Skip to content

Commit 98573e4

Browse files
Merge pull request #307655 from MicrosoftDocs/main
Auto Publish – main to live - 2025-11-01 11:00 UTC
2 parents f404e05 + e172f00 commit 98573e4

5 files changed

Lines changed: 92 additions & 85 deletions

File tree

articles/dev-box/dev-box-windows-365-announcement.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Effective November 1, 2025, the following changes will take place:
2929

3030
- The Microsoft Dev Box service stops accepting net new customers.
3131
- *Net new customers* are defined as those with no prior Dev Box deployment in any form.
32-
- As features are integrated into Windows 365 and made available publicly, Customers interested in continuing to leverage these capabilities should reach out to their Microsoft account team.
32+
- As features are integrated into Windows 365 and become publicly available, customers interested in using them should contact their Microsoft account team.
3333
- There's no immediate change to existing customers
3434
- Customers who have run a POC, experimented, or begun configuring Dev Box are considered existing customers, and they can continue using and scaling their current Dev Box deployments.
3535
- If you plan to start using or scaling Dev Boxes into additional tenants, submit a request through [Azure Support](https://go.microsoft.com/fwlink/p/?linkid=2202692&clcid=0x409) to get your new tenants allowlisted.
@@ -40,7 +40,8 @@ As new developer capabilities are released in Windows 365, Microsoft will provid
4040

4141
## Key Actions for Customers
4242

43-
- **No Immediate Action Required:** Continue using and scaling your Dev Box deployments as usual. Migration resources will be provided as new features roll out in Windows 365.
43+
- **Existing customers:** Continue using the service as normal. No action is required. You can continue to use and scale your Dev Box deployments as usual. Migration resources will be provided as new features roll out in Windows 365.
44+
- **New customers:** Starting November 1, 2025, Microsoft Dev Box no longer accepts new customers. If you previously evaluated or tested Dev Box and need to onboard after November 1, 2025, request an exception through [Name of form](https://aka.ms/link-to-form).
4445
- **Stay Informed:** Monitor communications from Microsoft and your account team for updates.
4546
- **Interested in Previewing New Features?** Express your interest to your Microsoft account team.
4647

Lines changed: 42 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -1,56 +1,50 @@
11
---
2-
title: Configure Conditional Access Policies for Dev Tunnels
3-
description: Learn how to configure conditional access policies for the Dev tunnels service in Microsoft Entra ID to secure remote development environments and restrict access based on device management and IP ranges.
2+
title: Secure Dev Tunnel Access with Conditional Policies
3+
description: Learn how to configure conditional access policies for the Dev Tunnels service in Microsoft Entra ID to secure remote development environments and restrict access based on device management and IP ranges.
44
author: RoseHJM
55
contributors:
66
ms.topic: how-to
7-
ms.date: 05/19/2025
7+
ms.date: 10/31/2025
88
ms.author: rosemalcolm
99
ms.reviewer: rosemalcolm
10+
ai-usage: ai-assisted
11+
ms.custom: peer-review-program
1012
---
1113

12-
# Configure conditional access policies for Dev tunnels
14+
# Secure Dev Tunnel access with conditional policies
1315

14-
Microsoft Dev Box gives you an alternative connectivity method on top of Dev tunnels. You can develop remotely while coding locally or keep development going during Azure Virtual Desktop (AVD) outages or poor network performance. Many large enterprises using Dev Box have strict security and compliance policies, and their code is valuable to their business. Restricting Dev tunnels with conditional access policies is crucial for these controls.
16+
Dev Tunnels offer a streamlined way to connect to your Dev Box directly from Visual Studio Code, eliminating the need to use separate applications like Windows App or a browser. This method provides a more immediate and integrated development experience. Unlike traditional connection methods, Dev Tunnels simplify access and enhance productivity.
1517

16-
Conditional access policies for the Dev tunnels service:
18+
Many large enterprises that use Dev Box have strict security and compliance policies, and their code is valuable to their business. This article explains how to configure conditional access policies to secure Dev Tunnel usage in your environment.
1719

18-
- Let Dev tunnels connect from managed devices, but deny connections from unmanaged devices.
19-
- Let Dev tunnels connect from specific IP ranges, but deny connections from other IP ranges.
20-
- Support other regular conditional access configurations.
21-
- Apply to both the Visual Studio Code application and VS Code web.
22-
23-
## Configure conditional access
24-
25-
The conditional access policies work correctly for the Dev tunnels service. Because registering the Dev tunnels service app to a tenant and making it available to the conditional access picker is unique, this article documents the steps.
20+
## Prerequisites
2621

