You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/overview.md
+34-16Lines changed: 34 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,25 +6,27 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: overview
9
-
ms.date: 02/13/2023
9
+
ms.date: 06/20/2023
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
13
13
manager: amycolannino
14
-
ms.reviewer: calebb
14
+
ms.reviewer: kvenkit
15
15
16
16
ms.collection: M365-identity-device-management
17
17
ms.custom: zt-include
18
18
---
19
19
# What is Conditional Access?
20
20
21
-
The modern security perimeter now extends beyond an organization's network to include user and device identity. Organizations can use identity-driven signals as part of their access control decisions.
21
+
Microsoft is providing Conditional Access templates to organizations in report-only mode starting in January of 2023. We may add more policies as new threats emerge.
22
+
23
+
The modern security perimeter extends beyond an organization's network perimeter to include user and device identity. Organizations now use identity-driven signals as part of their access control decisions.
Conditional Access brings signals together, to make decisions, and enforce organizational policies. Azure AD Conditional Access is at the heart of the new identity-driven control plane.
27
+
Azure AD Conditional Access brings signals together, to make decisions, and enforce organizational policies. Conditional Access is Microsoft's [Zero Trust policy engine](/security/zero-trust/deploy/identity) taking signals from various sources into account when enforcing policy decisions.
26
28
27
-

29
+
:::image type="content" source="media/overview/conditional-access-signal-decision-enforcement.png" alt-text="Diagram showing concept of Conditional Access signals plus decision to enforce organizational policy.":::
28
30
29
31
Conditional Access policies at their simplest are if-then statements, if a user wants to access a resource, then they must complete an action. Example: A payroll manager wants to access the payroll application and is required to do multifactor authentication to access it.
30
32
@@ -35,14 +37,16 @@ Administrators are faced with two primary goals:
35
37
36
38
Use Conditional Access policies to apply the right access controls when needed to keep your organization secure.
37
39
38
-

39
-
40
40
> [!IMPORTANT]
41
41
> Conditional Access policies are enforced after first-factor authentication is completed. Conditional Access isn't intended to be an organization's first line of defense for scenarios like denial-of-service (DoS) attacks, but it can use signals from these events to determine access.
42
42
43
43
## Common signals
44
44
45
-
Common signals that Conditional Access can take in to account when making a policy decision include the following signals:
45
+
Conditional Access takes signals from various sources into account when making access decisions.
46
+
47
+
:::image type="content" source="media/overview/conditional-access-central-policy-engine-zero-trust.png" alt-text="Diagram showing Conditional Access as the Zero Trust policy engine aggregating signals from various sources.":::
48
+
49
+
These signals include:
46
50
47
51
- User or group membership
48
52
- Policies can be targeted to specific users and groups giving administrators fine-grained control over access.
@@ -55,21 +59,24 @@ Common signals that Conditional Access can take in to account when making a poli
55
59
- Application
56
60
- Users attempting to access specific applications can trigger different Conditional Access policies.
57
61
- Real-time and calculated risk detection
58
-
- Signals integration with [Azure AD Identity Protection](../identity-protection/overview-identity-protection.md) allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to change their password, do multifactor authentication to reduce their risk level, or block access until an administrator takes manual action.
62
+
- Signals integration with [Azure AD Identity Protection](../identity-protection/overview-identity-protection.md) allows Conditional Access policies to identify and remediate risky users and sign-in behavior.
59
63
-[Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps)
60
-
- Enables user application access and sessions to be monitored and controlled in real time, increasing visibility and control over access to and activities done within your cloud environment.
64
+
- Enables user application access and sessions to be monitored and controlled in real time. This integration increases visibility and control over access to and activities done within your cloud environment.
61
65
62
66
## Common decisions
63
67
64
68
- Block access
65
69
- Most restrictive decision
66
70
- Grant access
67
-
-Least restrictive decision, can still require one or more of the following options:
71
+
-Less restrictive decision, can require one or more of the following options:
68
72
- Require multifactor authentication
73
+
- Require authentication strength
69
74
- Require device to be marked as compliant
70
75
- Require Hybrid Azure AD joined device
71
76
- Require approved client app
72
-
- Require app protection policy (preview)
77
+
- Require app protection policy
78
+
- Require password change
79
+
- Require terms of use
73
80
74
81
## Commonly applied policies
75
82
@@ -83,6 +90,20 @@ Many organizations have [common access concerns that Conditional Access policies
83
90
- Blocking risky sign-in behaviors
84
91
- Requiring organization-managed devices for specific applications
85
92
93
+
Administrators can create policies from scratch or start from a template policy in the portal or using the Microsoft Graph API.
94
+
95
+
## Administrator experience
96
+
97
+
Administrators with the [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator) role can manage policies in Azure AD.
98
+
99
+
Conditional Access is found in the Azure portal under **Azure Active Directory** > **Security** > **Conditional Access**.
100
+
101
+
:::image type="content" source="media/overview/conditional-access-overview.png" alt-text="Screenshot of the Conditional Access overview page in the Azure portal." lightbox="media/overview/conditional-access-overview.png":::
102
+
103
+
- The **Overview** page provides a summary of policy state, users, devices, and applications as well as general and security alerts with suggestions.
104
+
- The **Coverage** page provides a synopsis of applications with and without Conditional Access policy coverage over the last seven days.
105
+
- The **Monitoring** page allows administrators to see a graph of sign-ins that can be filtered to see potential gaps in policy coverage.
Other products and features that may interact with Conditional Access policies require appropriate licensing for those products and features.
95
116
96
-
When licenses required for Conditional Access expire, policies aren't automatically disabled or deleted so customers can migrate away from Conditional Access policies without a sudden change in their security posture. Remaining policies can be viewed and deleted, but no longer updated.
117
+
When licenses required for Conditional Access expire, policies aren't automatically disabled or deleted. This grants customers the ability to migrate away from Conditional Access policies without a sudden change in their security posture. Remaining policies can be viewed and deleted, but no longer updated.
97
118
98
119
[Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) help protect against identity-related attacks and are available for all customers.
99
120
@@ -103,6 +124,3 @@ When licenses required for Conditional Access expire, policies aren't automatica
103
124
104
125
-[Building a Conditional Access policy piece by piece](concept-conditional-access-policies.md)
105
126
-[Plan your Conditional Access deployment](plan-conditional-access.md)
106
-
-[Learn about Identity Protection](../identity-protection/overview-identity-protection.md)
107
-
-[Learn about Microsoft Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security)
0 commit comments