Skip to content

Commit 9cd3e26

Browse files
authored
Merge pull request #106826 from smithre4/patch-4
Update app-protection-based-conditional-access.md
2 parents 93021c2 + 490f1e7 commit 9cd3e26

File tree

1 file changed

+7
-4
lines changed

1 file changed

+7
-4
lines changed

articles/active-directory/conditional-access/app-protection-based-conditional-access.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,9 @@ In the Conditional Access, these client apps are known to be protected with an a
2828

2929
For a list of eligible client apps, see [App protection policy requirement](concept-conditional-access-grant.md).
3030

31+
> [!NOTE]
32+
> The or clause is used within the policy to enable users to utilize apps that support either the **Require app protection policy** or **Require approved client app** grant controls. For more information on which apps support the **Require app protection policy** grant control, see [App protection policy requirement](concept-conditional-access-grant.md).
33+
3134
## Scenario 1: Office 365 apps require approved apps with app protection policies
3235

3336
In this scenario, Contoso has decided that all mobile access to Office 365 resources must use approved client apps, like Outlook mobile, OneDrive, and Microsoft Teams protected by an app protection policy prior to receiving access. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.
@@ -53,7 +56,7 @@ Organizations must complete the following steps in order to require the use of a
5356
1. Under **Access controls** > **Grant**, select the following options:
5457
- **Require approved client app**
5558
- **Require app protection policy (preview)**
56-
- **Require all of the selected controls**
59+
- **Require one of the selected controls**
5760
1. Confirm your settings and set **Enable policy** to **On**.
5861
1. Select **Create** to create and enable your policy.
5962

@@ -72,7 +75,7 @@ For the Conditional Access policy in this step, configure the following componen
7275
1. **Client apps (preview)**:
7376
1. Set **Configure** to **Yes**.
7477
1. Select **Mobile apps and desktop clients** and **Exchange ActiveSync clients**.
75-
1. Under **Access controls** > **Grant**, select **Grant access**, **Require approved client app**, and select **Select**.
78+
1. Under **Access controls** > **Grant**, select **Grant access**, **Require app protection policy**, and select **Select**.
7679
1. Confirm your settings and set **Enable policy** to **On**.
7780
1. Select **Create** to create and enable your policy.
7881

@@ -105,7 +108,7 @@ Organizations must complete the following three steps in order to require the us
105108
1. Under **Access controls** > **Grant**, select the following options:
106109
- **Require approved client app**
107110
- **Require app protection policy (preview)**
108-
- **Require all of the selected controls**
111+
- **Require one of the selected controls**
109112
1. Confirm your settings and set **Enable policy** to **On**.
110113
1. Select **Create** to create and enable your policy.
111114

@@ -122,7 +125,7 @@ Organizations must complete the following three steps in order to require the us
122125
1. **Client apps (preview)**:
123126
1. Set **Configure** to **Yes**.
124127
1. Select **Mobile apps and desktop clients** and **Exchange ActiveSync clients**.
125-
1. Under **Access controls** > **Grant**, select **Grant access**, **Require approved client app**, and select **Select**.
128+
1. Under **Access controls** > **Grant**, select **Grant access**, **Require app protection policy**, and select **Select**.
126129
1. Confirm your settings and set **Enable policy** to **On**.
127130
1. Select **Create** to create and enable your policy.
128131

0 commit comments

Comments
 (0)