Skip to content

Commit be59841

Browse files
authored
Merge pull request #178889 from lujiangfeng666/patch-20
Update concept-conditional-access-session.md
2 parents 8da1ce8 + d80312e commit be59841

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/active-directory/conditional-access/concept-conditional-access-session.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -73,10 +73,10 @@ For more information, see the article [Configure authentication session manageme
7373

7474
[Continuous access evaluation](concept-continuous-access-evaluation.md) is auto enabled as part of an organization's Conditional Access policies. For organizations who wish to disable or strictly enforce continuous access evaluation, this configuration is now an option within the session control within Conditional Access. Continuous access evaluation policies can be scoped to all users or specific users and groups. Admins can make the following selections while creating a new policy or while editing an existing Conditional Access policy.
7575

76-
- **Disable** is accomplished when **All cloud apps** are selected, no conditions are selected, and **Disable** is selected under **Session** > **Customize continuous access evaluation** in a Conditional Access policy.
77-
- **Strict enforcement** means that any critical event and policy will be enforced in real time. All CAE-capable services always get CAE tokens, whatever the client or user might ask for or do. There are two scenarios where CAE won't come into play when strict enforcement mode is turned on:
78-
- Non-CAE capable clients shouldn't get a regular token for CAE-capable services.
79-
- Reject when IP seen by resource provider isn't in the allowed range.
76+
- **Disable** only work when **All cloud apps** are selected, no conditions are selected, and **Disable** is selected under **Session** > **Customize continuous access evaluation** in a Conditional Access policy. You can choose to disable all users or specific users and groups.
77+
- **Strict enforcement** can be used to further strengthen the security benefits from CAE. It will make sure that any critical event and policy will be enforced in real time. There are two additional scenarios where CAE will enforce when strict enforcement mode is turned on:
78+
- Non-CAE capable clients will not be allowed to access CAE-capable services.
79+
- Access will be rejected when client's IP address seen by resource provider isn't in the Conditional Access's allowed range.
8080

8181
> [!NOTE]
8282
> You should only enable strict enforcement after you ensure that all the client applications support CAE and you have included all your IP addresses seen by Azure AD and the resource providers, like Exchange online and Azure Resource Mananger, in your location policy under Conditional Access. Otherwise, users in your tenants could be blocked.

0 commit comments

Comments
 (0)