You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/dev-box/dev-box-windows-365-announcement.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Effective November 1, 2025, the following changes will take place:
29
29
30
30
- The Microsoft Dev Box service stops accepting net new customers.
31
31
-*Net new customers* are defined as those with no prior Dev Box deployment in any form.
32
-
- As features are integrated into Windows 365 and made available publicly, Customers interested in continuing to leverage these capabilities should reach out to their Microsoft account team.
32
+
- As features are integrated into Windows 365 and become publicly available, customers interested in using them should contact their Microsoft account team.
33
33
- There's no immediate change to existing customers
34
34
- Customers who have run a POC, experimented, or begun configuring Dev Box are considered existing customers, and they can continue using and scaling their current Dev Box deployments.
35
35
- If you plan to start using or scaling Dev Boxes into additional tenants, submit a request through [Azure Support](https://go.microsoft.com/fwlink/p/?linkid=2202692&clcid=0x409) to get your new tenants allowlisted.
@@ -40,7 +40,8 @@ As new developer capabilities are released in Windows 365, Microsoft will provid
40
40
41
41
## Key Actions for Customers
42
42
43
-
-**No Immediate Action Required:** Continue using and scaling your Dev Box deployments as usual. Migration resources will be provided as new features roll out in Windows 365.
43
+
-**Existing customers:** Continue using the service as normal. No action is required. You can continue to use and scale your Dev Box deployments as usual. Migration resources will be provided as new features roll out in Windows 365.
44
+
-**New customers:** Starting November 1, 2025, Microsoft Dev Box no longer accepts new customers. If you previously evaluated or tested Dev Box and need to onboard after November 1, 2025, request an exception through [Name of form](https://aka.ms/link-to-form).
44
45
-**Stay Informed:** Monitor communications from Microsoft and your account team for updates.
45
46
-**Interested in Previewing New Features?** Express your interest to your Microsoft account team.
title: Configure Conditional Access Policies for Dev Tunnels
3
-
description: Learn how to configure conditional access policies for the Dev tunnels service in Microsoft Entra ID to secure remote development environments and restrict access based on device management and IP ranges.
2
+
title: Secure Dev Tunnel Access with Conditional Policies
3
+
description: Learn how to configure conditional access policies for the Dev Tunnels service in Microsoft Entra ID to secure remote development environments and restrict access based on device management and IP ranges.
4
4
author: RoseHJM
5
5
contributors:
6
6
ms.topic: how-to
7
-
ms.date: 05/19/2025
7
+
ms.date: 10/31/2025
8
8
ms.author: rosemalcolm
9
9
ms.reviewer: rosemalcolm
10
+
ai-usage: ai-assisted
11
+
ms.custom: peer-review-program
10
12
---
11
13
12
-
# Configure conditional access policies for Dev tunnels
14
+
# Secure Dev Tunnel access with conditional policies
13
15
14
-
Microsoft Dev Box gives you an alternative connectivity method on top of Dev tunnels. You can develop remotely while coding locally or keep development going during Azure Virtual Desktop (AVD) outages or poor network performance. Many large enterprises using Dev Box have strict security and compliance policies, and their code is valuable to their business. Restricting Dev tunnels with conditional access policies is crucial for these controls.
16
+
Dev Tunnels offer a streamlined way to connect to your Dev Box directly from Visual Studio Code, eliminating the need to use separate applications like Windows App or a browser. This method provides a more immediate and integrated development experience. Unlike traditional connection methods, Dev Tunnels simplify access and enhance productivity.
15
17
16
-
Conditional access policies for the Dev tunnels service:
18
+
Many large enterprises that use Dev Box have strict security and compliance policies, and their code is valuable to their business. This article explains how to configure conditional access policies to secure Dev Tunnel usage in your environment.
17
19
18
-
- Let Dev tunnels connect from managed devices, but deny connections from unmanaged devices.
19
-
- Let Dev tunnels connect from specific IP ranges, but deny connections from other IP ranges.
20
-
- Support other regular conditional access configurations.
21
-
- Apply to both the Visual Studio Code application and VS Code web.
