Skip to content

Commit d48b54b

Browse files
Merge pull request #210263 from MicrosoftGuyJFlo/patch-3
[Azure AD] Conditional Access - App Protection Policy list update from PG
2 parents 6373ff6 + 5bb86b7 commit d48b54b

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 08/05/2022
9+
ms.date: 09/06/2022
1010
ms.author: joflore
1111
author: MicrosoftGuyJFlo
1212
manager: amycolannino
@@ -132,9 +132,9 @@ In your Conditional Access policy, you can require that an [Intune app protectio
132132

133133
To apply this grant control, Conditional Access requires that the device is registered in Azure AD, which requires using a broker app. The broker app can be either Microsoft Authenticator for iOS or Microsoft Company Portal for Android devices. If a broker app isn't installed on the device when the user attempts to authenticate, the user is redirected to the app store to install the broker app.
134134

135-
Applications must have the Intune SDK with policy assurance implemented and must meet certain other requirements to support this setting. Developers who are implementing applications with the Intune SDK can find more information on these requirements in the SDK documentation.
135+
Applications must have the Intune SDK with policy assurance implemented and must meet certain other requirements to support this setting. Developers who are implementing applications with the Intune SDK can find more information on these requirements in the [SDK documentation](/mem/intune/developer/app-sdk-get-started).
136136

137-
The following client apps support this setting:
137+
The following client apps are confirmed to support this setting:
138138

139139
- Microsoft Cortana
140140
- Microsoft Edge
@@ -153,6 +153,9 @@ The following client apps support this setting:
153153
- Microsoft Word
154154
- MultiLine for Intune
155155
- Nine Mail - Email and Calendar
156+
- Notate for Intune
157+
158+
This list is not all encompassing, if your app is not in this list please check with the application vendor to confirm support.
156159

157160
> [!NOTE]
158161
> Kaizala, Skype for Business, and Visio don't support the **Require app protection policy** grant. If you require these apps to work, use the **Require approved apps** grant exclusively. Using the "or" clause between the two grants will not work for these three applications.

0 commit comments

Comments
 (0)