Skip to content

Commit be054b7

Browse files
authored
Merge pull request #188483 from MicrosoftGuyJFlo/DependencyUpdate
[Azure AD] Conditional Access - Dependency update
2 parents ec1177a + 830f4f9 commit be054b7

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

articles/active-directory/conditional-access/service-dependencies.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 09/21/2020
9+
ms.date: 02/14/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020

2121
With Conditional Access policies, you can specify access requirements to websites and services. For example, your access requirements can include requiring multi-factor authentication (MFA) or [managed devices](require-managed-devices.md).
2222

23-
When you access a site or service directly, the impact of a related policy is typically easy to assess. For example, if you have a policy that requires multi-factor authentication (MFA) for SharePoint Online configured, MFA is enforced for each sign-in to the SharePoint web portal. However, it is not always straight-forward to assess the impact of a policy because there are cloud apps with dependencies to other cloud apps. For example, Microsoft Teams can provide access to resources in SharePoint Online. So, when you access Microsoft Teams in our current scenario, you are also subject to the SharePoint MFA policy.
23+
When you access a site or service directly, the impact of a related policy is typically easy to assess. For example, if you have a policy that requires multi-factor authentication (MFA) for SharePoint Online configured, MFA is enforced for each sign-in to the SharePoint web portal. However, it isn't always straight-forward to assess the impact of a policy because there are cloud apps with dependencies to other cloud apps. For example, Microsoft Teams can provide access to resources in SharePoint Online. So, when you access Microsoft Teams in our current scenario, you're also subject to the SharePoint MFA policy.
2424

2525
> [!TIP]
2626
> Using the [Office 365](concept-conditional-access-cloud-apps.md#office-365) app will target all Office apps to avoid issues with service dependencies in the Office stack.
@@ -38,9 +38,9 @@ The diagram below illustrates MS Teams service dependencies. Solid arrows indica
3838

3939
As a best practice, you should set common policies across related apps and services whenever possible. Having a consistent security posture provides you with the best user experience. For example, setting a common policy across Exchange Online, SharePoint Online, Microsoft Teams, and Skype for business significantly reduces unexpected prompts that may arise from different policies being applied to downstream services.
4040

41-
A great way to accomplish this with applications in the Office stack is to use the [Office 365 app](concept-conditional-access-cloud-apps.md#office-365) instead of targeting individual applications.
41+
A great way to accomplish a common policy with applications in the Office stack is to use the [Office 365 app](concept-conditional-access-cloud-apps.md#office-365) instead of targeting individual applications.
4242

43-
The below table lists additional service dependencies, where the client apps must satisfy
43+
The below table lists some more service dependencies, where the client apps must satisfy. This list isn't exhaustive.
4444

4545
| Client apps | Downstream service | Enforcement |
4646
| :-- | :-- | --- |
@@ -52,6 +52,7 @@ The below table lists additional service dependencies, where the client apps mus
5252
| | Microsoft Stream | Late-bound |
5353
| | SharePoint | Early-bound |
5454
| | Skype for Business Online | Early-bound |
55+
| | Microsoft Whiteboard | Late-bound |
5556
| Office Portal | Exchange | Late-bound |
5657
| | SharePoint | Late-bound |
5758
| Outlook groups | Exchange | Early-bound |

0 commit comments

Comments
 (0)