Skip to content

Commit 99773e0

Browse files
authored
Update 7-secure-access-conditional-access.md
1 parent 97f3c57 commit 99773e0

File tree

1 file changed

+67
-45
lines changed

1 file changed

+67
-45
lines changed

articles/active-directory/fundamentals/7-secure-access-conditional-access.md

Lines changed: 67 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -14,78 +14,100 @@ ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
1515
ms.collection: M365-identity-device-management
1616
---
17+
1718
# Manage external access to resources with Conditional Access policies
1819

19-
[Conditional Access](../conditional-access/overview.md) is the tool Azure AD uses to bring together signals, enforce policies, and determine whether a user should be allowed access to resources. For detailed information on how to create and use Conditional Access policies (Conditional Access policies), see [Plan a Conditional Access deployment](../conditional-access/plan-conditional-access.md).
20+
Conditional Access interprets signals, enforces policies, and determines if a user is granted access to resources. In this article, learn about applying Conditional Access policies to external users. The article assumes you might not have access to entitlement management, which can be used with Conditional Access.
21+
22+
Learn more:
23+
24+
* [What is Conditional Access?](../conditional-access/overview.md)
25+
* [Plan a Conditional Access deployment](../conditional-access/plan-conditional-access.md)
26+
* [What is entitlement management?](../governance/entitlement-management-overview.md)
2027

21-
![Diagram of Conditional Access signals and decisions](media/secure-external-access//7-conditional-access-signals.png)
28+
The following diagram illustrates signals to Conditional Access that trigger access processes.
2229

23-
This article discusses applying Conditional Access policies to external users and assumes you don’t have access to [Entitlement Management](../governance/entitlement-management-overview.md) functionality. Conditional Access policies can be and are used alongside Entitlement Management.
30+
![Diagram of Conditional Access signals and decisions.](media/secure-external-access//7-conditional-access-signals.png)
2431

25-
Earlier in this document set, you [created a security plan](3-secure-access-plan.md) that outlined:
32+
## Align a security plan with Conditional Access polices
2633

27-
* Applications and resources have the same security requirements and can be grouped for access.
28-
* Sign-in requirements for external users.
34+
In the third article, in the set of ten articles, there is guidance on creating a security plan. Use that plan to help create Conditional Access policies for external access. Part of the security plan includes:
2935

30-
You’ll use that plan to create your Conditional Access policies for external access.
36+
* Grouped applications and resources for simplified access
37+
* Sign-in requirements for external users
3138

3239
> [!IMPORTANT]
33-
> Create several internal and external user test accounts so that you can test the policies you create before applying them.
40+
> Create internal and external user test accounts to test policies before applying them.
41+
42+
See article three, [Create a security plan for external access to resources](3-secure-access-plan.md)
3443

3544
## Conditional Access policies for external access
3645

37-
The following are best practices related to governing external access with Conditional Access policies.
46+
The following sections are best practices for governing external access with Conditional Access policies.
47+
48+
### Entitlement management or groups
49+
50+
If you can’t use connected organizations in entitlement management, create an Azure AD security group, or Microsoft 365 Group for partner organizations. Assign users from that partner to the group. You can use the groups in Conditional Access policies.
51+
52+
Learn more:
53+
54+
* [What is entitlement management?](../governance/entitlement-management-overview.md)
55+
* [Manage Azure Active Directory groups and group membership](how-to-manage-groups.md)
56+
* [Overview of Microsoft 365 Groups for administrators](/microsoft-365/admin/create-groups/office-365-groups?view=o365-worldwide&preserve-view=true)
57+
58+
59+
### Conditional Access policy creation
3860

39-
* If you can’t use connected organizations in Entitlement Management, create an Azure AD security group or Microsoft 365 group for each partner organization you work with. Assign all users from that partner to the group. You may then use those groups in Conditional Access policies.
61+
Create as few Conditional Access policies as possible. For applications that have the same access needs, add them all to the same policy.
4062

41-
* Create as few Conditional Access policies as possible. For applications that have the same access needs, add them all to the same policy.
63+
Conditional Access policies can apply to a maximum of 250 applications. If more than 250 Apps have the same access needs, create duplicate policies. Policy A will apply to apps 1-250, policy B will apply to apps 251-500, etc.
4264

43-
> [!NOTE]
44-
> Conditional Access policies can apply to a maximum of 250 applications. If more than 250 Apps have the same access needs, create duplicate policies. Policy A will apply to apps 1-250, policy B will apply to apps 251-500, etc.
65+
### Naming convention
4566