22
-
23
-
## Configure conditional access
24
-
25
-
The conditional access policies work correctly for the Dev tunnels service. Because registering the Dev tunnels service app to a tenant and making it available to the conditional access picker is unique, this article documents the steps.
20
+
## Prerequisites
26
21
27
-
## Register Dev tunnels service to a tenant
22
+
Before proceeding, ensure you have:
28
23
29
-
According to [Application and service principal objects in Microsoft Entra ID](/entra/identity-platform/app-objects-and-service-principals?tabs=browser), a service principal is created in each tenant where an application is used. However, this doesn't apply to the Dev tunnels service. The Dev tunnels service is a Microsoft service, and the service principal is created in the Microsoft Entra ID tenant where the Dev tunnels service is registered. The Dev tunnels service app isn't registered to your tenant by default, so you need to register it manually.
24
+
- Access to a Dev Box environment.
25
+
- Visual Studio Code installed.
26
+
- PowerShell 7.x or later (any version in the 7.x series is acceptable).
27
+
- Appropriate permissions to configure conditional access policies in Microsoft Entra ID.
30
28
31
-
Therefore, we're using [Microsoft.Graph PowerShell](/powershell/module/microsoft.graph.authentication/connect-mggraph?view=graph-powershell-1.0&preserve-view=true) to register the app to a tenant.
29
+
## Benefits of conditional access for Dev Tunnels
32
30
33
-
1. Install PowerShell 7.x
31
+
Conditional access policies for the Dev Tunnels service:
34
32
35
-
1. Follow [Install the Microsoft Graph PowerShell SDK | Microsoft Learn](/powershell/microsoftgraph/installation?view=graph-powershell-1.0&preserve-view=true) to install Microsoft.Graph PowerShell.
33
+
- Let Dev Tunnels connect from managed devices, but deny connections from unmanaged devices.
34
+
- Let Dev Tunnels connect from specific IP ranges, but deny connections from other IP ranges.
35
+
- Support other regular conditional access configurations.
36
+
- Apply to both the Visual Studio Code application and VS Code web.
> This article focuses on setting up conditional access policies specifically for Dev Tunnels. If you're configuring policies for Dev Box more broadly, see [Configure conditional access for Dev Box](how-to-configure-intune-conditional-access-policies.md).
46
40
47
-
1. Go to "Microsoft Entra ID" -> "Manage" -> "Enterprise applications" to verify if the Dev tunnels service is registered.
41
+
## Configure conditional access policies
48
42
49
-
:::image type="content" source="media/how-to-conditional-access-dev-tunnels-service/dev-tunnels-register-service.png" alt-text="Screenshot of the Enterprise applications page in Microsoft Entra ID, showing the Dev tunnels service registration." lightbox="media/how-to-conditional-access-dev-tunnels-service/dev-tunnels-register-service.png":::
43
+
To secure Dev Tunnels with conditionalaccess, you need to target the Dev Tunnels service using custom security attributes. This section guides you through the process of configuring these attributes and creating the appropriate conditionalaccess policy.
50
44
51
-
## Enable the Dev tunnels service for the conditional access picker
45
+
## Enable the Dev Tunnels service for the conditional access picker
52
46
53
-
The Microsoft Entra IDteam is working on removing the need to onboard apps for them to appear in the app picker, with delivery expected in May. Therefore, we aren't onboarding Dev tunnel service to the conditional access picker. Instead, target the Dev tunnels service in a conditional access policy using [Custom Security Attributes](/entra/identity/conditional-access/concept-filter-for-applications).
47
+
The Microsoft Entra ID team is working on removing the need to onboard apps for them to appear in the app picker, with delivery expected in May. Therefore, we aren't onboarding Dev tunnel service to the conditional access picker. Instead, target the Dev tunnels service in a conditional access policy using [Custom Security Attributes](/entra/identity/conditional-access/concept-filter-for-applications).
54
48
55
49
1. Follow [Add or deactivate custom security attribute definitions in Microsoft Entra ID](/entra/fundamentals/custom-security-attributes-add?tabs=ms-powershell) to add the following Attribute set and New attributes.
