This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
Access to this page requires authorization. You can trysigning in orchanging directories.
Access to this page requires authorization. You can trychanging directories.
Dev Tunnels offer a streamlined way to connect to your Dev Box directly from Visual Studio Code, eliminating the need to use separate applications like Windows App or a browser. This method provides a more immediate and integrated development experience. Unlike traditional connection methods, Dev Tunnels simplify access and enhance productivity.
Many large enterprises that use Dev Box have strict security and compliance policies, and their code is valuable to their business. This article explains how to configure conditional access policies to secure Dev Tunnel usage in your environment.
Before proceeding, ensure you have:
Conditional access policies for the Dev Tunnels service:
Note
This article focuses on setting up conditional access policies specifically for Dev Tunnels. If you're configuring policies for Dev Box more broadly, seeConfigure conditional access for Dev Box.
To secure Dev Tunnels with conditional access, you need to target the Dev Tunnels service using custom security attributes. This section guides you through the process of configuring these attributes and creating the appropriate conditional access policy.
The Microsoft Entra ID team is working on removing the need to onboard apps for them to appear in the app picker, with delivery expected in May. Therefore, we aren't onboarding Dev tunnel service to the conditional access picker. Instead, target the Dev tunnels service in a conditional access policy usingCustom Security Attributes.
FollowAdd or deactivate custom security attribute definitions in Microsoft Entra ID to add the following Attribute set and New attributes.
FollowCreate a conditional access policy to create a conditional access policy.
FollowConfigure custom attributes to configure the custom attribute for the Dev tunnels service.
Turn off the BlockDevTunnelCA policy.
Create a Dev Box in the test tenant and run the following commands inside it. You can create and connect to Dev Tunnels externally.
code tunnel user login --provider microsoftcode tunnelTurn on the BlockDevTunnelCA policy.
The Microsoft Entra ID sign-in logs show these entries.
With Dev Tunnels, the following limitations apply:
Was this page helpful?
Need help with this topic?
Want to try using Ask Learn to clarify or guide you through this topic?
Was this page helpful?
Want to try using Ask Learn to clarify or guide you through this topic?