Skip to content

Commit 1740fdd

Browse files
authored
Merge pull request #97013 from MicrosoftGuyJFlo/GitHubIssue39482
[Azure AD] Conditional Access - GitHub Issue 39482
2 parents 8eddfb1 + 7ca7f5f commit 1740fdd

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/active-directory/conditional-access/require-managed-devices.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: article
9-
ms.date: 11/21/2019
9+
ms.date: 11/22/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -77,7 +77,7 @@ The option to *require a device to be marked as compliant* is the strongest form
7777

7878
This option requires a device to be registered with Azure AD, and also to be marked as compliant by:
7979

80-
- Intune.
80+
- Intune
8181
- A third-party mobile device management (MDM) system that manages Windows 10 devices via Azure AD integration. Third-party MDM systems for device OS types other than Windows 10 are not supported.
8282

8383
![Device-based conditions](./media/require-managed-devices/46.png)
@@ -89,6 +89,9 @@ For a device that is marked as compliant, you can assume that:
8989
- Your company information is protected by helping to control the way your workforce accesses and shares it
9090
- The device and its apps are compliant with company security requirements
9191

92+
> [!NOTE]
93+
> If you configure a policy to require compliant devices users may be prompted on Mac, iOS, and Android to select a device certificate during policy evaluation. This is a known behavior.
94+
9295
## Next steps
9396

9497
Before configuring a device-based Conditional Access policy in your environment, you should take a look at the [best practices for Conditional Access in Azure Active Directory](best-practices.md).

0 commit comments

Comments
 (0)