46-
* Clearly name policies specific to external access with a naming convention. One naming convention is *ExternalAccess_actiontaken_AppGroup*. For example a policy for external access that blocks access to finance apps, called ExternalAccess_Block_FinanceApps.
67+
Use a naming convention that clarifies policy purpose. External access examples are:
4768

48-
## Block all external users from resources
69+
* ExternalAccess_actiontaken_AppGroup
70+
* ExternalAccess_Block_FinanceApps
4971

50-
You can block external users from accessing specific sets of resources with Conditional Access policies. Once you’ve determined the set of resources to which you want to block access, create a policy.
72+
## Block external users from resources
5173

52-
To create a policy that blocks access for external users to a set of applications:
74+
You can block external users from accessing resources with Conditional Access policies.
5375

54-
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
55-
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
56-
1. Select **New policy**.
57-
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies, for example ExternalAccess_Block_FinanceApps.
58-
1. Under **Assignments**, select **Users or workload identities**.
59-
1. Under **Include**, select **All guests and external users**.
60-
1. Under **Exclude**, select **Users and groups** and choose your organization's [emergency access or break-glass accounts](../roles/security-emergency-access.md).
61-
1. Select **Done**.
62-
1. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
63-
1. Under **Exclude**, select any applications that shouldn’t be blocked.
64-
1. Under **Access controls** > **Grant**, select **Block access**, and choose **Select**.
65-
1. Confirm your settings and set **Enable policy** to **Report-only**.
66-
1. Select **Create** to create to enable your policy.
76+
Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
77+
Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
78+
Select **New policy**.
79+
Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies, for example ExternalAccess_Block_FinanceApps.
80+
Under **Assignments**, select **Users or workload identities**.
81+
Under **Include**, select **All guests and external users**.
82+
Under **Exclude**, select **Users and groups** and choose your organization's [emergency access or break-glass accounts](../roles/security-emergency-access.md).
83+
Select **Done**.
84+
Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
85+
Under **Exclude**, select any applications that shouldn’t be blocked.
86+
Under **Access controls** > **Grant**, select **Block access**, and choose **Select**.
87+
Confirm your settings and set **Enable policy** to **Report-only**.
88+
Select **Create** to create to enable your policy.
6789

6890
After confirming your settings using [report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
6991

7092
### Block external access to all except specific external users
7193

7294
There may be times you want to block external users except a specific group. For example, you may want to block all external users except those working for the finance team from the finance applications. To do this [Create a security group](active-directory-groups-create-azure-portal.md) to contain the external users who should access the finance applications:
7395

74-
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
75-
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
76-
1. Select **New policy**.
77-
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies, for example ExternalAccess_Block_AllButFinance.
78-
1. Under **Assignments**, select **Users or workload identities**.
79-
1. Under **Include**, select **All guests and external users**.
80-
1. Under **Exclude**, select **Users and groups**,
81-
1. Choose your organization's [emergency access or break-glass accounts](../roles/security-emergency-access.md).
82-
1. Choose the security group of external users you want to exclude from being blocked from specific applications.
83-
1. Select **Done**.
84-
1. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
85-
1. Under **Exclude**, select the finance applications that shouldn’t be blocked.
86-
1. Under **Access controls** > **Grant**, select **Block access**, and choose **Select**.
87-
1. Confirm your settings and set **Enable policy** to **Report-only**.
88-
1. Select **Create** to create to enable your policy.
96+
Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
97+
Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
98+
Select **New policy**.
99+
Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies, for example ExternalAccess_Block_AllButFinance.
100+
Under **Assignments**, select **Users or workload identities**.
101+
Under **Include**, select **All guests and external users**.
102+
Under **Exclude**, select **Users and groups**,
103+
Choose your organization's [emergency access or break-glass accounts](../roles/security-emergency-access.md).
104+
Choose the security group of external users you want to exclude from being blocked from specific applications.
105+
Select **Done**.
106+
Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
107+
Under **Exclude**, select the finance applications that shouldn’t be blocked.
108+
Under **Access controls** > **Grant**, select **Block access**, and choose **Select**.
109+
Confirm your settings and set **Enable policy** to **Report-only**.
110+
Select **Create** to create to enable your policy.
89111

90112
After confirming your settings using [report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
91113

0 commit comments

Comments
 (0)