Skip to content

Commit 630598c

Browse files
Build link fixes
1 parent e0017b8 commit 630598c

19 files changed

+30
-30
lines changed

articles/active-directory/conditional-access/app-based-conditional-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,15 +35,15 @@ In the Conditional Access terminology, these client apps are known as **approved
3535

3636
![Conditional Access](./media/app-based-conditional-access/05.png)
3737

38-
For a list of approved client apps, see [approved client app requirement](technical-reference.md#approved-client-app-requirement).
38+
For a list of approved client apps, see [approved client app requirement](concept-conditional-access-grant.md).
3939

4040
You can combine app-based Conditional Access policies with other policies such as [device-based Conditional Access policies](require-managed-devices.md) to provide flexibility in how to protect data for both personal and corporate devices.
4141

4242
## Before you begin
4343

4444
This topic assumes that you are familiar with:
4545

46-
- The [approved client app requirement](technical-reference.md#approved-client-app-requirement) technical reference.
46+
- The [approved client app requirement](concept-conditional-access-grant.md).
4747
- The basic concepts of [Conditional Access in Azure Active Directory](overview.md).
4848
- How to [configure a Conditional Access policy](app-based-mfa.md).
4949
- The [migration of Conditional Access policies](best-practices.md#policy-migration).

articles/active-directory/conditional-access/app-protection-based-conditional-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In the Conditional Access terminology, these client apps are known to be policy
3535

3636
![Conditional Access](./media/app-protection-based-conditional-access/05.png)
3737

38-
For a list of policy-protected client apps, see [App protection policy requirement](technical-reference.md#approved-client-app-requirement).
38+
For a list of policy-protected client apps, see [App protection policy requirement](concept-conditional-access-grant.md).
3939

4040
You can combine app-protection-based Conditional Access policies with other policies, such as [device-based Conditional Access policies](require-managed-devices.md). This way, you can provide flexibility in how to protect data for both personal and corporate devices.
4141

@@ -54,8 +54,8 @@ Similar to compliance that's reported by Intune for iOS and Android for a manage
5454

5555
This article assumes that you're familiar with:
5656

57-
- The [app protection policy requirement](technical-reference.md#app-protection-policy-requirement) technical reference.
58-
- The [approved client app requirement](technical-reference.md#approved-client-app-requirement) technical reference.
57+
- The [app protection policy requirement](concept-conditional-access-grant.md).
58+
- The [approved client app requirement](concept-conditional-access-grant.md).
5959
- The basic concepts of [Conditional Access in Azure Active Directory](overview.md).
6060
- How to [configure a Conditional Access policy](app-based-mfa.md).
6161

articles/active-directory/conditional-access/app-sign-in-risk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818
---
1919
# Quickstart: Block access when a session risk is detected with Azure Active Directory Conditional Access
2020

21-
To keep your environment protected, you might want to block suspicious users from sign-in. [Azure Active Directory (Azure AD) Identity Protection](../active-directory-identityprotection.md) analyzes each sign-in and calculates the likelihood that a sign-in attempt was not performed by the legitimate owner of a user account. The likelihood (low, medium, high) is indicated in form of a calculated value called [sign-in risk levels](conditions.md#sign-in-risk). By setting the sign-in risk condition, you can configure a Conditional Access policy to respond to specific sign-in risk levels.
21+
To keep your environment protected, you might want to block suspicious users from sign-in. [Azure Active Directory (Azure AD) Identity Protection](../active-directory-identityprotection.md) analyzes each sign-in and calculates the likelihood that a sign-in attempt was not performed by the legitimate owner of a user account. The likelihood (low, medium, high) is indicated in form of a calculated value called [sign-in risk levels](concept-conditional-access-conditions.md#sign-in-risk). By setting the sign-in risk condition, you can configure a Conditional Access policy to respond to specific sign-in risk levels.
2222

2323
This quickstart shows how to configure a [Conditional Access policy](../active-directory-conditional-access-azure-portal.md) that blocks a sign-in when a configured sign-in risk level has been detected.
2424

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ This setting applies to the following client apps:
9494

9595
- The approved client apps support the Intune mobile application management feature.
9696
- The **Require approved client app** requirement:
97-
- Only supports the iOS and Android for [device platform condition](#device-platform-condition).
97+
- Only supports the iOS and Android for device platform condition.
9898
- Conditional Access cannot consider Microsoft Edge in InPrivate mode an approved client app.
9999

100100
### Require app protection policy
@@ -114,7 +114,7 @@ This setting applies to the following client apps:
114114

115115
- Apps for app protection policy support the Intune mobile application management feature with policy protection.
116116
- The **Require app protection policy** requirements:
117-
- Only supports the iOS and Android for [device platform condition](#device-platform-condition).
117+
- Only supports the iOS and Android for device platform condition.
118118

