You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/app-based-conditional-access.md
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,16 +6,16 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: article
9
-
ms.date: 03/03/2020
9
+
ms.date: 03/04/2020
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
13
13
manager: daveba
14
-
ms.reviewer: spunukol
14
+
ms.reviewer: spunukol, rosssmi
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
# How to: Require approved client apps for cloud app access with Conditional Access
18
+
# How to: Require approved client apps for cloud app access with Conditional Access
19
19
20
20
People regularly use their mobile devices for both personal and work tasks. While making sure staff can be productive, organizations also want to prevent data loss from potentially unsecure applications. With Conditional Access, organizations can restrict access to approved (modern authentication capable) client apps.
21
21
@@ -26,8 +26,6 @@ This article presents two scenarios to configure Conditional Access policies for
26
26
27
27
In Conditional Access, this functionality is known as requiring an approved client app. For a list of approved client apps, see [approved client app requirement](concept-conditional-access-grant.md#require-approved-client-app).
28
28
29
-

In this scenario, Contoso has decided that users using mobile devices can access all Office 365 services as long as they use approved client apps, like Outlook mobile, OneDrive, and Microsoft Teams. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/app-protection-based-conditional-access.md
+5-27Lines changed: 5 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,18 +6,16 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: article
9
-
ms.date: 03/03/2020
9
+
ms.date: 03/04/2020
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
13
13
manager: daveba
14
-
ms.reviewer: spunukol
15
-
16
-
#Customer intent: As an IT admin, I want to know how to require an app protection policy for the access to certain resources to ensure that they're accessed only from applications that meet my standards for security and compliance.
14
+
ms.reviewer: spunukol, rosssmi
17
15
18
16
ms.collection: M365-identity-device-management
19
17
---
20
-
# How to: Require approved client app and app protection policy for cloud app access with Conditional Access
18
+
# How to: Require app protection policy and an approved client app for cloud app access with Conditional Access
21
19
22
20
People regularly use their mobile devices for both personal and work tasks. While making sure staff can be productive, organizations also want to prevent data loss from potentially unsecure applications. With Conditional Access, organizations can restrict access to approved (modern authentication capable) client apps with Intune app protection policies applied to them.
23
21
@@ -26,31 +24,10 @@ This article presents two scenarios to configure Conditional Access policies for
-[Scenario 2: Exchange Online and SharePoint Online require an approved client app and app protection policy](#scenario-2-exchange-online-and-sharepoint-online-require-an-approved-client-app-and-app-protection-policy)
28
26
29
-
## Overview
30
-
31
-
With [Azure AD Conditional Access](overview.md), you can fine-tune how authorized users can access your resources. For example, you can limit the access to your cloud apps to trusted devices.
32
-
33
-
You can use [Intune app protection policies](https://docs.microsoft.com/intune/app-protection-policy) to help protect your company's data. Intune app protection policies don't require a mobile device management (MDM) solution. You can protect your company's data with or without enrolling devices in a device management solution.
34
-
35
-
Azure Active Directory Conditional Access restricts access to your cloud apps to client applications that Intune has reported to Azure AD as receiving an app protection policy. For example, you can restrict access to Exchange Online to the Outlook app that has an Intune app protection policy.
36
-
37
-
In the Conditional Access terminology, these client apps are known to be protected with an *app protection policy*.
27
+
In the Conditional Access, these client apps are known to be protected with an app protection policy. More information about app protection policies can be found in the article, [App protection policies overview](/intune/apps/app-protection-policy)
38
28
39
29
For a list of eligible client apps, see [App protection policy requirement](concept-conditional-access-grant.md).
40
30
41
-
You can combine app-protection-based Conditional Access policies with other policies, such as [device-based Conditional Access policies](require-managed-devices.md). This way, you can provide flexibility in how to protect data for both personal and corporate devices.
42
-
43
-
44
-
## Benefits of app protection-based Conditional Access requirement
45
-
46
-
Similar to compliance that's reported by Intune for iOS and Android for a managed device, Intune now reports to Azure AD if an app protection policy is applied. Conditional Access can use this policy as an access check. This new Conditional Access policy, the app protection policy, increases security. It protects against admin errors, such as:
47
-
48
-
- Users who don't have an Intune license.
49
-
- Users who can't receive an Intune app protection policy.
50
-
- Intune app protection policy apps that aren't configured to receive a policy.
51
-
52
-
Intune app protection policies must be in place on the application to access corporate data. Policies might prompt the user to restart the application or use an additional PIN. This is the case if the policies are configured for the application and platform.
In this scenario, Contoso has decided that all mobile access to Office 365 resources must use approved client apps, like Outlook mobile, OneDrive, and Microsoft Teams protected by an app protection policy prior to receiving access. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.
@@ -160,3 +137,4 @@ Review the article [How to create and assign app protection policies](/intune/ap
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-grant.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: conceptual
9
-
ms.date: 02/11/2020
9
+
ms.date: 03/04/2020
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -97,6 +97,8 @@ This setting applies to the following client apps:
97
97
- Only supports the iOS and Android for device platform condition.
98
98
- Conditional Access cannot consider Microsoft Edge in InPrivate mode an approved client app.
99
99
100
+
See the article, [How to: Require approved client apps for cloud app access with Conditional Access](app-based-conditional-access.md) for configuration examples.
101
+
100
102
### Require app protection policy
101
103
102
104
In your Conditional Access policy, you can require an app protection policy be present on the client app before access is available to the selected cloud apps.
@@ -116,6 +118,8 @@ This setting applies to the following client apps:
116
118
- The **Require app protection policy** requirements:
117
119
- Only supports the iOS and Android for device platform condition.
118
120
121
+
See the article, [How to: Require app protection policy and an approved client app for cloud app access with Conditional Access](app-protection-based-conditional-access.md) for configuration examples.
0 commit comments