You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: conceptual
9
-
ms.date: 07/18/2022
9
+
ms.date: 08/09/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -167,11 +167,11 @@ In some cases, an **All cloud apps** policy could inadvertently block user acces
167
167
168
168
- Calls to Azure AD Graph and MS Graph, to access user profile, group membership and relationship information that is commonly used by applications excluded from policy. The excluded scopes are listed below. Consent is still required for apps to use these permissions.
169
169
- For native clients:
170
-
- Azure AD Graph: User.read
171
-
- MS Graph: User.read, People.read, and UserProfile.read
170
+
- Azure AD Graph: User.Read
171
+
- MS Graph: User.Read, People.Read, and UserProfile.Read
172
172
- For confidential / authenticated clients:
173
-
- Azure AD Graph: User.read, User.read.all, and User.readbasic.all
174
-
- MS Graph: User.read,User.read.all, User.read.All People.read, People.read.all, GroupMember.Read.All, Member.Read.Hidden, and UserProfile.read
173
+
- Azure AD Graph: User.Read, User.Read.All, and User.ReadBasic.All
174
+
- MS Graph: User.Read, User.Read.All, User.ReadBasic.All, People.Read, People.Read.All, GroupMember.Read.All, Member.Read.Hidden, and UserProfile.Read
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/what-if-tool.md
+23-62Lines changed: 23 additions & 62 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,106 +6,67 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: conceptual
9
-
ms.date: 06/22/2020
9
+
ms.date: 08/09/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
13
13
manager: karenhoran
14
14
ms.reviewer: nigu
15
15
ms.collection: M365-identity-device-management
16
-
17
-
#Customer intent: As an IT admin, I want to know how to use the What If tool for my existing Conditional Access policies, so that I can understand the impact they have on my environment.
18
16
---
19
-
# Troubleshoot using the What If tool in Conditional Access
17
+
# Use the What If tool to troubleshoot Conditional Access policies
20
18
21
-
[Conditional Access](./overview.md)is a capability of Azure Active Directory (Azure AD) that enables you to control how authorized users access your cloud apps. How do you know what to expect from the Conditional Access policies in your environment? To answer this question, you can use the **Conditional Access What If tool**.
19
+
The **Conditional Access What If policy tool** allows you to understand the impact of [Conditional Access](./overview.md)policies in your environment. Instead of test driving your policies by performing multiple sign-ins manually, this tool enables you to evaluate a simulated sign-in of a user. The simulation estimates the impact this sign-in has on your policies and generates a simulation report.
22
20
23
-
This article explains how you can use this tool to test your Conditional Access policies.
21
+
The **What If** tool provides a way to quickly determine the policies that apply to a specific user. You can use the information, for example, if you need to troubleshoot an issue.
The **Conditional Access What If policy tool** allows you to understand the impact of your Conditional Access policies on your environment. Instead of test driving your policies by performing multiple sign-ins manually, this tool enables you to evaluate a simulated sign-in of a user. The simulation estimates the impact this sign-in has on your policies and generates a simulation report. The report does not only list the applied Conditional Access policies but also [classic policies](policy-migration.md#classic-policies) if they exist.
30
-
31
-
The **What If** tool provides a way to quickly determine the policies that apply to a specific user. You can use the information, for example, if you need to troubleshoot an issue.
32
-
33
25
## How it works
34
26
35
-
In the **Conditional Access What If tool**, you first need to configure the settings of the sign-in scenario you want to simulate. These settings include:
27
+
In the **Conditional Access What If tool**, you first need to configure the conditions of the sign-in scenario you want to simulate. These settings may include:
36
28
37
29
- The user you want to test
38
30
- The cloud apps the user would attempt to access
39
31
- The conditions under which access to the configured cloud apps is performed
32
+
33
+
The What If tool doesn't test for [Conditional Access service dependencies](service-dependencies.md). For example, if you're using What If to test a Conditional Access policy for Microsoft Teams, the result doesn't take into consideration any policy that would apply to Office 365 Exchange Online, a Conditional Access service dependency for Microsoft Teams.
