Skip to content

Commit 20ce1d9

Browse files
authored
Merge pull request #91721 from English-gecko/patch-2
Added in Conditional Access link
2 parents 80f25b5 + 5d28eaf commit 20ce1d9

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

articles/security/fundamentals/steps-secure-identity.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,8 @@ For more information, see the article [Blocking legacy authentication protocols
104104

105105
Using the verify explicitly principle, you should reduce the impact of compromised user credentials when they happen. For each app in your environment, consider the valid use cases: which groups, which networks, which devices and other elements are authorized – then block the rest. With Azure AD Conditional Access, you can control how authorized users access their apps and resources based on specific conditions you define.
106106

107+
For more information on how to use Conditional Access for your Cloud Apps and user actions, see [Conditional Access Cloud apps, actions, and authentication context](../../active-directory/conditional-access/concept-conditional-access-cloud-apps.md).
108+
107109
### Review and govern admin roles
108110

109111
Another Zero Trust pillar is the need to minimize the likelihood a compromised account can operate with a privileged role. This control can be accomplished by assigning the least amount of privilege to an identity. If you’re new to Azure AD Roles, this article will help you understand Azure AD Roles.

0 commit comments

Comments
 (0)