119119
## Next steps
120120

articles/active-directory/conditional-access/controls.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -83,18 +83,18 @@ For more information, see [set up Azure Active Directory device-based Conditiona
8383
Because your employees use mobile devices for both personal and work tasks, you might want to have the ability to protect company data accessed using devices even in the case where they are not managed by you.
8484
You can use [Intune app protection policies](https://docs.microsoft.com/intune/app-protection-policy) to help protect your company’s data independent of any mobile-device management (MDM) solution.
8585

86-
With approved client apps, you can require a client app that attempts to access your cloud apps to support [Intune app protection policies](https://docs.microsoft.com/intune/app-protection-policy). For example, you can restrict access to Exchange Online to the Outlook app. A Conditional Access policy that requires approved client apps is also known as [app-based Conditional Access policy](app-based-conditional-access.md). For a list of supported approved client apps, see [approved client app requirement](technical-reference.md#approved-client-app-requirement).
86+
With approved client apps, you can require a client app that attempts to access your cloud apps to support [Intune app protection policies](https://docs.microsoft.com/intune/app-protection-policy). For example, you can restrict access to Exchange Online to the Outlook app. A Conditional Access policy that requires approved client apps is also known as [app-based Conditional Access policy](app-based-conditional-access.md). For a list of supported approved client apps, see [approved client app requirement](concept-conditional-access-grant.md#require-approved-client-app).
8787

8888
### App protection policy (preview)
8989

9090
Because your employees use mobile devices for both personal and work tasks, you might want to have the ability to protect company data accessed using devices even in the case where they are not managed by you.
9191
You can use [Intune app protection policies](https://docs.microsoft.com/intune/app-protection-policy) to help protect your company’s data independent of any mobile-device management (MDM) solution.
9292

93-
With app protection policy, you can limit access to client applications that have reported to Azure AD has having received [Intune app protection policies](https://docs.microsoft.com/intune/app-protection-policy). For example, you can restrict access to Exchange Online to the Outlook app that has an Intune app protection policy. A Conditional Access policy that requires app protection policy is also known as [app protection-based Conditional Access policy](app-protection-based-conditional-access.md).
93+
With app protection policy, you can limit access to client applications that have reported to Azure AD has having received [Intune app protection policies](https://docs.microsoft.com/intune/app-protection-policy). For example, you can restrict access to Exchange Online to the Outlook app that has an Intune app protection policy. A Conditional Access policy that requires app protection policy is also known as [app protection-based Conditional Access policy](concept-conditional-access-session.md#application-enforced-restrictions).
9494

9595
Your device must be registered to Azure AD before an application can be marked as policy protected.
9696

97-
For a list of supported policy protected client apps, see [app protection policy requirement](technical-reference.md#app-protection-policy-requirement).
97+
For a list of supported policy protected client apps, see [app protection policy requirement](concept-conditional-access-session.md#application-enforced-restrictions).
9898

9999
### Terms of use
100100

articles/active-directory/conditional-access/faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
## Which applications work with Conditional Access policies?
2121

22-
For information about applications that work with Conditional Access policies, see [Applications and browsers that use Conditional Access rules in Azure Active Directory](technical-reference.md).
22+
For information about applications that work with Conditional Access policies, see [Applications and browsers that use Conditional Access rules in Azure Active Directory](concept-conditional-access-cloud-apps.md).
2323

2424
## Are Conditional Access policies enforced for B2B collaboration and guest users?
2525

articles/active-directory/conditional-access/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ landingContent:
3030
- linkListType: concept
3131
links:
3232
- text: What are conditions?
33-
url: conditions.md
33+
url: concept-conditional-access-conditions.md
3434
- text: How can I define locations?
3535
url: location-condition.md
3636
- text: What are controls?

articles/active-directory/conditional-access/plan-conditional-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Use the following example template to create Conditional Access policies for you
5050
|An access attempt is made:<br>- To a cloud app*<br>- By users and groups*<br>Using:<br>- Condition 1 (for example, outside Corp network)<br>- Condition 2 (for example, device platforms)|Grant access with (AND):<br>- Requirement 1 (for example, MFA)<br>- Requirement 2 (for example, Device compliance)|
5151
|An access attempt is made:<br>- To a cloud app*<br>- By users and groups*<br>Using:<br>- Condition 1 (for example, outside Corp network)<br>- Condition 2 (for example, device platforms)|Grant access with (OR):<br>- Requirement 1 (for example, MFA)<br>- Requirement 2 (for example, Device compliance)|
5252

