You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/app-protection-based-conditional-access.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,6 +28,9 @@ In the Conditional Access, these client apps are known to be protected with an a
28
28
29
29
For a list of eligible client apps, see [App protection policy requirement](concept-conditional-access-grant.md).
30
30
31
+
> [!NOTE]
32
+
> The or clause is used within the policy to enable users to utilize apps that support either the **Require app protection policy** or **Require approved client app** grant controls. For more information on which apps support the **Require app protection policy** grant control, see [App protection policy requirement](concept-conditional-access-grant.md).
In this scenario, Contoso has decided that all mobile access to Office 365 resources must use approved client apps, like Outlook mobile, OneDrive, and Microsoft Teams protected by an app protection policy prior to receiving access. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.
@@ -53,7 +56,7 @@ Organizations must complete the following steps in order to require the use of a
53
56
1. Under **Access controls** > **Grant**, select the following options:
54
57
-**Require approved client app**
55
58
-**Require app protection policy (preview)**
56
-
-**Require all of the selected controls**
59
+
-**Require one of the selected controls**
57
60
1. Confirm your settings and set **Enable policy** to **On**.
58
61
1. Select **Create** to create and enable your policy.
59
62
@@ -72,7 +75,7 @@ For the Conditional Access policy in this step, configure the following componen
72
75
1.**Client apps (preview)**:
73
76
1. Set **Configure** to **Yes**.
74
77
1. Select **Mobile apps and desktop clients** and **Exchange ActiveSync clients**.
75
-
1. Under **Access controls** > **Grant**, select **Grant access**, **Require approved client app**, and select **Select**.
78
+
1. Under **Access controls** > **Grant**, select **Grant access**, **Require app protection policy**, and select **Select**.
76
79
1. Confirm your settings and set **Enable policy** to **On**.
77
80
1. Select **Create** to create and enable your policy.
78
81
@@ -105,7 +108,7 @@ Organizations must complete the following three steps in order to require the us
105
108
1. Under **Access controls** > **Grant**, select the following options:
106
109
-**Require approved client app**
107
110
-**Require app protection policy (preview)**
108
-
-**Require all of the selected controls**
111
+
-**Require one of the selected controls**
109
112
1. Confirm your settings and set **Enable policy** to **On**.
110
113
1. Select **Create** to create and enable your policy.
111
114
@@ -122,7 +125,7 @@ Organizations must complete the following three steps in order to require the us
122
125
1.**Client apps (preview)**:
123
126
1. Set **Configure** to **Yes**.
124
127
1. Select **Mobile apps and desktop clients** and **Exchange ActiveSync clients**.
125
-
1. Under **Access controls** > **Grant**, select **Grant access**, **Require approved client app**, and select **Select**.
128
+
1. Under **Access controls** > **Grant**, select **Grant access**, **Require app protection policy**, and select **Select**.
126
129
1. Confirm your settings and set **Enable policy** to **On**.
127
130
1. Select **Create** to create and enable your policy.
0 commit comments