptance required), the count on the details overview is reset since the acceptances are expired, thereby showing the count of the current version. All acceptance history is still captured in the CSV report.

Q: If hyperlinks are in the terms of use policy PDF document, will end users be able to click them?
A: Yes, end users are able to select hyperlinks to other pages but links to sections within the document aren't supported. Also, hyperlinks in terms of use policy PDFs don't work when accessed from the Azure AD MyApps/MyAccount portal.

Q: Can a terms of use policy support multiple languages?
A: Yes. Currently there are 108 different languages an administrator can configure for a single terms of use policy. An administrator can upload multiple PDF documents and tag those documents with a corresponding language (up to 108). When end users sign in, we look at their browser language preference and display the matching document. If there's no match, we display the default document, which is the first document that is uploaded.

Q: When is the terms of use policy triggered?
A: The terms of use policy is triggered during the sign-in experience.

Q: What applications can I target a terms of use policy to?
A: You can create a Conditional Access policy on the enterprise applications using modern authentication. For more information, see enterprise applications.

Q: Can I add multiple terms of use policies to a given user or app?
A: Yes, by creating multiple Conditional Access policies targeting those groups or applications. If a user falls in scope of multiple terms of use policies, they accept one terms of use policy at a time.

Q: What happens if a user declines the terms of use policy?
A: The user is blocked from getting access to the application. The user would have to sign in again and accept the terms to get access.

Q: Is it possible to unaccept a terms of use policy that was previously accepted?
A: You can review previously accepted terms of use policies, but currently there isn't a way to unaccept.

Q: What happens if I'm also using Intune terms and conditions?
A: If you've configured both Azure AD terms of use and Intune terms and conditions, the user will be required to accept both. For more information, see the Choosing the right Terms solution for your organization blog post.

Q: What endpoints does the terms of use service use for authentication?
A: Terms of use utilize the following endpoints for authentication: https://tokenprovider.termsofuse.identitygovernance.azure.com, https://myaccount.microsoft.com and https://account.activedirectory.windowsazure.com. If your organization has an allowlist of URLs for enrollment, you'll need to add these endpoints to your allowlist, along with the Azure AD endpoints for sign-in.

Next steps

  • Quickstart: Require terms of use to be accepted before accessing cloud apps
Top Articles
Latest Posts
Article information

Author: Manual Maggio

Last Updated: 12/25/2022

Views: 6106

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.