40
34
41
35
As a next step, you can initiate a simulation run that evaluates your settings. Only policies that are enabled are part of an evaluation run.
42
36
43
-
When the evaluation has finished, the tool generates a report of the affected policies. To gather more information about a Conditional Access policy, the [Conditional Access insights and reporting workbook](howto-conditional-access-insights-reporting.md) can provide additional details about policies in report-only mode and those policies currently enabled.
37
+
When the evaluation has finished, the tool generates a report of the affected policies. To gather more information about a Conditional Access policy, the [Conditional Access insights and reporting workbook](howto-conditional-access-insights-reporting.md) can provide more details about policies in report-only mode and those policies currently enabled.
44
38
45
39
## Running the tool
46
40
47
-
You can find the **What If** tool on the **[Conditional Access - Policies](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ConditionalAccessBlade/Policies)** page in the Azure portal.
48
-
49
-
To start the tool, in the toolbar on top of the list of policies, click **What If**.
50
-
51
-
:::image type="content" source="./media/what-if-tool/01.png" alt-text="Screenshot of the Conditional Access - Policies page in the Azure portal. In the toolbar, the What if item is highlighted." border="false":::
52
-
53
-
Before you can run an evaluation, you must configure the settings.
54
-
55
-
## Settings
56
-
57
-
This section provides you with information about the settings of simulation run.
58
-
59
-
:::image type="content" source="./media/what-if-tool/02.png" alt-text="Screenshot of the Azure portal What If page, with fields for a user, cloud apps, an I P address, a device platform, a client app, and a sign-in risk." border="false":::
60
-
61
-
### User
62
-
63
-
You can only select one user. This is the only required field.
64
-
65
-
### Cloud apps
66
-
67
-
The default for this setting is **All cloud apps**. The default setting performs an evaluation of all available policies in your environment. You can narrow down the scope to policies affecting specific cloud apps.
68
-
69
-
> [!NOTE]
70
-
> When using the What If tool, it does not test for [Conditional Access service dependencies](service-dependencies.md). For example, if you are using What If to test a Conditional Access policy for Microsoft Teams, the result will not take into consideration any policy that would apply to Office 365 Exchange Online, a Conditional Access service dependency for Microsoft Teams.
71
-
72
-
### IP address
73
-
74
-
The IP address is a single IPv4 address to mimic the [location condition](location-condition.md). The address represents Internet facing address of the device used by your user to sign in. You can verify the IP address of a device by, for example, navigating to [What is my IP address](https://whatismyipaddress.com).
75
-
76
-
### Device platforms
77
-
78
-
This setting mimics the [device platforms condition](concept-conditional-access-conditions.md#device-platforms) and represents the equivalent of **All platforms (including unsupported)**.
41
+
You can find the **What If** tool in the Azure portal under **Azure Active Directory** > **Security** > **Conditional Access** > **What If**.
79
42
80
-
### Client apps
43
+
:::image type="content" source="./media/what-if-tool/portal-showing-location-of-what-if-tool.png" alt-text="Screenshot of the Conditional Access - Policies page in the Azure portal. In the toolbar, the What if item is highlighted." border="false" lightbox="media/what-if-tool/portal-showing-location-of-what-if-tool.png":::
81
44
82
-
This setting mimics the [client apps condition](concept-conditional-access-conditions.md#client-apps).
83
-
By default, this setting causes an evaluation of all policies having **Browser** or **Mobile apps and desktop clients** either individually or both selected. It also detects policies that enforce **Exchange ActiveSync (EAS)**. You can narrow this setting down by selecting:
45
+
Before you can run the What If tool, you must provide the conditions you want to evaluate.
84
46
85
-
-**Browser** to evaluate all policies having at least **Browser** selected.
86
-
-**Mobile apps and desktop clients** to evaluate all policies having at least **Mobile apps and desktop clients** selected.
