Skip to content

Commit 05a8540

Browse files
Update
1 parent db0fc05 commit 05a8540

File tree

3 files changed

+13
-33
lines changed

3 files changed

+13
-33
lines changed

articles/active-directory/conditional-access/app-based-conditional-access.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,16 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: article
9-
ms.date: 03/03/2020
9+
ms.date: 03/04/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: daveba
14-
ms.reviewer: spunukol
14+
ms.reviewer: spunukol, rosssmi
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# How to: Require approved client apps for cloud app access with Conditional Access
18+
# How to: Require approved client apps for cloud app access with Conditional Access
1919

2020
People regularly use their mobile devices for both personal and work tasks. While making sure staff can be productive, organizations also want to prevent data loss from potentially unsecure applications. With Conditional Access, organizations can restrict access to approved (modern authentication capable) client apps.
2121

@@ -26,8 +26,6 @@ This article presents two scenarios to configure Conditional Access policies for
2626

2727
In Conditional Access, this functionality is known as requiring an approved client app. For a list of approved client apps, see [approved client app requirement](concept-conditional-access-grant.md#require-approved-client-app).
2828

29-
![Conditional Access require an approved client app setting](./media/app-based-conditional-access/require-approved-client-app.png)
30-
3129
## Scenario 1: Office 365 apps require an approved client app
3230

3331
In this scenario, Contoso has decided that users using mobile devices can access all Office 365 services as long as they use approved client apps, like Outlook mobile, OneDrive, and Microsoft Teams. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.

articles/active-directory/conditional-access/app-protection-based-conditional-access.md

Lines changed: 5 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -6,18 +6,16 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: article
9-
ms.date: 03/03/2020
9+
ms.date: 03/04/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: daveba
14-
ms.reviewer: spunukol
15-
16-
#Customer intent: As an IT admin, I want to know how to require an app protection policy for the access to certain resources to ensure that they're accessed only from applications that meet my standards for security and compliance.
14+
ms.reviewer: spunukol, rosssmi
1715

1816
ms.collection: M365-identity-device-management
1917
---
20-
# How to: Require approved client app and app protection policy for cloud app access with Conditional Access
18+
# How to: Require app protection policy and an approved client app for cloud app access with Conditional Access
2119

2220
People regularly use their mobile devices for both personal and work tasks. While making sure staff can be productive, organizations also want to prevent data loss from potentially unsecure applications. With Conditional Access, organizations can restrict access to approved (modern authentication capable) client apps with Intune app protection policies applied to them.
2321

@@ -26,31 +24,10 @@ This article presents two scenarios to configure Conditional Access policies for
2624
- [Scenario 1: Office 365 apps require approved apps with app protection policies](#scenario-1-office-365-apps-require-approved-apps-with-app-protection-policies)
2725
- [Scenario 2: Exchange Online and SharePoint Online require an approved client app and app protection policy](#scenario-2-exchange-online-and-sharepoint-online-require-an-approved-client-app-and-app-protection-policy)
2826

29-
## Overview
30-
31-
With [Azure AD Conditional Access](overview.md), you can fine-tune how authorized users can access your resources. For example, you can limit the access to your cloud apps to trusted devices.
32-
33-
You can use [Intune app protection policies](https://docs.microsoft.com/intune/app-protection-policy) to help protect your company's data. Intune app protection policies don't require a mobile device management (MDM) solution. You can protect your company's data with or without enrolling devices in a device management solution.
34-
35-
Azure Active Directory Conditional Access restricts access to your cloud apps to client applications that Intune has reported to Azure AD as receiving an app protection policy. For example, you can restrict access to Exchange Online to the Outlook app that has an Intune app protection policy.
36-
37-
In the Conditional Access terminology, these client apps are known to be protected with an *app protection policy*.
27+
In the Conditional Access, these client apps are known to be protected with an app protection policy. More information about app protection policies can be found in the article, [App protection policies overview](/intune/apps/app-protection-policy)
3828

3929
For a list of eligible client apps, see [App protection policy requirement](concept-conditional-access-grant.md).
4030

41-
You can combine app-protection-based Conditional Access policies with other policies, such as [device-based Conditional Access policies](require-managed-devices.md). This way, you can provide flexibility in how to protect data for both personal and corporate devices.
42-
43-
44-
## Benefits of app protection-based Conditional Access requirement
45-
46-
Similar to compliance that's reported by Intune for iOS and Android for a managed device, Intune now reports to Azure AD if an app protection policy is applied. Conditional Access can use this policy as an access check. This new Conditional Access policy, the app protection policy, increases security. It protects against admin errors, such as:
47-
48-
- Users who don't have an Intune license.
49-
- Users who can't receive an Intune app protection policy.
50-
- Intune app protection policy apps that aren't configured to receive a policy.
51-
52-
Intune app protection policies must be in place on the application to access corporate data. Policies might prompt the user to restart the application or use an additional PIN. This is the case if the policies are configured for the application and platform.
53-
5431
## Scenario 1: Office 365 apps require approved apps with app protection policies
5532

5633
In this scenario, Contoso has decided that all mobile access to Office 365 resources must use approved client apps, like Outlook mobile, OneDrive, and Microsoft Teams protected by an app protection policy prior to receiving access. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.
@@ -160,3 +137,4 @@ Review the article [How to create and assign app protection policies](/intune/ap
160137
[Conditional access components](concept-conditional-access-policies.md)
161138

162139
[Common Conditional Access policies](concept-conditional-access-policy-common.md)
140+

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/11/2020
9+
ms.date: 03/04/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -97,6 +97,8 @@ This setting applies to the following client apps:
9797
- Only supports the iOS and Android for device platform condition.
9898
- Conditional Access cannot consider Microsoft Edge in InPrivate mode an approved client app.
9999

100+
See the article, [How to: Require approved client apps for cloud app access with Conditional Access](app-based-conditional-access.md) for configuration examples.
101+
100102
### Require app protection policy
101103

102104
In your Conditional Access policy, you can require an app protection policy be present on the client app before access is available to the selected cloud apps.
@@ -116,6 +118,8 @@ This setting applies to the following client apps:
116118
- The **Require app protection policy** requirements:
117119
- Only supports the iOS and Android for device platform condition.
118120

121+
See the article, [How to: Require app protection policy and an approved client app for cloud app access with Conditional Access](app-protection-based-conditional-access.md) for configuration examples.
122+
119123
## Next steps
120124

121125
- [Conditional Access: Session controls](concept-conditional-access-session.md)

0 commit comments

Comments
 (0)