Skip to content

Commit 5d0f514

Browse files
Merge pull request #106721 from MicrosoftGuyJFlo/CustomControlsUpdate
[Azure AD] Conditional Access - Custom controls update
2 parents 0af2d0d + 70f0dbb commit 5d0f514

File tree

1 file changed

+10
-22
lines changed
  • articles/active-directory/conditional-access

1 file changed

+10
-22
lines changed

articles/active-directory/conditional-access/controls.md

Lines changed: 10 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -6,41 +6,25 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: article
9-
ms.date: 02/25/2020
9+
ms.date: 03/18/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: daveba
14-
ms.reviewer: calebb
14+
ms.reviewer: inbarc
1515

1616
ms.collection: M365-identity-device-management
1717
---
1818
# Custom controls (preview)
1919

20-
Custom controls are a capability of the Azure Active Directory Premium P1 edition. When using custom controls, your users are redirected to a compatible service to satisfy further requirements outside of Azure Active Directory. To satisfy this control, a user's browser is redirected to the external service, performs any required authentication or validation activities, and is then redirected back to Azure Active Directory. Azure Active Directory verifies the response and, if the user was successfully authenticated or validated, the user continues in the Conditional Access flow.
20+
Custom controls is a preview capability of the Azure Active Directory. When using custom controls, your users are redirected to a compatible service to satisfy authentication requirements outside of Azure Active Directory. To satisfy this control, a user's browser is redirected to the external service, performs any required authentication, and is then redirected back to Azure Active Directory. Azure Active Directory verifies the response and, if the user was successfully authenticated or validated, the user continues in the Conditional Access flow.
2121

22-
These controls allow the use of certain external or custom services as Conditional Access controls, and generally extend the capabilities of Conditional Access.
23-
24-
Providers currently offering a compatible service include:
25-
26-
- [Duo Security](https://duo.com/docs/azure-ca)
27-
- [Entrust Datacard](https://www.entrustdatacard.com/products/authentication/intellitrust)
28-
- [GSMA](https://mobileconnect.io/azure/)
29-
- [Ping Identity](https://documentation.pingidentity.com/pingid/pingidAdminGuide/index.shtml#pid_c_AzureADIntegration.html)
30-
- [RSA](https://community.rsa.com/docs/DOC-81278)
31-
- [SecureAuth](https://docs.secureauth.com/pages/viewpage.action?pageId=47238992#)
32-
- [Silverfort](https://www.silverfort.io/company/using-silverfort-mfa-with-azure-active-directory/)
33-
- [Symantec VIP](https://help.symantec.com/home/VIP_Integrate_with_Azure_AD)
34-
- [Thales (Gemalto)](https://resources.eu.safenetid.com/help/AzureMFA/Azure_Help/Index.htm)
35-
- [Trusona](https://www.trusona.com/docs/azure-ad-integration-guide)
36-
37-
For more information on those services, contact the providers directly.
22+
> [!NOTE]
23+
> For more information about changes we are planning to the Custom Control capability, see the February 2020 [What's new update](../fundamentals/whats-new.md#upcoming-changes-to-custom-controls).
3824
3925
## Creating custom controls
4026

41-
To create a custom control, you should first contact the provider that you wish to utilize. Each non-Microsoft provider has its own process and requirements to sign up, subscribe, or otherwise become a part of the service, and to indicate that you wish to integrate with Conditional Access. At that point, the provider will provide you with a block of data in JSON format. This data allows the provider and Conditional Access to work together for your tenant, creates the new control and defines how Conditional Access can tell if your users have successfully performed verification with the provider.
42-
43-
Custom controls cannot be used with Identity Protection's automation requiring multi-factor authentication or to elevate roles in Privileged Identity Manager (PIM).
27+
Custom Controls works with a limited set of approved authentication providers. To create a custom control, you should first contact the provider that you wish to utilize. Each non-Microsoft provider has its own process and requirements to sign up, subscribe, or otherwise become a part of the service, and to indicate that you wish to integrate with Conditional Access. At that point, the provider will provide you with a block of data in JSON format. This data allows the provider and Conditional Access to work together for your tenant, creates the new control and defines how Conditional Access can tell if your users have successfully performed verification with the provider.
4428

4529
Copy the JSON data and then paste it into the related textbox. Do not make any changes to the JSON unless you explicitly understand the change you're making. Making any change could break the connection between the provider and Microsoft and potentially lock you and your users out of your accounts.
4630

@@ -64,6 +48,10 @@ To delete a custom control, you must first ensure that it isn't being used in an
6448

6549
To edit a custom control, you must delete the current control and create a new control with the updated information.
6650

51+
## Known limitations
52+
53+
Custom controls cannot be used with Identity Protection's automation requiring Azure Multi-Factor Authentication, Azure AD self-service password reset (SSPR), satisfying multi-factor authentication claim requirements, or to elevate roles in Privileged Identity Manager (PIM).
54+
6755
## Next steps
6856

6957
- [Conditional Access common policies](concept-conditional-access-policy-common.md)

0 commit comments

Comments
 (0)