Skip to content

Commit 125f40b

Browse files
authored
edits to conditional-access-user-flow.md
1 parent 6443a35 commit 125f40b

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/active-directory-b2c/conditional-access-user-flow.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The following example shows a Conditional Access technical profile that is used
4444
</TechnicalProfile>
4545
```
4646

47-
To ensure that Identity Protection is functioning properly, call `ConditionalAccessEvaluation` technical profile for all type of users, [local and social accounts](technical-overview.md#consumer-accounts). Failure to do so, may result in Identity Protection not working correct or have an incorrect degree of risk associated with users.
47+
To ensure that Identity Protection signals are evaluated properly, you'll want to call the `ConditionalAccessEvaluation` technical profile for all users, including both [local and social accounts](technical-overview.md#consumer-accounts). Otherwise, Identity Protection will indicate an incorrect degree of risk associated with users.
4848

4949
::: zone-end
5050

@@ -53,9 +53,9 @@ In the *Remediation* phase that follows, the user is challenged with MFA. Once c
5353
The remediation may also happen through other channels. For example, when the account's password is reset, either by the administrator or by the user. You can check the the user *Risk state* in the [risky users report](identity-protection-investigate-risk.md#navigating-the-risky-users-report).
5454

5555
> [!IMPORTANT]
56-
> To remediate the risk successfully within the journey, make sure the *Remediation* technical profile is called after *Evaluation* is executed. If only the *Evaluation* technical profile invoked without the Remediation, the risk state will be *At risk*.
56+
> To remediate the risk successfully within the journey, make sure the *Remediation* technical profile is called after the *Evaluation* technical profile is executed. If *Evaluation* is invoked without *Remediation*, the risk state will be *At risk*.
5757
58-
When the *Evaluation* technical profile recommendation returns `Block`, the call to *Evaluation* technical profile is not required. The risk state is set will be *At risk*.
58+
When the *Evaluation* technical profile recommendation returns `Block`, the call to the *Evaluation* technical profile is not required. The risk state is set to *At risk*.
5959

6060
::: zone pivot="b2c-custom-policy"
6161

@@ -168,7 +168,7 @@ A sign-in risk represents the probability that a given authentication request is
168168

169169
If risk is detected, users can perform multi-factor authentication to self-remediate and close the risky sign-in event to prevent unnecessary noise for administrators.
170170

171-
Configure Conditional Access through Azure Portal or Microsoft Graph APIs to enable a sign-in risk-based Conditional Access policy requiring multi-factor authentication (MFA) when sign-in risk is medium OR high.
171+
Configure Conditional Access through the Azure portal or Microsoft Graph APIs to enable a sign-in risk-based Conditional Access policy requiring MFA when the sign-in risk is *medium* or *high*.
172172

173173
### Enable with Conditional Access policy
174174

@@ -188,9 +188,9 @@ Configure Conditional Access through Azure Portal or Microsoft Graph APIs to ena
188188
9. Confirm your settings and set **Enable policy** to **On**.
189189
10. Select **Create** to create to enable your policy.
190190

191-
### Enable with Conditional Access APIs (Optional)
191+
### Enable with Conditional Access APIs (optional)
192192

193-
To create a Sign-in risk-based Conditional Access policy with MS Graph APIs. For more information, see [Conditional Access APIs](../active-directory/conditional-access/howto-conditional-access-apis.md#graph-api).
193+
Create a sign-in risk-based Conditional Access policy with MS Graph APIs. For more information, see [Conditional Access APIs](../active-directory/conditional-access/howto-conditional-access-apis.md#graph-api).
194194

195195
The following template can be used to create a Conditional Access policy with display name "Template 1: Require MFA for medium+ sign-in risk" in report-only mode.
196196

@@ -227,9 +227,9 @@ The following template can be used to create a Conditional Access policy with di
227227

228228
## Add Conditional Access to a user flow
229229

230-
After you've added the Azure AD Conditional Access policy, enable conditional access in your user flow or custom policy. When you enable conditional access, you don't need to specify a policy name.
230+
After you've added the Azure AD Conditional Access policy, enable Conditional Access in your user flow or custom policy. When you enable Conditional Access, you don't need to specify a policy name.
231231

232-
Multiple Conditional Access policies may apply to an individual user at any time. In this case, the most strict access control policy takes precedence. For example, if one policy requires multi-factor authentication (MFA), while the other blocks access, the user will be blocked.
232+
Multiple Conditional Access policies may apply to an individual user at any time. In this case, the most strict access control policy takes precedence. For example, if one policy requires MFA while the other blocks access, the user will be blocked.
233233

234234
## Enable multi-factor authentication (optional)
235235

@@ -274,9 +274,9 @@ To enable Conditional Access for a user flow, make sure the version supports Con
274274

275275
### Configure claim other than phone number to be used for MFA
276276

277-
In the conditional access policy above, the `DoesClaimExist` claim transformation method checks if a claim contains any value. For example, if `strongAuthenticationPhoneNumber` claim contains a phone number.
277+
In the Conditional Access policy above, the `DoesClaimExist` claim transformation method checks if a claim contains a value, for example if the `strongAuthenticationPhoneNumber` claim contains a phone number.
278278

279-
The claims transformation isn't limited to `strongAuthenticationPhoneNumber` claim. Depending on the scenario, you can use any other claim. In the following XML snippet, the `strongAuthenticationEmailAddress` is checked instead. The claim you choose must have a valid value, otherwise the `IsMfaRegistered` claim will be set to `False`. When set to `False`, the Conditional Access policy evaluation returns `Block` grant type. Preventing the user to complete the user flow.
279+
The claims transformation isn't limited to the `strongAuthenticationPhoneNumber` claim. Depending on the scenario, you can use any other claim. In the following XML snippet, the `strongAuthenticationEmailAddress` claim is checked instead. The claim you choose must have a valid value, otherwise the `IsMfaRegistered` claim will be set to `False`. When set to `False`, the Conditional Access policy evaluation returns a `Block` grant type, preventing the user from completing user flow.
280280

281281
```XML
282282
<ClaimsTransformation Id="IsMfaRegisteredCT" TransformationMethod="DoesClaimExist">

0 commit comments

Comments
 (0)