Skip to content

Commit d8bdb1c

Browse files
Update from JG
1 parent d29df97 commit d8bdb1c

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

articles/active-directory/conditional-access/migrate-approved-client-app.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 01/09/2023
9+
ms.date: 02/10/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -19,11 +19,11 @@ ms.collection: M365-identity-device-management
1919

2020
In this article, you’ll learn how to migrate from the approved client app Conditional Access grant to the application protection policy grant. App protection policies provide the same data loss and protection as approved client app policies, but with other benefits. For more information about the benefits of using app protection policies, see the article [App protection policies overview](/mem/intune/apps/app-protection-policy).
2121

22-
The approved client app grant will be retired in March 2026. Organizations must transition all current Conditional Access policies that use only the Require Approved Client App grant to Require Approved Client App or Application Protection Policy by March 2026. Additionally, for any new Conditional Access policy, only apply the Require application protection policy grant.
22+
The approved client app grant will be retired in early March 2026. Organizations must transition all current Conditional Access policies that use only the Require Approved Client App grant to Require Approved Client App or Application Protection Policy by March 2026. Additionally, for any new Conditional Access policy, only apply the Require application protection policy grant.
2323

2424
After March 2026, Microsoft will stop enforcing require approved client app control, and it will be as if this grant isn't selected. Use the following steps before March 2026 to protect your organization’s data.
2525

26-
## Edit an existing Conditional Access policy
26+
## Edit an existing Conditional Access policy
2727

2828
Require approved client apps or app protection policy with mobile devices
2929

@@ -47,7 +47,7 @@ Repeat the previous steps on all of your policies that use the approved client a
4747
> [!WARNING]
4848
> Not all applications that are supported as approved applications or support application protection policies. For a list of some common client apps, see [App protection policy requirement](concept-conditional-access-grant#require-app-protection-policy.md). If your application is not listed there, contact the application developer.
4949
50-
## Create a Conditional Access policy
50+
## Create a Conditional Access policy
5151

5252
Require app protection policy with mobile devices
5353

@@ -75,7 +75,10 @@ Organizations can choose to deploy this policy using the following steps.
7575

7676
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
7777

78-
## Next steps
78+
> [!NOTE]
79+
> If an app does not support **Require app protection policy**, end users trying to access resources from that app will be blocked.
80+
81+
## Next steps
7982

8083
For more information on application protection policies, see:
8184

0 commit comments

Comments
 (0)