27-
## Register Dev tunnels service to a tenant
22+
Before proceeding, ensure you have:
2823

29-
According to [Application and service principal objects in Microsoft Entra ID](/entra/identity-platform/app-objects-and-service-principals?tabs=browser), a service principal is created in each tenant where an application is used. However, this doesn't apply to the Dev tunnels service. The Dev tunnels service is a Microsoft service, and the service principal is created in the Microsoft Entra ID tenant where the Dev tunnels service is registered. The Dev tunnels service app isn't registered to your tenant by default, so you need to register it manually.
24+
- Access to a Dev Box environment.
25+
- Visual Studio Code installed.
26+
- PowerShell 7.x or later (any version in the 7.x series is acceptable).
27+
- Appropriate permissions to configure conditional access policies in Microsoft Entra ID.
3028

31-
Therefore, we're using [Microsoft.Graph PowerShell](/powershell/module/microsoft.graph.authentication/connect-mggraph?view=graph-powershell-1.0&preserve-view=true) to register the app to a tenant.
29+
## Benefits of conditional access for Dev Tunnels
3230

33-
1. Install PowerShell 7.x
31+
Conditional access policies for the Dev Tunnels service:
3432

35-
1. Follow [Install the Microsoft Graph PowerShell SDK | Microsoft Learn](/powershell/microsoftgraph/installation?view=graph-powershell-1.0&preserve-view=true) to install Microsoft.Graph PowerShell.
33+
- Let Dev Tunnels connect from managed devices, but deny connections from unmanaged devices.
34+
- Let Dev Tunnels connect from specific IP ranges, but deny connections from other IP ranges.
35+
- Support other regular conditional access configurations.
36+
- Apply to both the Visual Studio Code application and VS Code web.
3637

37-
1. Run the following commands:
38-
```powershell
39-
# Connect to Microsoft Graph
40-
Connect-MgGraph -TenantId <TenantID> -Scopes "Application.ReadWrite.All"
41-
42-
# Register the Dev tunnels service app to the tenant
43-
$TunnelServiceAppId = "46da2f7e-b5ef-422a-88d4-2a7f9de6a0b2"
44-
New-MgServicePrincipal -AppId $TunnelServiceAppId
45-
```
38+
> [!NOTE]
39+
> This article focuses on setting up conditional access policies specifically for Dev Tunnels. If you're configuring policies for Dev Box more broadly, see [Configure conditional access for Dev Box](how-to-configure-intune-conditional-access-policies.md).
4640
47-
1. Go to "Microsoft Entra ID" -> "Manage" -> "Enterprise applications" to verify if the Dev tunnels service is registered.
41+
## Configure conditional access policies
4842

49-
:::image type="content" source="media/how-to-conditional-access-dev-tunnels-service/dev-tunnels-register-service.png" alt-text="Screenshot of the Enterprise applications page in Microsoft Entra ID, showing the Dev tunnels service registration." lightbox="media/how-to-conditional-access-dev-tunnels-service/dev-tunnels-register-service.png":::
43+
To secure Dev Tunnels with conditional access, you need to target the Dev Tunnels service using custom security attributes. This section guides you through the process of configuring these attributes and creating the appropriate conditional access policy.
5044

51-
## Enable the Dev tunnels service for the conditional access picker
45+
## Enable the Dev Tunnels service for the conditional access picker
5246

53-
The Microsoft Entra IDteam is working on removing the need to onboard apps for them to appear in the app picker, with delivery expected in May. Therefore, we aren't onboarding Dev tunnel service to the conditional access picker. Instead, target the Dev tunnels service in a conditional access policy using [Custom Security Attributes](/entra/identity/conditional-access/concept-filter-for-applications).
47+
The Microsoft Entra ID team is working on removing the need to onboard apps for them to appear in the app picker, with delivery expected in May. Therefore, we aren't onboarding Dev tunnel service to the conditional access picker. Instead, target the Dev tunnels service in a conditional access policy using [Custom Security Attributes](/entra/identity/conditional-access/concept-filter-for-applications).
5448

5549
1. Follow [Add or deactivate custom security attribute definitions in Microsoft Entra ID](/entra/fundamentals/custom-security-attributes-add?tabs=ms-powershell) to add the following Attribute set and New attributes.
5650

