Skip to content

Commit b6d0f5f

Browse files
authored
Merge pull request #205384 from MicrosoftGuyJFlo/CAEplusSP
[Azure AD] Conditional Access - CAE workload identities
2 parents 65e0ae8 + 67fd2a6 commit b6d0f5f

File tree

2 files changed

+67
-2
lines changed

2 files changed

+67
-2
lines changed

articles/active-directory/conditional-access/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,14 +39,16 @@
3939
href: service-dependencies.md
4040
- name: Location conditions
4141
href: location-condition.md
42+
- name: Continuous access evaluation
43+
href: concept-continuous-access-evaluation.md
4244
- name: Workload identities
4345
href: workload-identity.md
46+
- name: CAE for workload identities
47+
href: concept-continuous-access-evaluation-workload.md
4448
- name: Filter for devices
4549
href: concept-condition-filters-for-devices.md
4650
- name: What if tool
4751
href: what-if-tool.md
48-
- name: Continuous access evaluation
49-
href: concept-continuous-access-evaluation.md
5052
- name: How-to guides
5153
expanded: true
5254
items:
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
---
2+
title: Continuous access evaluation for workload identities in Azure AD
3+
description: Respond to changes to applications with continuous access evaluation for workload identities in Azure AD
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: conditional-access
8+
ms.topic: conceptual
9+
ms.date: 07/22/2022
10+
11+
ms.author: joflore
12+
author: MicrosoftGuyJFlo
13+
manager: karenhoran
14+
ms.reviewer: vmahtani
15+
16+
ms.collection: M365-identity-device-management
17+
---
18+
# Continuous access evaluation for workload identities (preview)
19+
20+
Continuous access evaluation (CAE) for [workload identities](../develop/workload-identities-overview.md) provides security benefits to your organization. It enables real-time enforcement of Conditional Access location and risk policies along with instant enforcement of token revocation events for workload identities.
21+
22+
Continuous access evaluation doesn't currently support managed identities.
23+
24+
## Scope of preview
25+
26+
The continuous access evaluation for workload identities public preview scope includes support for Microsoft Graph as a resource provider.
27+
28+
The preview targets service principals for line of business (LOB) applications.
29+
30+
We support the following revocation events:
31+
32+
- Service principal disable
33+
- Service principal delete
34+
- High service principal risk as detected by Azure AD Identity Protection
35+
36+
Continuous access evaluation for workload identities supports [Conditional Access policies that target location and risk](workload-identity.md#implementation).
37+
38+
## Enable your application
39+
40+
Developers can opt in to Continuous access evaluation for workload identities when their API requests `xms_cc` as an optional claim. The `xms_cc` claim with a value of `cp1` in the access token is the authoritative way to identify a client application is capable of handling a claims challenge. For more information about how to make this work in your application, see the article, [Claims challenges, claims requests, and client capabilities](../develop/claims-challenge.md).
41+
42+
### Disable
43+
44+
In order to opt out, don't send the `xms_cc` claim with a value of `cp1`.
45+
46+
Organizations who have Azure AD Premium can create a [Conditional Access policy to disable continuous access evaluation](concept-conditional-access-session.md#customize-continuous-access-evaluation) applied to specific workload identities as an immediate stop-gap measure.
47+
48+
## Troubleshooting
49+
50+
When a client’s access to a resource is blocked due to CAE being triggered, the client’s session will be revoked, and the client will need to reauthenticate. This behavior can be verified in the sign-in logs.
51+
52+
The following steps detail how an admin can verify sign in activity in the sign-in logs:
53+
54+
1. Sign into the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.
55+
1. Browse to **Azure Active Directory** > **Sign-in logs** > **Service Principal Sign-ins**. You can use filters to ease the debugging process.
56+
1. Select an entry to see activity details. The **Continuous access evaluation** field indicates whether a CAE token was issued in a particular sign-in attempt.
57+
58+
## Next steps
59+
60+
- [Register an application with Azure AD and create a service principal](../develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal)
61+
- [How to use Continuous Access Evaluation enabled APIs in your applications](../develop/app-resilience-continuous-access-evaluation.md)
62+
- [Sample application using continuous access evaluation](https://github.com/Azure-Samples/ms-identity-dotnetcore-daemon-graph-cae)
63+
- [What is continuous access evaluation?](../conditional-access/concept-continuous-access-evaluation.md)

0 commit comments

Comments
 (0)