|
1 | 1 | ---
|
2 | 2 | title: Add Conditional Access to a user flow in Azure AD B2C
|
3 |
| -description: Learn how to add Conditional Access to your Azure AD B2C user flows. Configure multifactor authentication (MFA) settings and Conditional Access policies in your user flows to enforce policies and remediate risky sign-ins. |
| 3 | +description: Learn how to add Conditional Access to Azure AD B2C user flows. Configure MFA settings and policies to enforce and remediate risky sign-ins. |
4 | 4 |
|
5 | 5 | ms.service: azure-active-directory
|
6 | 6 | ms.subservice: b2c
|
7 | 7 | ms.topic: overview
|
8 |
| -ms.date: 09/11/2024 |
| 8 | +ms.date: 02/18/2025 |
9 | 9 | ms.author: kengaderdus
|
10 | 10 | author: kengaderdus
|
11 | 11 | manager: CelesteDG
|
@@ -40,14 +40,14 @@ The following example shows a Conditional Access technical profile that is used
|
40 | 40 | </TechnicalProfile>
|
41 | 41 | ```
|
42 | 42 |
|
43 |
| -To ensure that Identity Protection signals are evaluated properly, you'll want to call the `ConditionalAccessEvaluation` technical profile for all users, including both [local and social accounts](technical-overview.md#consumer-accounts). Otherwise, Identity Protection indicates an incorrect degree of risk associated with users. |
| 43 | +To ensure that Identity Protection signals are evaluated properly, you need to call the `ConditionalAccessEvaluation` technical profile for all users, including both [local and social accounts](technical-overview.md#consumer-accounts). Otherwise, Identity Protection indicates an incorrect degree of risk associated with users. |
44 | 44 | ::: zone-end
|
45 | 45 | In the *Remediation* phase that follows, the user is challenged with MFA. Once complete, Azure AD B2C informs Identity Protection that the identified sign-in threat has been remediated and by which method. In this example, Azure AD B2C signals that the user has successfully completed the multifactor authentication challenge.
|
46 | 46 | The remediation may also happen through other channels. For example, when the account's password is reset, either by the administrator or by the user. You can check the user *Risk state* in the [risky users report](identity-protection-investigate-risk.md#navigating-the-risky-users-report).
|
47 | 47 | ::: zone pivot="b2c-custom-policy"
|
48 | 48 | > [!IMPORTANT]
|
49 | 49 | > To remediate the risk successfully within the journey, make sure the *Remediation* technical profile is called after the *Evaluation* technical profile is executed. If *Evaluation* is invoked without *Remediation*, the risk state indicates as *At risk*.
|
50 |
| -When the *Evaluation* technical profile recommendation returns `Block`, the call to the *Evaluation* technical profile is not required. The risk state is set to *At risk*. |
| 50 | +When the *Evaluation* technical profile recommendation returns `Block`, the call to the *Evaluation* technical profile isn't required. The risk state is set to *At risk*. |
51 | 51 | The following example shows a Conditional Access technical profile used to remediate the identified threat:
|
52 | 52 |
|
53 | 53 | ```xml
|
@@ -153,7 +153,7 @@ To add a Conditional Access policy:
|
153 | 153 |
|
154 | 154 | ## Template 1: Sign-in risk-based Conditional Access
|
155 | 155 |
|
156 |
| -Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform multifactor authentication to prove that they are really who they say they are. A sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. Azure AD B2C tenants with P2 licenses can create Conditional Access policies incorporating Microsoft Entra ID Protection sign-in risk detections. |
| 156 | +Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform multifactor authentication to prove that they're really who they say they are. A sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. Azure AD B2C tenants with P2 licenses can create Conditional Access policies incorporating Microsoft Entra ID Protection sign-in risk detections. |
157 | 157 |
|
158 | 158 | Note the limitations on Identity Protection detections for B2C. If risk is detected, users can perform multifactor authentication to self-remediate and close the risky sign-in event to prevent unnecessary noise for administrators.
|
159 | 159 |
|
@@ -351,11 +351,11 @@ Multiple Conditional Access policies may apply to an individual user at any time
|
351 | 351 |
|
352 | 352 | When adding Conditional Access to a user flow, consider using **Multi-factor authentication (MFA)**. Users can use a one-time code via SMS or voice, a one-time password via email, or a time-based one-time password (TOTP) code via an authenticator app for multifactor authentication. MFA settings are configured separately from Conditional Access settings. You can choose from these MFA options:
|
353 | 353 |
|
354 |
| -- **Off** - MFA is never enforced during sign-in, and users are not prompted to enroll in MFA during sign-up or sign-in. |
| 354 | +- **Off** - MFA is never enforced during sign-in, and users aren't prompted to enroll in MFA during sign-up or sign-in. |
355 | 355 | - **Always on** - MFA is always required, regardless of your Conditional Access setup. During sign-up, users are prompted to enroll in MFA. During sign-in, if users aren't already enrolled in MFA, they're prompted to enroll.
|
356 | 356 | - **Conditional** - During sign-up and sign-in, users are prompted to enroll in MFA (both new users and existing users who aren't enrolled in MFA). During sign-in, MFA is enforced only when an active Conditional Access policy evaluation requires it:
|
357 | 357 | - If the result is an MFA challenge with no risk, MFA is enforced. If the user isn't already enrolled in MFA, they're prompted to enroll.
|
358 |
| - - If the result is an MFA challenge due to risk *and* the user is not enrolled in MFA, sign-in is blocked. |
| 358 | + - If the result is an MFA challenge due to risk *and* the user isn't enrolled in MFA, sign-in is blocked. |
359 | 359 | > [!NOTE]
|
360 | 360 | > With general availability of Conditional Access in Azure AD B2C, users are now prompted to enroll in an MFA method during sign-up. Any sign-up user flows you created prior to general availability won't automatically reflect this new behavior, but you can include the behavior by creating new user flows.
|
361 | 361 |
|
@@ -435,6 +435,6 @@ To review the result of a Conditional Access event:
|
435 | 435 | - **AppliedPolicies**: A list of all the Conditional Access policies where the conditions were met and the policies are ON.
|
436 | 436 | - **ReportingPolicies**: A list of the Conditional Access policies that were set to report-only mode and where the conditions were met.
|
437 | 437 |
|
438 |
| -## Next steps |
| 438 | +## Related content |
439 | 439 |
|
440 | 440 | [Customize the user interface in an Azure AD B2C user flow](customize-ui-with-html.md)
|
0 commit comments