Skip to content

Commit 435660a

Browse files
committed
edit pass: conditional-access-grant
1 parent f39e7e3 commit 435660a

File tree

1 file changed

+37
-35
lines changed

1 file changed

+37
-35
lines changed

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 37 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818

1919
Within a **Conditional Access policy**, an administrator can use access controls to grant or block access to resources.
2020

21-
:::image type="content" source="media/concept-conditional-access-session/conditional-access-session.png" alt-text="Screenshot of a Conditional Access policy with a grant control that requires multifactor authentication." lightbox="media/concept-conditional-access-session/conditional-access-session.png":::
21+
:::image type="content" source="media/concept-conditional-access-session/conditional-access-session.png" alt-text="Screenshot of a Conditional Access policy with a grant control that requires Multi-Factor Authentication." lightbox="media/concept-conditional-access-session/conditional-access-session.png":::
2222

2323
## Block access
2424

@@ -44,45 +44,47 @@ When administrators choose to combine these options, they can use the following
4444

4545
By default, Conditional Access requires all selected controls.
4646

47-
### Require multifactor authentication
47+
### Require Multi-Factor Authentication
4848

49-
Selecting this checkbox requires users to perform Azure Active Directory (Azure AD) multifactor authentication. More information about deploying Azure AD multifactor authentication can be found in [Planning a cloud-based Azure AD Multifactor Authentication deployment](../authentication/howto-mfa-getstarted.md).
49+
Selecting this checkbox requires users to perform Azure Active Directory (Azure AD) Multi-factor Authentication. You can find more information about deploying Azure AD Multi-Factor Authentication in [Planning a cloud-based Azure AD Multifactor Authentication deployment](../authentication/howto-mfa-getstarted.md).
5050

51-
[Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview) satisfies the requirement for multifactor authentication in Conditional Access policies.
51+
[Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview) satisfies the requirement for Multi-Factor Authentication in Conditional Access policies.
5252

5353
### Require device to be marked as compliant
5454

5555
Organizations that have deployed Intune can use the information returned from their devices to identify devices that meet specific policy compliance requirements. Intune sends compliance information to Azure AD so Conditional Access can decide to grant or block access to resources. For more information about compliance policies, see [Set rules on devices to allow access to resources in your organization using Intune](/intune/protect/device-compliance-get-started).
5656

57-
A device can be marked as compliant by Intune (for any device operating system [OS]) or by a third-party mobile device management (MDM) system for Windows 10 devices. A list of supported third-party MDM systems can be found in [Support third-party device compliance partners in Intune](/mem/intune/protect/device-compliance-partners).
57+
A device can be marked as compliant by Intune (for any device operating system [OS]) or by a third-party mobile device management system for Windows 10 devices. You can find a list of supported third-party mobile device management systems in [Support third-party device compliance partners in Intune](/mem/intune/protect/device-compliance-partners).
5858

59-
Devices must be registered in Azure AD before they can be marked as compliant. More information about device registration can be found in [What is a device identity](../devices/overview.md).
59+
Devices must be registered in Azure AD before they can be marked as compliant. You can find more information about device registration in [What is a device identity](../devices/overview.md).
60+
61+
For devices enrolled with third-party mobile device management systems, see [Support third-party device compliance partners in Intune](/mem/intune/protect/device-compliance-partners).
6062

6163
The following requirements are part of the **Require device to be marked as compliant** control:
6264
- Only supports Windows 10+, iOS, Android, and macOS devices registered with Azure AD and enrolled with Intune.
63-
- For devices enrolled with third-party MDM systems, see [Support third-party device compliance partners in Intune](/mem/intune/protect/device-compliance-partners).
64-
- Conditional access can't consider Microsoft Edge in InPrivate mode as a compliant device.
65+
66+
- Considers Microsoft Edge in InPrivate mode a non-compliant device.
6567

6668
> [!NOTE]
67-
> On Windows 7, iOS, Android, macOS, and some third-party web browsers, Azure AD identifies the device using a client certificate that is provisioned when the device is registered with Azure AD. When a user first signs in through the browser, the user is prompted to select the certificate. The end user must select this certificate before they can continue to use the browser.
69+
> On Windows 7, iOS, Android, macOS, and some third-party web browsers, Azure AD identifies the device by using a client certificate that is provisioned when the device is registered with Azure AD. When a user first signs in through the browser, the user is prompted to select the certificate. The user must select this certificate before they can continue to use the browser.
6870
69-
You can use the Microsoft Defender for Endpoint app with the approved client app policy in Intune to set device compliance policy Conditional Access policies. There's no exclusion required for the Microsoft Defender for Endpoint app while setting up Conditional Access. Although Microsoft Defender for Endpoint on Android and iOS (App ID - dd47d17a-3194-4d86-bfd5-c6ae6f5651e3) isn't an approved app, it has permission to report device security posture. This permission enables the flow of compliance information to Conditional Access.
71+
You can use the Microsoft Defender for Endpoint app with the approved client app policy in Intune to set the device compliance policy to Conditional Access policies. There's no exclusion required for the Microsoft Defender for Endpoint app while you're setting up Conditional Access. Although Microsoft Defender for Endpoint on Android and iOS (App ID - dd47d17a-3194-4d86-bfd5-c6ae6f5651e3) isn't an approved app, it has permission to report device security posture. This permission enables the flow of compliance information to Conditional Access.
7072

