Skip to content

Commit 779276f

Browse files
Merge pull request #226422 from MicrosoftGuyJFlo/RetireApprovedClientApp
[Azure AD] Conditional Access - Retire Approved Client App
2 parents f5cd1d4 + 82a4e21 commit 779276f

File tree

3 files changed

+88
-1
lines changed

3 files changed

+88
-1
lines changed

articles/active-directory/conditional-access/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,8 @@
122122
href: troubleshoot-conditional-access-what-if.md
123123
- name: Troubleshoot continuous access evaluation
124124
href: howto-continuous-access-evaluation-troubleshoot.md
125+
- name: Approved client app migration
126+
href: migrate-approved-client-app.md
125127
- name: Custom controls
126128
href: controls.md
127129
- name: Classic policies

articles/active-directory/conditional-access/howto-policy-approved-app-or-app-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,4 +94,4 @@ After confirming your settings using [report-only mode](howto-conditional-access
9494

9595
[Conditional Access common policies](concept-conditional-access-policy-common.md)
9696

97-
[Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)
97+
[Migrate approved client app to application protection policy in Conditional Access](migrate-approved-client-app.md)
Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,85 @@
1+
---
2+
title: Migrate approved client app to application protection policy in Conditional Access
3+
description: The approved client app control is going away. Migrate to App protection policies.
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: conditional-access
8+
ms.topic: how-to
9+
ms.date: 03/28/2023
10+
11+
ms.author: joflore
12+
author: MicrosoftGuyJFlo
13+
manager: amycolannino
14+
ms.reviewer: jogro
15+
16+
ms.collection: M365-identity-device-management
17+
---
18+
# Migrate approved client app to application protection policy in Conditional Access
19+
20+
In this article, you learn how to migrate from the approved client app Conditional Access grant to the application protection policy grant. App protection policies provide the same data loss and protection as approved client app policies, but with other benefits. For more information about the benefits of using app protection policies, see the article [App protection policies overview](/mem/intune/apps/app-protection-policy).
21+
22+
The approved client app grant is retiring in early March 2026. Organizations must transition all current Conditional Access policies that use only the Require Approved Client App grant to Require Approved Client App or Application Protection Policy by March 2026. Additionally, for any new Conditional Access policy, only apply the Require application protection policy grant.
23+
24+
After March 2026, Microsoft will stop enforcing require approved client app control, and it will be as if this grant isn't selected. Use the following steps before March 2026 to protect your organization’s data.
25+
26+
## Edit an existing Conditional Access policy
27+
28+
Require approved client apps or app protection policy with mobile devices
29+
30+
The following steps make an existing Conditional Access policy require an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an app protection policy created in Microsoft Intune.
31+
32+
Organizations can choose to update their policies using the following steps.
33+
34+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
35+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
36+
1. Select a policy that uses the approved client app grant.
37+
1. Under **Access controls** > **Grant**, select **Grant access**.
38+
1. Select **Require approved client app** and **Require app protection policy**
39+
1. **For multiple controls** select **Require one of the selected controls**
40+
1. Confirm your settings and set **Enable policy** to **Report-only**.
41+
1. Select **Create** to create to enable your policy.
42+
43+
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
44+
45+
Repeat the previous steps on all of your policies that use the approved client app grant.
46+
47+
> [!WARNING]
48+
> Not all applications that are supported as approved applications or support application protection policies. For a list of some common client apps, see [App protection policy requirement](concept-conditional-access-grant.md#require-app-protection-policy). If your application is not listed there, contact the application developer.
49+
50+
## Create a Conditional Access policy
51+
52+
Require app protection policy with mobile devices
53+
54+
The following steps help create a Conditional Access policy requiring an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an [app protection policy created in Microsoft Intune](/mem/intune/apps/app-protection-policies).
55+
56+
Organizations can choose to deploy this policy using the following steps.
57+
58+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
59+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
60+
1. Select **New policy**.
61+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
62+
1. Under **Assignments**, select **Users or workload identities**.
63+
1. Under **Include**, select **All users**.
64+
1. Under **Exclude**, select **Users and groups** and exclude at least one account to prevent yourself from being locked out. If you don't exclude any accounts, you can't create the policy.
65+
1. Under **Cloud apps or actions**, select **All cloud apps**.
66+
1. Under **Conditions** > **Device platforms**, set **Configure** to **Yes**.
67+
1. Under **Include**, **Select device platforms**.
68+
1. Choose **Android** and **iOS**
69+
1. Select **Done**.
70+
1. Under **Access controls** > **Grant**, select **Grant access**.
71+
1. Select **Require approved client app** and **Require app protection policy**
72+
1. **For multiple controls** select **Require one of the selected controls**
73+
1. Confirm your settings and set **Enable policy** to **Report-only**.
74+
1. Select **Create** to create to enable your policy.
75+
76+
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
77+
78+
> [!NOTE]
79+
> If an app does not support **Require app protection policy**, end users trying to access resources from that app will be blocked.
80+
81+
## Next steps
82+
83+
For more information on application protection policies, see:
84+
85+
[App protection policies overview](/mem/intune/apps/app-protection-policy)

0 commit comments

Comments
 (0)