56
50
@@ -68,21 +62,22 @@ The Microsoft Entra IDteam is working on removing the need to onboard apps for t
68
62
69
63
## Testing
70
64
71
-
1. Turn off the BlockDevTunnelCA
65
+
1. Turn off the BlockDevTunnelCA policy.
72
66
73
-
1. Create a DevBox in the test tenant and run the following commands inside it. Dev tunnels can be created and connected externally.
74
-
```
75
-
code tunnel user login --provider microsoft
76
-
code tunnel
77
-
```
67
+
1. Create a Dev Box in the test tenant and run the following commands inside it. You can create and connect to Dev Tunnels externally.
78
68
79
-
1. Enable the BlockDevTunnelCA.
69
+
```powershell
70
+
code tunnel user login --provider microsoft
71
+
code tunnel
72
+
```
80
73
81
-
1. New connections to the existing Dev tunnels can't be established. Test with an alternate browser if a connection has already been established.
74
+
1.Turn on the BlockDevTunnelCA policy.
82
75
83
-
1. Any new attempts to execute the commands in step #2 will fail. Both errors are:
76
+
1.You can't establish new connections to the existing Dev Tunnels. If a connection is already established, test with an alternate browser.
84
77
85
-
:::image type="content" source="media/how-to-conditional-access-dev-tunnels-service/dev-tunnels-no-access.png" alt-text="Screenshot of error message when Dev tunnels connection is blocked by conditional access policy." lightbox="media/how-to-conditional-access-dev-tunnels-service/dev-tunnels-no-access.png":::
78
+
1. Any new attempts to execute the commands in step 2 fail. Both errors are:
79
+
80
+
:::image type="content" source="media/how-to-conditional-access-dev-tunnels-service/dev-tunnels-no-access.png" alt-text="Screenshot of error message when Dev tunnels connection is blocked by conditional access policy." lightbox="media/how-to-conditional-access-dev-tunnels-service/dev-tunnels-no-access.png":::
86
81
87
82
1. The Microsoft Entra ID sign-in logs show these entries.
88
83
@@ -91,8 +86,11 @@ code tunnel
91
86
## Limitations
92
87
93
88
With Dev Tunnels, the following limitations apply:
94
-
- You can't configure conditional access policies for Dev Box service to manage Dev tunnels for Dev Box users.
95
-
- You can't limit Dev tunnels that aren't managed by the Dev Box service. In the context of Dev Boxes, if the Dev tunnels GPO is configured **to allow only selected Microsoft Entra tenant IDs**, Conditional Access policies can also restrict self-created Dev tunnels.
89
+
90
+
-**Policy assignment restrictions**: You can't configure conditional access policies for the Dev Box service to manage Dev Tunnels for Dev Box users. Instead, configure policies at the Dev Tunnels service level as described in this article.
91
+
-**Self-created Dev Tunnels**: You can't limit Dev Tunnels that aren't managed by the Dev Box service. In the context of Dev Boxes, if the Dev Tunnels GPO is configured **to allow only selected Microsoft Entra tenant IDs**, conditional access policies can also restrict self-created Dev Tunnels.
92
+
-**IP range enforcement**: Dev Tunnels might not support granular IP restrictions. Consider using network-level controls or consult your security team for alternative enforcement strategies.
96
93
97
94
## Related content
95
+
-[Open a dev box in VS Code](how-to-set-up-dev-tunnels.md)
> Windows 365 will soon integrate Microsoft Dev Box features. For more information, see [Microsoft Dev Box capabilities are coming to Windows 365](../dev-box-windows-365-announcement.md).
10
+
> **Microsoft Dev Box capabilities are coming to Windows 365**
11
+
>
12
+
> Starting November 1, 2025, Microsoft Dev Box no longer accepts new customers as we integrate Dev Box capabilities into Windows 365.
13
+
>
14
+
> -**Existing customers:** Continue using the service as normal. No action is required.
15
+
> -**New customers:** If you previously evaluated or tested Dev Box and need to onboard after November 1, 2025, reach out to your Microsoft account team.
16
+
>
17
+
> For more information, see [Microsoft Dev Box capabilities are coming to Windows 365](../dev-box-windows-365-announcement.md).
0 commit comments