7173
### Require hybrid Azure AD joined device
7274

73-
Organizations can choose to use the device identity as part of their Conditional Access policy. Organizations can require that devices are hybrid Azure AD joined using this checkbox. For more information about device identities, see [What is a device identity?](../devices/overview.md).
75+
Organizations can choose to use the device identity as part of their Conditional Access policy. Organizations can require that devices are hybrid Azure AD joined by using this checkbox. For more information about device identities, see [What is a device identity?](../devices/overview.md).
7476

75-
When you use the [device-code OAuth flow](../develop/v2-oauth2-device-code.md), the required managed device grant control or a device state condition aren't supported. This is because the device performing authentication can't provide its device state to the device providing a code and the device state in the token is locked to the device performing authentication. Use the **require multi-factor authentication grant** control instead.
77+
When you use the [device-code OAuth flow](../develop/v2-oauth2-device-code.md), the grant control required for the managed device or a device state condition isn't supported. This is because the device that is performing authentication can't provide its device state to the device that is providing a code. Also, the device state in the token is locked to the device performing authentication. Use the **require multi-factor authentication grant** control instead.
7678

7779
The following requirements are part of the **Require hybrid Azure AD joined device** control:
78-
- Only supports domain joined Windows down-level (pre Windows 10) and Windows current (Windows 10+) devices.
79-
- Conditional access can't consider Microsoft Edge in InPrivate mode as a hybrid Azure AD joined device.
80+
- Only supports domain-joined Windows down-level (pre Windows 10) and Windows-current (Windows 10+) devices.
81+
- Doesn't consider Microsoft Edge in InPrivate mode as a hybrid Azure-AD-joined device.
8082

8183
### Require approved client app
8284

83-
Organizations can require that an approved client app be used to access selected cloud apps. These approved client apps support [Intune app protection policies](/intune/app-protection-policy) independent of any MDM solution.
85+
Organizations can require that an approved client app is used to access selected cloud apps. These approved client apps support [Intune app protection policies](/intune/app-protection-policy) independent of any mobile device management solution.
8486

85-
To apply this grant control, the device must be registered in Azure AD, which requires the use of a broker app. The broker app can be the Microsoft Authenticator for iOS, or either the Microsoft Authenticator or Microsoft Company portal for Android devices. If a broker app isn't installed on the device when the user attempts to authenticate, the user is redirected to the appropriate app store to install the required broker app.
87+
To apply this grant control, the device must be registered in Azure AD, which requires using a broker app. The broker app can be the Microsoft Authenticator for iOS, or either the Microsoft Authenticator app or the Microsoft Company portal app for Android devices. If a broker app isn't installed on the device when the user attempts to authenticate, the user is redirected to the appropriate app store to install the required broker app.
8688

8789
The following client apps support this setting:
8890

@@ -117,23 +119,23 @@ The following client apps support this setting:
117119
- Microsoft Whiteboard
118120
- Microsoft 365 Admin
119121

120-
The approved client apps support the Intune mobile application management feature.
121-
122-
The following requirements are part of the **Require approved client app** control:
122+
**Remarks**
123+
- The approved client apps support the Intune mobile application management feature.
124+
- The **Require approved client app** requirement:
123125
- Only supports the iOS and Android for device platform condition.
124126
- Requires a broker app to register the device. The broker app can be the Microsoft Authenticator for iOS, or either the Microsoft Authenticator or Microsoft Company portal for Android devices.
125-
- Conditional access can't consider Microsoft Edge in InPrivate mode an approved client app.
126-
- Conditional access policies that require Microsoft Power BI as an approved client app don't support using Azure AD Application Proxy to connect the Power BI mobile app to the on-premises Power BI Report Server.
127+
- Conditional Access can't consider Microsoft Edge in InPrivate mode an approved client app.
128+
- Conditional Access policies that require Microsoft Power BI as an approved client app don't support using Azure AD Application Proxy to connect the Power BI mobile app to the on-premises Power BI Report Server.
127129

128-
See [How to: Require approved client apps for cloud app access with Conditional Access](app-based-conditional-access.md) for configuration examples.
130+
See [Require approved client apps for cloud app access with Conditional Access](app-based-conditional-access.md) for configuration examples.
129131

130132
### Require app protection policy
131133

132-
In your Conditional Access policy, you can require that an [Intune app protection policy](/intune/app-protection-policy) be present on the client app before access is available to the selected cloud apps.
134+
In your Conditional Access policy, you can require that an [Intune app protection policy](/intune/app-protection-policy) is present on the client app before access is available to the selected cloud apps.
133135

