Skip to content

Commit 4f0189d

Browse files
[Azure AD] Conditional Access - Auth context GA updates
1 parent 6fd17c3 commit 4f0189d

File tree

1 file changed

+10
-8
lines changed

1 file changed

+10
-8
lines changed

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 08/09/2022
9+
ms.date: 09/14/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -21,7 +21,7 @@ Cloud apps, actions, and authentication context are key signals in a Conditional
2121

2222
- Administrators can choose from the list of applications that include built-in Microsoft applications and any [Azure AD integrated applications](../manage-apps/what-is-application-management.md) including gallery, non-gallery, and applications published through [Application Proxy](../app-proxy/what-is-application-proxy.md).
2323
- Administrators may choose to define policy not based on a cloud application but on a [user action](#user-actions) like **Register security information** or **Register or join devices**, allowing Conditional Access to enforce controls around those actions.
24-
- Administrators can use [authentication context](#authentication-context-preview) to provide an extra layer of security in applications.
24+
- Administrators can use [authentication context](#authentication-context) to provide an extra layer of security in applications.
2525

2626
![Define a Conditional Access policy and specify cloud apps](./media/concept-conditional-access-cloud-apps/conditional-access-cloud-apps-or-actions.png)
2727

@@ -185,7 +185,7 @@ User actions are tasks that can be performed by a user. Currently, Conditional A
185185
- `Client apps`, `Filters for devices` and `Device state` conditions aren't available with this user action since they're dependent on Azure AD device registration to enforce Conditional Access policies.
186186
- When a Conditional Access policy is enabled with this user action, you must set **Azure Active Directory** > **Devices** > **Device Settings** - `Devices to be Azure AD joined or Azure AD registered require Multi-Factor Authentication` to **No**. Otherwise, the Conditional Access policy with this user action isn't properly enforced. More information about this device setting can found in [Configure device settings](../devices/device-management-azure-portal.md#configure-device-settings).
187187

188-
## Authentication context (Preview)
188+
## Authentication context
189189

190190
Authentication context can be used to further secure data and actions in applications. These applications can be your own custom applications, custom line of business (LOB) applications, applications like SharePoint, or applications protected by Microsoft Defender for Cloud Apps.
191191

@@ -197,11 +197,7 @@ Authentication contexts are managed in the Azure portal under **Azure Active Dir
197197

198198
![Manage authentication context in the Azure portal](./media/concept-conditional-access-cloud-apps/conditional-access-authentication-context-get-started.png)
199199

200-
> [!WARNING]
201-
> * Deleting authentication context definitions is not possible during the preview.
202-
> * The preview is limited to a total of 25 authentication context definitions in the Azure portal.
203-
204-
Create new authentication context definitions by selecting **New authentication context** in the Azure portal. Configure the following attributes:
200+
Create new authentication context definitions by selecting **New authentication context** in the Azure portal. Organizations are limited to a total of 25 authentication context definitions. Configure the following attributes:
205201

206202
- **Display name** is the name that is used to identify the authentication context in Azure AD and across applications that consume authentication contexts. We recommend names that can be used across resources, like "trusted devices", to reduce the number of authentication contexts needed. Having a reduced set limits the number of redirects and provides a better end to end-user experience.
207203
- **Description** provides more information about the policies it's used by Azure AD administrators and those applying authentication contexts to resources.
@@ -214,6 +210,12 @@ Administrators can select published authentication contexts in their Conditional
214210

215211
:::image type="content" source="media/concept-conditional-access-cloud-apps/conditional-access-authentication-context-in-policy.png" alt-text="Adding a Conditional Access authentication context to a policy":::
216212

213+
#### Delete an authentication context
214+
215+
When you delete an authentication context, make sure no applications are still using it. Otherwise access to app data will no longer be protected. You can confirm this prerequisite by checking sign-in logs for cases when the authentication context Conditional Access policies are being applied.
216+
217+
To delete an authentication context, it must have no assigned Conditional Access policies and must not be published to apps. This requirement helps prevent the accidental deletion of an authentication context that is still in use.
218+
217219
### Tag resources with authentication contexts
218220

219221
For more information about authentication context use in applications, see the following articles.

0 commit comments

Comments
 (0)