Skip to content

Commit d29df97

Browse files
WIP
1 parent 53dfcb6 commit d29df97

File tree

1 file changed

+40
-62
lines changed

1 file changed

+40
-62
lines changed

articles/active-directory/conditional-access/migrate-approved-client-app.md

Lines changed: 40 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: The approved client app control is going away. Migrate to App prote
55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
8-
ms.topic:
8+
ms.topic: how-to
99
ms.date: 01/09/2023
1010

1111
ms.author: joflore
@@ -17,88 +17,66 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Migrate approved client app to application protection policy in Conditional Access
1919

20-
In this article, you’ll learn how to migrate from the approved client app Conditional Access grant to the application protection policy grant. App protection policies provide the same data loss and protection as approved client app policies, but with other benefits. For more information about the benefits of using app protection policies, see the article [App protection policies overview](https://learn.microsoft.com/en-us/mem/intune/apps/app-protection-policy).
20+
In this article, you’ll learn how to migrate from the approved client app Conditional Access grant to the application protection policy grant. App protection policies provide the same data loss and protection as approved client app policies, but with other benefits. For more information about the benefits of using app protection policies, see the article [App protection policies overview](/mem/intune/apps/app-protection-policy).
2121

22-
The approved client app grant will be retired in March 2026. Please transition all current Conditional Access policies that use only the Require Approved Client App grant to Require Approved Client App or Application Protection Policy by March 2026. Additionally, for any new Conditional Access policy, only apply the Require application protection policy grant.
22+
The approved client app grant will be retired in March 2026. Organizations must transition all current Conditional Access policies that use only the Require Approved Client App grant to Require Approved Client App or Application Protection Policy by March 2026. Additionally, for any new Conditional Access policy, only apply the Require application protection policy grant.
2323

24-
After March 2026, Microsoft will stop enforcing require approved client app control and it will be as if this grant is not selected. Therefore, please follow the below steps before March 2026 to protect your organization’s data.
24+
After March 2026, Microsoft will stop enforcing require approved client app control, and it will be as if this grant isn't selected. Use the following steps before March 2026 to protect your organization’s data.
2525

2626
## Edit an existing Conditional Access policy
2727

2828
Require approved client apps or app protection policy with mobile devices
2929

3030
The following steps will make an existing Conditional Access policy require an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an app protection policy created in Microsoft Intune.
3131

32-
Organizations can choose to deploy this policy using the steps outlined below or using the Conditional Access templates (Preview).Organizations can choose to deploy this policy using the steps outlined below or using the Conditional Access templates (Preview).
32+
Organizations can choose to update their policies using the following steps.
3333

34-
Sign in to the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.
34+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
35+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
36+
1. Select a policy that uses the approved client app grant.
37+
1. Under **Access controls** > **Grant**, select **Grant access**.
38+
1. Select **Require approved client app** and **Require app protection policy**
39+
1. **For multiple controls** select **Require one of the selected controls**
40+
1. Confirm your settings and set **Enable policy** to **Report-only**.
41+
1. Select **Create** to create to enable your policy.
3542

36-
Browse to Azure Active Directory > Security > Conditional Access.
43+
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
3744

38-
Select a policy that uses the approved client app grant.
39-
40-
Under Access controls > Grant, select Grant access.
41-
42-
Select Require approved client app and Require app protection policy
43-
44-
For multiple controls select Require one of the selected controls
45-
46-
Confirm your settings and set Enable policy to Report-only.
47-
48-
Select Create to create to enable your policy.
49-
50-
After confirming your settings using report-only mode, an administrator can move the Enable policy toggle from Report-only to On.
51-
52-
Repeat the above steps with all of your policies that leverage the approved client app grant.
45+
Repeat the previous steps on all of your policies that use the approved client app grant.
5346

5447
> [!WARNING]
55-
> Not all applications that are supported as approved applications or support application protection policies. For a list of some common client apps, see [App protection policy requirement](https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-grant#require-app-protection-policy). If your application is not listed there, contact the application developer.
48+
> Not all applications that are supported as approved applications or support application protection policies. For a list of some common client apps, see [App protection policy requirement](concept-conditional-access-grant#require-app-protection-policy.md). If your application is not listed there, contact the application developer.
5649
5750
## Create a Conditional Access policy
5851

5952
Require app protection policy with mobile devices
6053

61-
The following steps will help create a Conditional Access policy requiring an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an [app protection policy created in Microsoft Intune](https://learn.microsoft.com/en-us/mem/intune/apps/app-protection-policies).
62-
63-
Organizations can choose to deploy this policy using the steps outlined below or using the Conditional Access templates (Preview).Organizations can choose to deploy this policy using the steps outlined below or using the Conditional Access templates (Preview).
64-
65-
Sign in to the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.
66-
67-
Browse to Azure Active Directory > Security > Conditional Access.
68-
69-
Select New policy.
70-
71-
Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
72-
73-
Under Assignments, select Users or workload identities.
74-
75-
Under Include, select All users.
76-
77-
Under Exclude, select Users and groups and exclude at least one account to prevent yourself from being locked out. If you don't exclude any accounts, you can't create the policy.
78-
79-
Under Cloud apps or actions, select All cloud apps.
80-
81-
Under Conditions > Device platforms, set Configure to Yes.
82-
83-
Under Include, Select device platforms.
84-
85-
Choose Android and iOS
86-
87-
Select Done.
88-
89-
Under Access controls > Grant, select Grant access.
90-
91-
Select Require app protection policy
92-
93-
Confirm your settings and set Enable policy to Report-only.
94-
95-
Select Create to create to enable your policy.
96-
97-
After confirming your settings using report-only mode, an administrator can move the Enable policy toggle from Report-only to On.
54+
The following steps will help create a Conditional Access policy requiring an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an [app protection policy created in Microsoft Intune](/mem/intune/apps/app-protection-policies).
55+
56+
Organizations can choose to deploy this policy using the following steps.
57+
58+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
59+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
60+
1. Select **New policy**.
61+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
62+
1. Under **Assignments**, select **Users or workload identities**.
63+
1. Under **Include**, select **All users**.
64+
1. Under **Exclude**, select **Users and groups** and exclude at least one account to prevent yourself from being locked out. If you don't exclude any accounts, you can't create the policy.
65+
1. Under **Cloud apps or actions**, select **All cloud apps**.
66+
1. Under **Conditions** > **Device platforms**, set **Configure** to **Yes**.
67+
1. Under **Include**, **Select device platforms**.
68+
1. Choose **Android** and **iOS**
69+
1. Select **Done**.
70+
1. Under **Access controls** > **Grant**, select **Grant access**.
71+
1. Select **Require approved client app** and **Require app protection policy**
72+
1. **For multiple controls** select **Require one of the selected controls**
73+
1. Confirm your settings and set **Enable policy** to **Report-only**.
74+
1. Select **Create** to create to enable your policy.
75+
76+
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
9877

9978
## Next steps
10079

10180
For more information on application protection policies, see:
10281

103-
[App protection policies overview](https://learn.microsoft.com/en-us/mem/intune/apps/app-protection-policy)
104-
82+
[App protection policies overview](/mem/intune/apps/app-protection-policy)

0 commit comments

Comments
 (0)