Skip to content

Commit 4b12f90

Browse files
authored
Merge pull request #203285 from MicrosoftGuyJFlo/ConditionalAccessGrantUpdate
[Azure AD] Conditional Access - Grant screenshot update
2 parents ce64213 + 55c9931 commit 4b12f90

File tree

3 files changed

+11
-11
lines changed

3 files changed

+11
-11
lines changed

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 06/27/2022
9+
ms.date: 06/29/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
Within a Conditional Access policy, an administrator can make use of access controls to either grant or block access to resources.
2121

22-
![Conditional Access policy with a grant control requiring multi-factor authentication](./media/concept-conditional-access-grant/conditional-access-grant.png)
22+
:::image type="content" source="media/concept-conditional-access-session/conditional-access-session.png" alt-text="Screenshot of Conditional Access policy with a grant control requiring multifactor authentication." lightbox="media/concept-conditional-access-session/conditional-access-session.png":::
2323

2424
## Block access
2525

@@ -31,7 +31,7 @@ Block is a powerful control that should be wielded with appropriate knowledge. P
3131

3232
Administrators can choose to enforce one or more controls when granting access. These controls include the following options:
3333

34-
- [Require multi-factor authentication (Azure AD Multi-Factor Authentication)](../authentication/concept-mfa-howitworks.md)
34+
- [Require multifactor authentication (Azure AD Multi-Factor Authentication)](../authentication/concept-mfa-howitworks.md)
3535
- [Require device to be marked as compliant (Microsoft Intune)](/intune/protect/device-compliance-get-started)
3636
- [Require hybrid Azure AD joined device](../devices/concept-azure-ad-join-hybrid.md)
3737
- [Require approved client app](app-based-conditional-access.md)
@@ -45,11 +45,11 @@ When administrators choose to combine these options, they can choose the followi
4545

4646
By default Conditional Access requires all selected controls.
4747

48-
### Require multi-factor authentication
48+
### Require multifactor authentication
4949

50-
Selecting this checkbox will require users to perform Azure AD Multi-Factor Authentication. More information about deploying Azure AD Multi-Factor Authentication can be found in the article [Planning a cloud-based Azure AD Multi-Factor Authentication deployment](../authentication/howto-mfa-getstarted.md).
50+
Selecting this checkbox will require users to perform Azure AD Multifactor Authentication. More information about deploying Azure AD Multifactor Authentication can be found in the article [Planning a cloud-based Azure AD Multifactor Authentication deployment](../authentication/howto-mfa-getstarted.md).
5151

52-
[Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview) satisfies the requirement for multi-factor authentication in Conditional Access policies.
52+
[Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview) satisfies the requirement for multifactor authentication in Conditional Access policies.
5353

5454
### Require device to be marked as compliant
5555

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 04/21/2022
9+
ms.date: 06/29/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -50,9 +50,9 @@ The sign-in frequency setting works with apps that have implemented OAuth2 or OI
5050

5151
The sign-in frequency setting works with 3rd party SAML applications and apps that have implemented OAuth2 or OIDC protocols, as long as they don't drop their own cookies and are redirected back to Azure AD for authentication on regular basis.
5252

53-
### User sign-in frequency and multi-factor authentication
53+
### User sign-in frequency and multifactor authentication
5454

55-
Sign-in frequency previously applied to only to the first factor authentication on devices that were Azure AD joined, Hybrid Azure AD joined, and Azure AD registered. There was no easy way for our customers to re-enforce multi factor authentication (MFA) on those devices. Based on customer feedback, sign-in frequency will apply for MFA as well.
55+
Sign-in frequency previously applied to only to the first factor authentication on devices that were Azure AD joined, Hybrid Azure AD joined, and Azure AD registered. There was no easy way for our customers to re-enforce multifactor authentication (MFA) on those devices. Based on customer feedback, sign-in frequency will apply for MFA as well.
5656

5757
[![Sign in frequency and MFA](media/howto-conditional-access-session-lifetime/conditional-access-flow-chart-small.png)](media/howto-conditional-access-session-lifetime/conditional-access-flow-chart.png#lightbox)
5858

@@ -81,7 +81,7 @@ The public preview supports the following scenarios:
8181

8282
- Require user reauthentication during [Intune device enrollment](/mem/intune/fundamentals/deployment-guide-enrollment), regardless of their current MFA status.
8383
- Require user reauthentication for risky users with the [require password change](concept-conditional-access-grant.md#require-password-change) grant control.
84-
- Require user reauthentication for risky sign-ins with the [require multi-factor authentication](concept-conditional-access-grant.md#require-multi-factor-authentication) grant control.
84+
- Require user reauthentication for risky sign-ins with the [require multifactor authentication](concept-conditional-access-grant.md#require-multifactor-authentication) grant control.
8585

8686
When administrators select **Every time**, it will require full reauthentication when the session is evaluated.
8787

@@ -101,7 +101,7 @@ Conditional Access is an Azure AD Premium capability and requires a premium lice
101101
> [!WARNING]
102102
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft retired the configurable token lifetime feature for refresh and session token lifetimes on January 30, 2021 and replaced it with the Conditional Access authentication session management feature.
103103
>
104-
> Before enabling Sign-in Frequency, make sure other reauthentication settings are disabled in your tenant. If "Remember MFA on trusted devices" is enabled, be sure to disable it before using Sign-in frequency, as using these two settings together may lead to prompting users unexpectedly. To learn more about reauthentication prompts and session lifetime, see the article, [Optimize reauthentication prompts and understand session lifetime for Azure AD Multi-Factor Authentication](../authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md).
104+
> Before enabling Sign-in Frequency, make sure other reauthentication settings are disabled in your tenant. If "Remember MFA on trusted devices" is enabled, be sure to disable it before using Sign-in frequency, as using these two settings together may lead to prompting users unexpectedly. To learn more about reauthentication prompts and session lifetime, see the article, [Optimize reauthentication prompts and understand session lifetime for Azure AD Multifactor Authentication](../authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md).
105105
106106
## Policy deployment
107107

52.8 KB
Loading

0 commit comments

Comments
 (0)