Skip to content

Commit 71b9fca

Browse files
committed
fixing bookmarks
1 parent d1db04f commit 71b9fca

File tree

3 files changed

+10
-10
lines changed

3 files changed

+10
-10
lines changed

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ ms.collection: M365-identity-device-management
1616
---
1717
# Conditional Access: Grant
1818

19-
Within a **Conditional Access policy**, an administrator can use access controls to grant or block access to resources.
19+
Within a Conditional Access policy, an administrator can use access controls to grant or block access to resources.
2020

21-
:::image type="content" source="media/concept-conditional-access-session/conditional-access-session.png" alt-text="Screenshot of a Conditional Access policy with a grant control that requires Multi-Factor Authentication." lightbox="media/concept-conditional-access-session/conditional-access-session.png":::
21+
:::image type="content" source="media/concept-conditional-access-session/conditional-access-session.png" alt-text="Screenshot of a Conditional Access policy with a grant control that requires multifactor authentication." lightbox="media/concept-conditional-access-session/conditional-access-session.png":::
2222

2323
## Block access
2424

@@ -48,11 +48,11 @@ By default, Conditional Access requires all selected controls.
4848

4949
Selecting this checkbox requires users to perform Azure Active Directory (Azure AD) Multi-factor Authentication. You can find more information about deploying Azure AD Multi-Factor Authentication in [Planning a cloud-based Azure AD Multi-Factor Authentication deployment](../authentication/howto-mfa-getstarted.md).
5050

51-
[Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview) satisfies the requirement for Multi-Factor Authentication in Conditional Access policies.
51+
[Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview) satisfies the requirement for multifactor authentication in Conditional Access policies.
5252

5353
### Require device to be marked as compliant
5454

55-
Organizations that have deployed Intune can use the information returned from their devices to identify devices that meet specific policy compliance requirements. Intune sends compliance information to Azure AD so Conditional Access can decide to grant or block access to resources. For more information about compliance policies, see [Set rules on devices to allow access to resources in your organization using Intune](/intune/protect/device-compliance-get-started).
55+
Organizations that have deployed Intune can use the information returned from their devices to identify devices that meet specific policy compliance requirements. Intune sends compliance information to Azure AD so Conditional Access can decide to grant or block access to resources. For more information about compliance policies, see [Set rules on devices to allow access to resources in your organization by using Intune](/intune/protect/device-compliance-get-started).
5656

5757
A device can be marked as compliant by Intune (for any device operating system or by a third-party mobile device management system for Windows 10 devices. You can find a list of supported third-party mobile device management systems in [Support third-party device compliance partners in Intune](/mem/intune/protect/device-compliance-partners).
5858

@@ -74,7 +74,7 @@ You can use the Microsoft Defender for Endpoint app with the approved client app
7474

7575
Organizations can choose to use the device identity as part of their Conditional Access policy. Organizations can require that devices are hybrid Azure AD joined by using this checkbox. For more information about device identities, see [What is a device identity?](../devices/overview.md).
7676

77-
When you use the [device-code OAuth flow](../develop/v2-oauth2-device-code.md), the grant control required for the managed device or a device state condition isn't supported. This is because the device that is performing authentication can't provide its device state to the device that is providing a code. Also, the device state in the token is locked to the device performing authentication. Use the **require Multi-Factor Authentication** control instead.
77+
When you use the [device-code OAuth flow](../develop/v2-oauth2-device-code.md), the required grant control for the managed device or a device state condition isn't supported. This is because the device that is performing authentication can't provide its device state to the device that is providing a code. Also, the device state in the token is locked to the device performing authentication. Use the **require Multi-Factor Authentication** control instead.
7878

7979
The control:
8080
- Only supports domain-joined Windows down-level (pre Windows 10) and Windows-current (Windows 10+) devices.
@@ -122,8 +122,8 @@ The following client apps support this setting:
122122
**Remarks**
123123
- The approved client apps support the Intune mobile application management feature.
124124
- The **Require approved client app** requirement:
125-
- Only supports the iOS and Android for device platform condition.
126-
- Requires a broker app to register the device. The broker app can be the Microsoft Authenticator for iOS, or either the Microsoft Authenticator or Microsoft Company portal for Android devices.
125+
- Only supports the iOS and Android for device platform condition.
126+
- Requires a broker app to register the device. The broker app can be the Microsoft Authenticator for iOS, or either the Microsoft Authenticator or Microsoft Company portal for Android devices.
127127
- Conditional Access can't consider Microsoft Edge in InPrivate mode an approved client app.
128128
- Conditional Access policies that require Microsoft Power BI as an approved client app don't support using Azure AD Application Proxy to connect the Power BI mobile app to the on-premises Power BI Report Server.
129129

@@ -173,7 +173,7 @@ See [Require app protection policy and an approved client app for cloud app acce
173173

174174
When user risk is detected, administrators can employ the user risk policy conditions to have the user securely change a password by using Azure AD self-service password reset. Users can perform a self-service password reset to self-remediate. This process will close the user risk event to prevent unnecessary alerts for administrators.
175175

176-
When a user is prompted to change a password, they'll first be required to complete Multi-Factor Authentication. Make sure all users have registered for Multi-Factor Authentication, so they're prepared in case risk is detected for their account.
176+
When a user is prompted to change a password, they'll first be required to complete multifactor authentication. Make sure all users have registered for multifactor authentication, so they're prepared in case risk is detected for their account.
177177

178178
> [!WARNING]
179179
> Users must have previously registered for self-service password reset before triggering the user risk policy.

articles/active-directory/conditional-access/concept-conditional-access-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ All policies are enforced in two phases:
3636
- Use the session details gathered in phase 1 to identify any requirements that haven't been met.
3737
- If there's a policy that is configured to block access, with the block grant control, enforcement will stop here and the user will be blocked.
3838
- The user will be prompted to complete more grant control requirements that weren't satisfied during phase 1 in the following order, until policy is satisfied:
39-
- [Multi-factor authentication​](concept-conditional-access-grant.md#require-multifactor-authentication)
39+
- [Multi-factor authentication​](concept-conditional-access-grant.md#require-multi-factor-authentication)
4040
- [Device to be marked as compliant](./concept-conditional-access-grant.md#require-device-to-be-marked-as-compliant)
4141
- [Hybrid Azure AD joined device](./concept-conditional-access-grant.md#require-hybrid-azure-ad-joined-device)
4242
- [Approved client app](./concept-conditional-access-grant.md#require-approved-client-app)

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ The public preview supports the following scenarios:
8181

8282
- Require user reauthentication during [Intune device enrollment](/mem/intune/fundamentals/deployment-guide-enrollment), regardless of their current MFA status.
8383
- Require user reauthentication for risky users with the [require password change](concept-conditional-access-grant.md#require-password-change) grant control.
84-
- Require user reauthentication for risky sign-ins with the [require multifactor authentication](concept-conditional-access-grant.md#require-multifactor-authentication) grant control.
84+
- Require user reauthentication for risky sign-ins with the [require multi-factor authentication](concept-conditional-access-grant.md#require-multifactor-authentication) grant control.
8585

8686
When administrators select **Every time**, it will require full reauthentication when the session is evaluated.
8787

0 commit comments

Comments
 (0)