Skip to content

Commit 9f8f534

Browse files
[Azure AD] Conditional Access - CAE Updates for GA
1 parent 2e4b283 commit 9f8f534

File tree

3 files changed

+16
-28
lines changed

3 files changed

+16
-28
lines changed

articles/active-directory/conditional-access/concept-conditional-access-session.md

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 10/25/2021
9+
ms.date: 01/10/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: karenhoran
14-
ms.reviewer: calebb
14+
ms.reviewer: calebb, tunag
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -25,7 +25,7 @@ Within a Conditional Access policy, an administrator can make use of session con
2525

2626
Organizations can use this control to require Azure AD to pass device information to the selected cloud apps. The device information enables the cloud apps to know whether a connection is started from a compliant or domain-joined device and alter the session experience. This control only supports SharePoint Online and Exchange Online as selected cloud apps. When selected, the cloud app uses the device information to provide users, depending on the device state, with a limited (when the device isn't managed) or full experience (when the device is managed and compliant).
2727

28-
For more information on the use and configuration of app enforced restrictions, see the following articles:
28+
For more information on the use and configuration of app-enforced restrictions, see the following articles:
2929

3030
- [Enabling limited access with SharePoint Online](/sharepoint/control-access-from-unmanaged-devices)
3131
- [Enabling limited access with Exchange Online](https://aka.ms/owalimitedaccess)
@@ -71,23 +71,18 @@ For more information, see the article [Configure authentication session manageme
7171

7272
## Customize continuous access evaluation
7373

74-
[Continuous access evaluation](concept-continuous-access-evaluation.md) is auto enabled as part of an organization's Conditional Access policies. For organizations who wish to disable or strictly enforce continuous access evaluation, this configuration is now an option within the session control within Conditional Access. Continuous access evaluation policies can be scoped to all users or specific users and groups. Admins can make the following selections while creating a new policy or while editing an existing Conditional Access policy.
74+
[Continuous access evaluation](concept-continuous-access-evaluation.md) is auto enabled as part of an organization's Conditional Access policies. For organizations who wish to disable continuous access evaluation, this configuration is now an option within the session control within Conditional Access. Continuous access evaluation policies can be scoped to all users or specific users and groups. Admins can make the following selection while creating a new policy or while editing an existing Conditional Access policy.
7575

7676
- **Disable** only work when **All cloud apps** are selected, no conditions are selected, and **Disable** is selected under **Session** > **Customize continuous access evaluation** in a Conditional Access policy. You can choose to disable all users or specific users and groups.
77-
- **Strict enforcement** can be used to further strengthen the security benefits from CAE. It will make sure that any critical event and policy will be enforced in real time. There are two additional scenarios where CAE will enforce when strict enforcement mode is turned on:
78-
- Non-CAE capable clients will not be allowed to access CAE-capable services.
79-
- Access will be rejected when client's IP address seen by resource provider isn't in the Conditional Access's allowed range.
8077

81-
> [!NOTE]
82-
> You should only enable strict enforcement after you ensure that all the client applications support CAE and you have included all your IP addresses seen by Azure AD and the resource providers, like Exchange online and Azure Resource Mananger, in your location policy under Conditional Access. Otherwise, users in your tenants could be blocked.
8378

8479
:::image type="content" source="media/concept-conditional-access-session/continuous-access-evaluation-session-controls.png" alt-text="CAE Settings in a new Conditional Access policy in the Azure portal." lightbox="media/concept-conditional-access-session/continuous-access-evaluation-session-controls.png":::
8580

8681
## Disable resilience defaults (Preview)
8782

8883
During an outage, Azure AD will extend access to existing sessions while enforcing Conditional Access policies. If a policy cannot be evaluated, access is determined by resilience settings.
8984

90-
If resilience defaults are disabled, access is denied once existing sessions expire. For more information, see the article [Conditional Access: Resilience defaults](resilience-defaults.md).
85+
If resilience defaults are disabled, access is denied once existing sessions expire. For more information, see the article [Conditional Access: Resilience defaults](resilience-defaults.md).
9186

9287
## Next steps
9388

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 11 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 10/21/2021
9+
ms.date: 01/10/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: karenhoran
14-
ms.reviewer: jlu
14+
ms.reviewer: tunag
1515
ms.custom: has-adal-ref
1616
ms.collection: M365-identity-device-management
1717
---
@@ -52,7 +52,7 @@ This process enables the scenario where users lose access to organizational Shar
5252
> [!NOTE]
5353
> Teams and SharePoint Online do not support user risk events.
5454
55-
### Conditional Access policy evaluation (preview)
55+
### Conditional Access policy evaluation
5656

5757
Exchange Online, SharePoint Online, Teams, and MS Graph can synchronize key Conditional Access policies for evaluation within the service itself.
5858