@@ -68,21 +62,22 @@ The Microsoft Entra IDteam is working on removing the need to onboard apps for t
6862

6963
## Testing
7064

71-
1. Turn off the BlockDevTunnelCA
65+
1. Turn off the BlockDevTunnelCA policy.
7266

73-
1. Create a DevBox in the test tenant and run the following commands inside it. Dev tunnels can be created and connected externally.
74-
```
75-
code tunnel user login --provider microsoft
76-
code tunnel
77-
```
67+
1. Create a Dev Box in the test tenant and run the following commands inside it. You can create and connect to Dev Tunnels externally.
7868

79-
1. Enable the BlockDevTunnelCA.
69+
```powershell
70+
code tunnel user login --provider microsoft
71+
code tunnel
72+
```
8073

81-
1. New connections to the existing Dev tunnels can't be established. Test with an alternate browser if a connection has already been established.
74+
1. Turn on the BlockDevTunnelCA policy.
8275

83-
1. Any new attempts to execute the commands in step #2 will fail. Both errors are:
76+
1. You can't establish new connections to the existing Dev Tunnels. If a connection is already established, test with an alternate browser.
8477

85-
:::image type="content" source="media/how-to-conditional-access-dev-tunnels-service/dev-tunnels-no-access.png" alt-text="Screenshot of error message when Dev tunnels connection is blocked by conditional access policy." lightbox="media/how-to-conditional-access-dev-tunnels-service/dev-tunnels-no-access.png":::
78+
1. Any new attempts to execute the commands in step 2 fail. Both errors are:
79+
80+
:::image type="content" source="media/how-to-conditional-access-dev-tunnels-service/dev-tunnels-no-access.png" alt-text="Screenshot of error message when Dev tunnels connection is blocked by conditional access policy." lightbox="media/how-to-conditional-access-dev-tunnels-service/dev-tunnels-no-access.png":::
8681

8782
1. The Microsoft Entra ID sign-in logs show these entries.
8883

@@ -91,8 +86,11 @@ code tunnel
9186
## Limitations
9287

9388
With Dev Tunnels, the following limitations apply:
94-
- You can't configure conditional access policies for Dev Box service to manage Dev tunnels for Dev Box users.
95-
- You can't limit Dev tunnels that aren't managed by the Dev Box service. In the context of Dev Boxes, if the Dev tunnels GPO is configured **to allow only selected Microsoft Entra tenant IDs**, Conditional Access policies can also restrict self-created Dev tunnels.
89+
90+
- **Policy assignment restrictions**: You can't configure conditional access policies for the Dev Box service to manage Dev Tunnels for Dev Box users. Instead, configure policies at the Dev Tunnels service level as described in this article.
91+
- **Self-created Dev Tunnels**: You can't limit Dev Tunnels that aren't managed by the Dev Box service. In the context of Dev Boxes, if the Dev Tunnels GPO is configured **to allow only selected Microsoft Entra tenant IDs**, conditional access policies can also restrict self-created Dev Tunnels.
92+
- **IP range enforcement**: Dev Tunnels might not support granular IP restrictions. Consider using network-level controls or consult your security team for alternative enforcement strategies.
9693

9794
## Related content
95+
- [Open a dev box in VS Code](how-to-set-up-dev-tunnels.md)
9896
- [Conditional Access policies](/entra/identity/conditional-access/concept-conditional-access-policies)
Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,17 @@
11
---
22
author: RoseHJM
33
ms.author: rosemalcolm
4-
ms.date: 09/16/2025
4+
ms.date: 10/30/2025
55
ms.topic: include
66
ms.service: dev-box
77
---
88

99
> [!IMPORTANT]
10-
> Windows 365 will soon integrate Microsoft Dev Box features. For more information, see [Microsoft Dev Box capabilities are coming to Windows 365](../dev-box-windows-365-announcement.md).
10+
> **Microsoft Dev Box capabilities are coming to Windows 365**
11+
>
12+
> Starting November 1, 2025, Microsoft Dev Box no longer accepts new customers as we integrate Dev Box capabilities into Windows 365.
13+
>
14+
> - **Existing customers:** Continue using the service as normal. No action is required.
15+
> - **New customers:** If you previously evaluated or tested Dev Box and need to onboard after November 1, 2025, reach out to your Microsoft account team.
16+
>
17+
> For more information, see [Microsoft Dev Box capabilities are coming to Windows 365](../dev-box-windows-365-announcement.md).

0 commit comments

Comments
 (0)