Skip to content

Commit 6aa69ff

Browse files
[Azure AD] Conditional Access - All cloud apps
1 parent 29b3a8d commit 6aa69ff

File tree

2 files changed

+20
-2
lines changed

2 files changed

+20
-2
lines changed

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 04/19/2022
9+
ms.date: 07/18/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -150,7 +150,23 @@ Administrators can add any Azure AD registered application to Conditional Access
150150
> [!NOTE]
151151
> Since Conditional Access policy sets the requirements for accessing a service you are not able to apply it to a client (public/native) application. In other words, the policy is not set directly on a client (public/native) application, but is applied when a client calls a service. For example, a policy set on SharePoint service applies to the clients calling SharePoint. A policy set on Exchange applies to the attempt to access the email using Outlook client. That is why client (public/native) applications are not available for selection in the Cloud Apps picker and Conditional Access option is not available in the application settings for the client (public/native) application registered in your tenant.
152152
153-
Some applications don't appear in the picker at all. The only way to include these applications in a Conditional Access policy is to include **All apps**.
153+
Some applications don't appear in the picker at all. The only way to include these applications in a Conditional Access policy is to include **All cloud apps**.
154+
155+
### All cloud Apps
156+
157+
Applying a Conditional Access policy to **All cloud apps** will result in the policy being enforced for all tokens issued to web sites and services. This option includes applications that aren't individually targetable in Conditional Access policy, such as Azure Active Directory.
158+
159+
In some cases, an **All cloud apps** policy could inadvertently block user access. These cases are excluded from policy enforcement and include:
160+
161+
- Services required to achieve the desired security posture. For example, device enrollment calls are excluded from compliant device policy targeted to All cloud apps.
162+
163+
- Calls to Azure AD Graph and MS Graph, to access user profile, group membership and relationship information that is commonly used by applications excluded from policy. The excluded scopes are listed below. Consent is still required for apps to use these permissions.
164+
- For native clients:
165+
- Azure AD Graph: User.read
166+
- MS Graph: User.read, People.read, and UserProfile.read
167+
- For confidential / authenticated clients:
168+
- Azure AD Graph: User.read, User.read.all, and User.readbasic.all
169+
- MS Graph: User.read,User.read.all, User.read.All People.read, People.read.all, GroupMember.Read.All, Member.Read.Hidden, and UserProfile.read
154170

155171
## User actions
156172

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,8 @@ Devices must be registered in Azure AD before they can be marked as compliant. M
6969
> [!NOTE]
7070
> On Windows 7, iOS, Android, macOS, and some third-party web browsers Azure AD identifies the device using a client certificate that is provisioned when the device is registered with Azure AD. When a user first signs in through the browser the user is prompted to select the certificate. The end user must select this certificate before they can continue to use the browser.
7171
72+
You can use the Microsoft Defender for Endpoint app along with the Approved Client app policy in Intune to set device compliance policy Conditional Access policies. There's no exclusion required for the Microsoft Defender for Endpoint app while setting up Conditional Access. Although Microsoft Defender for Endpoint on Android & iOS (App ID - dd47d17a-3194-4d86-bfd5-c6ae6f5651e3) isn't an approved app, it has permission to report device security posture. This permission enables the flow of compliance information to Conditional Access.
73+
7274
### Require hybrid Azure AD joined device
7375

7476
Organizations can choose to use the device identity as part of their Conditional Access policy. Organizations can require that devices are hybrid Azure AD joined using this checkbox. For more information about device identities, see the article [What is a device identity?](../devices/overview.md).

0 commit comments

Comments
 (0)