In this post, I will show you how to configure Conditional Access in Microsoft Entra.
Conditional Access is a feature of Microsoft Entra that allows you to control access to your organization's resources based on specific conditions. With Conditional Access, you can enforce policies that require users to meet certain criteria before they can access resources, such as multi-factor authentication, device compliance, or location-based restrictions.
You have three main components in Conditional Access:
- Signals: These are the conditions that trigger a policy. Signals can include user sign-in, device state, location, and more.
- Decisions: These are the actions that are taken when a policy is triggered. Decisions can include requiring multi-factor authentication, blocking access, or granting access with conditions.
- Enforcement: This is the mechanism that enforces the policy. Enforcement can be done at the application level, the network level, or the device level.
Really, all the Conditional Access policies are based on the following flow:
- Assignments: Define who and where the policy applies to.
- Access Controls: Define what to do when the the who and where are met.
For that reason, we can define the followin phases:
Example of Conditional Access policy configuration:
- Block access to all users from all locations except for a specific group of users from a specific location:
- Assignments:
- users:
- Include:All users
- Exclude: Group_of_excluded_users
- Target resources:
- Cloud apps: All cloud apps
- Network: All trusted locations
- Access controls:
Mindmaps of the Conditional Access policies flow:
# Conditional Access Policy
## Phase 1: Collect session details
### Assignments
#### users
##### Include
###### None
###### All users
###### Select users and groups
##### Exclude
###### Guest or external users
###### Directory roles
###### Users and groups
#### Target resources
##### Cloud apps
###### Include
- None
- All cloud apps
- Select apps
###### Exclude
- Edit Filter
- Select excluded cloud apps
##### User actions
- Register security information
- Register or join devices
##### Global Secure Access
- Microsoft 365 traffic
- Internet traffic
- Private traffic
##### Authentication context
##### Network
###### Any network or location
###### All trusted locations
###### All Compliant Network locations
###### Selected network or location
#### Conditions
##### User risk
##### Sign-in risk
##### Insider risk
##### Device Platform
##### Client apps
##### Filters for devices
##### Authentication flows
###### Device code flow
###### Authentication transfer
## Phase 2: Enforcement
### Access controls
#### Grant
##### Block
##### Grant
###### Require multi-factor authentication
###### Require authentication strength
###### Require device to be marked as compliant
###### Require Hybrid Azure AD joined device
###### Require approved client app
###### Require app protection policy
###### Require password change
##### For multiple controls
###### Require all the selected controls
###### Require one of the selected controls
#### Session
##### Use app enforced restrictions
##### Use Conditional Access App Control
##### Sign-in frequency
##### Persistent browser session
##### Customize continuous access evaluation
mindmap
root((Conditional Access Policy))
(Phase 1: Collect session details)
(Assignments)
[users]
{{Include}}
None
All users
Select users and groups
{{Exclude}}
Guest or external users
Directory roles
Users and groups
[Target resources]
{{Cloud apps}}
Include
None
All cloud apps
Select apps
Exclude
Edit Filter
Select excluded cloud apps
{{User actions}}
Register security information
Register or join devices
{{Global Secure Access}}
Microsoft 365 traffic
Internet traffic
Private traffic
{{Authentication context}}
{{Network}}
Any network or location
All trusted locations
All Compliant Network locations
Selected network or location
[Conditions]
{{User risk}}
{{Sign-in risk}}
{{Insider risk}}
{{Device Platform}}
{{Client apps}}
{{Filters for devices}}
{{Authentication flows}}
Device code flow
Authentication transfer
(Phase 2: Enforcement)
(Access controls)
[Grant]
{{Block}}
{{Grant}}
Require multi-factor authentication
Require authentication strength
Require device to be marked as compliant
Require Hybrid Azure AD joined device
Require approved client app
Require app protection policy
Require password change
{{For multiple controls}}
Require all the selected controls
Require one of the selected controls
[Session]
{{Use app enforced restrictions}}
{{Use Conditional Access App Control}}
{{Sign-in frequency}}
{{Persistent browser session}}
{{Customize continuous access evaluation}}