53-
At a minimum, **when this happens** defines the principal (**who**) that attempts to access a cloud app (**what**). If necessary, you can also include **how** an access attempt is performed. In Conditional Access, the elements that define the who, what, and how are known as conditions. For more information, see [What are conditions in Azure Active Directory Conditional Access?](conditions.md)
53+
At a minimum, **when this happens** defines the principal (**who**) that attempts to access a cloud app (**what**). If necessary, you can also include **how** an access attempt is performed. In Conditional Access, the elements that define the who, what, and how are known as conditions. For more information, see [What are conditions in Azure Active Directory Conditional Access?](concept-conditional-access-conditions.md)
5454

5555
With **then do this**, you define the response of your policy to an access condition. In your response, you either block or grant access with additional requirements, for example, multi-factor authentication (MFA). For a complete overview, see [What are access controls in Azure Active Directory Conditional Access?](controls.md)
5656

@@ -113,7 +113,7 @@ Common use cases to require MFA are access:
113113

114114
With Conditional Access policies, you can implement automated responses to sign-ins from potentially compromised identities. The probability that an account has been compromised is expressed in form of risk levels. There are two risk levels calculated by identity protection: sign-in risk and user risk. To implement a response to a sign-in risk, you have two options:
115115

116-
- [The sign-in risk condition](conditions.md#sign-in-risk) in Conditional Access policy
116+
- [The sign-in risk condition](concept-conditional-access-conditions.md#sign-in-risk) in Conditional Access policy
117117
- [The sign-in risk policy](../identity-protection/howto-sign-in-risk-policy.md) in identity protection
118118

119119
Addressing the sign-in risk as condition is the preferred method because it gives you more customization options.

articles/active-directory/conditional-access/policy-migration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ If you have a new policy that has **Exchange Active Sync** as client apps condit
8787

8888
![Conditional Access conditions](./media/policy-migration/16.png)
8989

90-
[App-based](technical-reference.md#approved-client-app-requirement) classic policies for Office 365 Exchange Online that include **Exchange Active Sync** as client apps condition allow **supported** and **unsupported** [device platforms](technical-reference.md#device-platform-condition). While you can't configure individual device platforms in a related new policy, you can limit the support to [supported device platforms](technical-reference.md#device-platform-condition) only.
90+
App-based classic policies for Office 365 Exchange Online that include **Exchange Active Sync** as client apps condition allow **supported** and **unsupported** device platforms. While you can't configure individual device platforms in a related new policy, you can limit the support to [supported device platforms](concept-conditional-access-conditions.md#device-platforms) only.
9191

9292
![Conditional Access select Exchange ActiveSync](./media/policy-migration/65.png)
9393

@@ -107,9 +107,9 @@ In this case, you can consolidate your classic policies into one new policy that
107107

108108
### Device platforms
109109

110-
Classic policies with [app-based controls](technical-reference.md#approved-client-app-requirement) are pre-configured with iOS and Android as the [device platform condition](technical-reference.md#device-platform-condition).
110+
Classic policies with app-based controls are pre-configured with iOS and Android as the device platform condition.
111111

112-
In a new policy, you need to select the [device platforms](technical-reference.md#device-platform-condition) you want to support individually.
112+
In a new policy, you need to select the [device platforms](concept-conditional-access-conditions.md#device-platforms) you want to support individually.
113113

114114
![Conditional Access device platforms selection](./media/policy-migration/41.png)
115115

articles/active-directory/conditional-access/what-if-tool.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,19 +70,19 @@ The IP address is a single IPv4 address to mimic the [location condition](locati
7070

7171
### Device platforms
7272

73-
This setting mimics the [device platforms condition](conditions.md#device-platforms) and represents the equivalent of **All platforms (including unsupported)**.
73+
This setting mimics the [device platforms condition](concept-conditional-access-conditions.md#device-platforms) and represents the equivalent of **All platforms (including unsupported)**.
7474

7575
### Client apps
7676

77-
This setting mimics the [client apps condition](conditions.md#client-apps).
77+
This setting mimics the [client apps condition](concept-conditional-access-conditions.md#client-apps-preview).
7878
By default, this setting causes an evaluation of all policies having **Browser** or **Mobile apps and desktop clients** either individually or both selected. It also detects policies that enforce **Exchange ActiveSync (EAS)**. You can narrow this setting down by selecting:
7979

8080
- **Browser** to evaluate all policies having at least **Browser** selected.
8181
- **Mobile apps and desktop clients** to evaluate all policies having at least **Mobile apps and desktop clients** selected.
8282

8383
### Sign-in risk
8484

85-
This setting mimics the [sign-in risk condition](conditions.md#sign-in-risk).
85+
This setting mimics the [sign-in risk condition](concept-conditional-access-conditions.md#sign-in-risk).
8686

8787
## Evaluation
8888

0 commit comments

Comments
 (0)