@@ -115,7 +115,7 @@ If you aren't using CAE-capable clients, your default access token lifetime will
115115
1. In this case, the resource provider denies access, and sends a 401+ claim challenge back to the client.
116116
1. The CAE-capable client understands the 401+ claim challenge. It bypasses the caches and goes back to step 1, sending its refresh token along with the claim challenge back to Azure AD. Azure AD will then reevaluate all the conditions and prompt the user to reauthenticate in this case.
117117

118-
### User condition change flow (Preview)
118+
### User condition change flow
119119

120120
In the following example, a Conditional Access administrator has configured a location based Conditional Access policy to only allow access from specific IP ranges:
121121

@@ -130,20 +130,20 @@ In the following example, a Conditional Access administrator has configured a lo
130130
1. In this case, the resource provider denies access, and sends a 401+ claim challenge back to the client. The client is challenged because it isn't coming from an allowed IP range.
131131
1. The CAE-capable client understands the 401+ claim challenge. It bypasses the caches and goes back to step 1, sending its refresh token along with the claim challenge back to Azure AD. Azure AD reevaluates all the conditions and will deny access in this case.
132132

133-
## Enable or disable CAE (Preview)
133+
## Enable or disable CAE
134134

135-
CAE setting has been moved to under the Conditional Access blade. New CAE customers will be able to access and toggle CAE directly when creating Conditional Access policies. However, some existing customers will need to go through migration before they can begin to access CAE through Conditional Access.
135+
The CAE setting has been moved to under the Conditional Access blade. New CAE customers can access and toggle CAE directly when creating Conditional Access policies. However, some existing customers must go through migration before they can access CAE through Conditional Access.
136136

137137
#### Migration
138138

139-
Customers who have configured CAE settings under Security before have to migrate these setting to a new Conditional Access policy. Use the steps that follow to migrate your CAE settings to a Conditional Access policy.
139+
Customers who have configured CAE settings under Security before have to migrate settings to a new Conditional Access policy. Use the steps that follow to migrate your CAE settings to a Conditional Access policy.
140140

141141
:::image type="content" source="media/concept-continuous-access-evaluation/migrate-continuous-access-evaluation.png" alt-text="Portal view showing the option to migrate continuous access evaluation to a Conditional Access policy." lightbox="media/concept-continuous-access-evaluation/migrate-continuous-access-evaluation.png":::
142142

143143
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
144-
1. Browse to **Azure Active Directory** > **Security** > **Continuous access evaluation (preview)**.
144+
1. Browse to **Azure Active Directory** > **Security** > **Continuous access evaluation**.
145145
1. You'll then see the option to **Migrate** your policy. This action is the only one that you’ll have access to at this point.
146-
1. Browse to **Conditional Access** and you will find a new policy named **CA policy created from CAE settings** with your settings configured. Administrators can choose to customize this policy or create their own to replace it.
146+
1. Browse to **Conditional Access** and you'll find a new policy named **CA policy created from CAE settings** with your settings configured. Administrators can choose to customize this policy or create their own to replace it.
147147

148148
The following table describes the migration experience of each customer group based on previously configured CAE settings.
149149

@@ -156,13 +156,6 @@ The following table describes the migration experience of each customer group ba
156156

157157
More information about continuous access evaluation as a session control can be found in the section, [Customize continuous access evaluation](concept-conditional-access-session.md#customize-continuous-access-evaluation).
158158

159-
### Strict enforcement
160-
161-
With the latest CAE setting under Conditional Access, strict enforcement is a new feature that allows for enhanced security based on two factors: IP address variation and client capability. This functionality can be enabled while customizing CAE options for a given policy. By turning on strict enforcement, CAE will revoke access upon detecting any instances of either [IP address variation](#ip-address-variation) or a lack of CAE [client capability](#client-capabilities).
162-
163-
> [!NOTE]
164-
> You should only enable strict enforcement after you ensure that all the client applications support CAE and you have included all your IP addresses seen by Azure AD and the resource providers, like Exchange online and Azure Resource Mananger, in your location policy under Conditional Access. Otherwise, you could be blocked.
165-
166159
## Limitations
167160

168161
### Group membership and Policy update effective time
@@ -217,9 +210,9 @@ To reduce this time a SharePoint Administrator can reduce the maximum lifetime o
217210

218211
### Enable after a user is disabled
219212

220-
Ifyouenable a userrightafterdisabling, there's some latency before the account is recognized as enabled in downstream Microsoft services.
213+
If you enable a user right after disabling, there's some latency before the account is recognized as enabled in downstream Microsoft services.
221214

222-
- SharePointOnlineandTeamstypicallyhavea 15-minutedelay.
215+
- SharePoint Online and Teams typically have a 15-minute delay.
223216
- Exchange Online typically has a 35-40 minute delay.
224217

225218
### Push notifications
Loading

0 commit comments

Comments
 (0)