47
+
## Conditions
87
48
88
-
### Sign-in risk
49
+
The only condition you must make is selecting a user or workload identity. All other conditions are optional. For a definition of these conditions, see the article [Building a Conditional Access policy](concept-conditional-access-policies.md).
89
50
90
-
This setting mimics the[sign-in risk condition](concept-conditional-access-conditions.md#sign-in-risk).
51
+
:::image type="content" source="./media/what-if-tool/supply-conditions-to-evaluate-in-the-what-if-tool.png" alt-text="Screenshot of the Azure portal What If page ready for conditions to be entered." border="false" lightbox="media/what-if-tool/supply-conditions-to-evaluate-in-the-what-if-tool.png":::
91
52
92
-
## Evaluation
53
+
## Evaluation
93
54
94
55
You start an evaluation by clicking **What If**. The evaluation result provides you with a report that consists of:
95
56
96
-
:::image type="content" source="./media/what-if-tool/03.png" alt-text="Screenshot of an evaluation report. Text indicates that at least one classic policy is configured. Tabs are available for viewing policies." border="false":::
57
+
- An indicator whether classic policies exist in your environment.
58
+
- Policies that will apply to your user or workload identity.
59
+
- Policies that don't apply to your user or workload identity.
97
60
98
-
- An indicator whether classic policies exist in your environment
99
-
- Policies that apply to your user
100
-
- Policies that don't apply to your user
61
+
If [classic policies](policy-migration.md#classic-policies) exist for the selected cloud apps, an indicator is presented to you. By clicking the indicator, you're redirected to the classic policies page. On the classic policies page, you can migrate a classic policy or just disable it. You can return to your evaluation result by closing this page.
101
62
102
-
If [classic policies](policy-migration.md#classic-policies) exist for the selected cloud apps, an indicator is presented to you. By clicking the indicator, you are redirected to the classic policies page. On the classic policies page, you can migrate a classic policy or just disable it. You can return to your evaluationresult by closing this page.
63
+
:::image type="content" source="media/what-if-tool/conditional-access-what-if-evaluation-result-example.png" alt-text="Screenshot of an example of the policy evaluation in the What If tool showing policies that would apply." lightbox="media/what-if-tool/conditional-access-what-if-evaluation-result-example.png":::
103
64
104
-
On the list of policies that apply to your selected user, you can also find a list of [grant controls](concept-conditional-access-grant.md) and [session controls](concept-conditional-access-session.md)your user must satisfy.
65
+
On the list of policies that apply, you can also find a list of [grant controls](concept-conditional-access-grant.md) and [session controls](concept-conditional-access-session.md)that must be satisfied.
105
66
106
-
On the list of policies that don't apply to your user, you can and also find the reasons why these policies don't apply. For each listed policy, the reason represents the first condition that was not satisfied. A possible reason for a policy that is not applied is a disabled policy because they are not further evaluated.
67
+
On the list of policies that don't apply, you can find the reasons why these policies don't apply. For each listed policy, the reason represents the first condition that wasn't satisfied.
107
68
108
69
## Next steps
109
70
110
71
- More information about Conditional Access policy application can be found using the policies report-only mode using [Conditional Access insights and reporting](howto-conditional-access-insights-reporting.md).
111
-
- If you are ready to configure Conditional Access policies for your environment, see the [Conditional Access common policies](concept-conditional-access-policy-common.md).
72
+
- If you're ready to configure Conditional Access policies for your environment, see the [Conditional Access common policies](concept-conditional-access-policy-common.md).
YoucantestyourapplicationbysigninginausertotheapplicationthenusingtheAzureportaltoRevoketheuser's sessions. The next time the app calls the CAE enabled API, the user will be asked to reauthenticate.
YoucantestyourapplicationbysigninginauserandthenusingtheAzureportaltorevoketheuser's session. The next time the app calls the CAE-enabled API, the user will be asked to reauthenticate.
0 commit comments