Skip to content

Commit 5e126c6

Browse files
authored
Merge pull request #177702 from MicrosoftGuyJFlo/CAEDocUpdate
[Azure AD] Conditional Access - CAE Content Updates
2 parents 6db1c83 + 889e87a commit 5e126c6

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

articles/active-directory/conditional-access/concept-conditional-access-session.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -71,14 +71,14 @@ For more information, see the article [Configure authentication session manageme
7171

7272
## Customize continuous access evaluation
7373

74-
[Continuous access evaluation](concept-continuous-access-evaluation.md) is auto enabled as part of an organization's Conditional Access policies. For organizations who wish to disable or strictly enforce continuous access evaluation, this configuration is now an option within the session control within Conditional Access. Admins can make this selection while creating a new policy or while editing an existing Conditional Access policy.
74+
[Continuous access evaluation](concept-continuous-access-evaluation.md) is auto enabled as part of an organization's Conditional Access policies. For organizations who wish to disable or strictly enforce continuous access evaluation, this configuration is now an option within the session control within Conditional Access. Continuous access evaluation policies can be scoped to all users or specific users and groups. Admins can make the following selections while creating a new policy or while editing an existing Conditional Access policy.
7575

76-
**Disable** works when **All cloud apps** are selected, and no conditions are selected.
76+
- **Disable** is accomplished when **All cloud apps** are selected, no conditions are selected, and **Disable** is selected under **Session** > **Customize continuous access evaluation** in a Conditional Access policy.
77+
- **Strict enforcement** means that any critical event and policy will be enforced in real time. All CAE-capable services always get CAE tokens, whatever the client or user might ask for or do. There are two scenarios where CAE won't come into play when strict enforcement mode is turned on:
78+
- Non-CAE capable clients shouldn't get a regular token for CAE-capable services.
79+
- Reject when IP seen by resource provider isn't in the allowed range.
7780

78-
**Strict enforcement** means that any critical event and policy will be enforced in real time. All CAE-capable services always get CAE tokens, whatever the client or user might ask for or do. There are two scenarios where CAE won't come into play when strict enforcement mode is turned on:
79-
80-
- Non-CAE capable clients shouldn't get a regular token for CAE-capable services.
81-
- Reject when IP seen by resource provider isn't in the allowed range.
81+
:::image type="content" source="media/concept-conditional-access-session/continuous-access-evaluation-session-controls.png" alt-text="CAE Settings in a new Conditional Access policy in the Azure portal." lightbox="media/concept-conditional-access-session/continuous-access-evaluation-session-controls.png":::
8282

8383
## Disable resilience defaults (Preview)
8484

Loading

0 commit comments

Comments
 (0)