134-
To apply this grant control, Conditional Access requires that the device be registered in Azure AD, which requires using a broker app. The broker app can be either the Microsoft Authenticator for iOS, or the Microsoft Company portal for Android devices. If a broker app isn't installed on the device when the user attempts to authenticate, the user is redirected to the app store to install the broker app.
136+
To apply this grant control, Conditional Access requires that the device is registered in Azure AD, which requires using a broker app. The broker app can be either the Microsoft Authenticator for iOS, or the Microsoft Company portal for Android devices. If a broker app isn't installed on the device when the user attempts to authenticate, the user is redirected to the app store to install the broker app.
135137

136-
Applications are required to have the Intune SDK with policy assurance implemented and to meet certain other requirements to support this setting. Developers implementing applications with the Intune SDK can find more information on these requirements in the SDK documentation.
138+
Applications must have the Intune SDK with policy assurance implemented and must meet certain other requirements to support this setting. Developers who are implementing applications with the Intune SDK can find more information on these requirements in the SDK documentation.
137139

138140
The following client apps support this setting:
139141

@@ -156,35 +158,35 @@ The following client apps support this setting:
156158
- Nine Mail - Email and Calendar
157159

158160
> [!NOTE]
159-
> Kaizala, Skype for Business, and Visio do not support the **Require app protection policy** grant. If you require these apps to work, please use the **Require approved apps** grant exclusively. Using the "or" clause between the two grants will not work for these three applications.
161+
> Kaizala, Skype for Business, and Visio don't support the **Require app protection policy** grant. If you require these apps to work, use the **Require approved apps** grant exclusively. Using the "or" clause between the two grants will not work for these three applications.
160162
161163
Apps for the app protection policy support the Intune mobile application management feature with policy protection.
162164

163165
The following requirements are part of the **Require app protection policy** control:
164166

165167
- Only supports iOS and Android for device platform condition.
166-
- Requires a broker app to register the device. On iOS, the broker app is Microsoft Authenticator, and on Android, it's Intune Company Portal app.
168+
- Requires a broker app to register the device. On iOS, the broker app is Microsoft Authenticator. On Android, the broker app is Intune Company Portal.
167169

168-
See [How to: require app protection policy and an approved client app for cloud app access with Conditional Access](app-protection-based-conditional-access.md) for configuration examples.
170+
See [Require app protection policy and an approved client app for cloud app access with Conditional Access](app-protection-based-conditional-access.md) for configuration examples.
169171

170172
### Require password change
171173

172-
When user risk is detected, administrators can employ the user risk policy conditions to have the user securely change their password with Azure AD self-service password reset. Users can perform a self-service password reset to self-remediate. This process will close the user risk event to prevent unnecessary alerts for administrators.
174+
When user risk is detected, administrators can employ the user risk policy conditions to have the user securely change a password with Azure AD self-service password reset. Users can perform a self-service password reset to self-remediate. This process will close the user risk event to prevent unnecessary alerts for administrators.
173175

174-
When a user is prompted to change their password, they'll first be required to complete multifactor authentication. Make sure all users have registered for multifactor authentication, so they're prepared in case risk is detected for their account.
176+
When a user is prompted to change a password, they'll first be required to complete Multi-Factor Authentication. Make sure all users have registered for Multi-Factor Authentication, so they're prepared in case risk is detected for their account.
175177

176178
> [!WARNING]
177179
> Users must have previously registered for self-service password reset before triggering the user risk policy.
178180
179-
Restrictions when you configure a policy using the password change control:
181+
The following restrictions apply when you configure a policy by using the password change control:
180182

181-
1. The policy must be assigned to "all cloud apps." This requirement prevents an attacker from using a different app to change the user's password and resetting their account risk by signing into a different app.
182-
1. **Require password change** can't be used with other controls, such as requiring a compliant device.
183-
1. The password change control can only be used with the user and group assignment condition, cloud app assignment condition (which must be set to "all"), and user risk conditions.
183+
- The policy must be assigned to "all cloud apps." This requirement prevents an attacker from using a different app to change the user's password and resetting their account risk by signing in to a different app.
184+
- **Require password change** can't be used with other controls, such as requiring a compliant device.
185+
- The password change control can only be used with the user and group assignment condition, cloud app assignment condition (which must be set to "all"), and user risk conditions.
184186

185187
### Terms of use
186188

187-
If your organization has created terms of use, other options may be visible under grant controls. These options allow administrators to require acknowledgment of terms of use as a condition of accessing the resources protected by the policy. More information about terms of use can be found in [Azure Active Directory terms of use](terms-of-use.md).
189+
If your organization has created terms of use, other options might be visible under grant controls. These options allow administrators to require acknowledgment of terms of use as a condition of accessing the resources that the policy protects. You can find more information about terms of use in [Azure Active Directory terms of use](terms-of-use.md).
188190

189191
## Next steps
190192

0 commit comments

Comments
 (0)