Skip to content

Commit da3abca

Browse files
WIP
1 parent d8bdb1c commit da3abca

File tree

3 files changed

+7
-5
lines changed

3 files changed

+7
-5
lines changed

articles/active-directory/conditional-access/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,8 @@
120120
href: troubleshoot-conditional-access-what-if.md
121121
- name: Troubleshoot continuous access evaluation
122122
href: howto-continuous-access-evaluation-troubleshoot.md
123+
- name: Approved client app migration
124+
href: migrate-approved-client-app.md
123125
- name: Custom controls
124126
href: controls.md
125127
- name: Classic policies

articles/active-directory/conditional-access/howto-policy-approved-app-or-app-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,4 +94,4 @@ After confirming your settings using [report-only mode](howto-conditional-access
9494

9595
[Conditional Access common policies](concept-conditional-access-policy-common.md)
9696

97-
[Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)
97+
[Migrate approved client app to application protection policy in Conditional Access](migrate-approved-client-app.md)

articles/active-directory/conditional-access/migrate-approved-client-app.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,17 +17,17 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Migrate approved client app to application protection policy in Conditional Access
1919

20-
In this article, you’ll learn how to migrate from the approved client app Conditional Access grant to the application protection policy grant. App protection policies provide the same data loss and protection as approved client app policies, but with other benefits. For more information about the benefits of using app protection policies, see the article [App protection policies overview](/mem/intune/apps/app-protection-policy).
20+
In this article, you learn how to migrate from the approved client app Conditional Access grant to the application protection policy grant. App protection policies provide the same data loss and protection as approved client app policies, but with other benefits. For more information about the benefits of using app protection policies, see the article [App protection policies overview](/mem/intune/apps/app-protection-policy).
2121

22-
The approved client app grant will be retired in early March 2026. Organizations must transition all current Conditional Access policies that use only the Require Approved Client App grant to Require Approved Client App or Application Protection Policy by March 2026. Additionally, for any new Conditional Access policy, only apply the Require application protection policy grant.
22+
The approved client app grant is retiring in early March 2026. Organizations must transition all current Conditional Access policies that use only the Require Approved Client App grant to Require Approved Client App or Application Protection Policy by March 2026. Additionally, for any new Conditional Access policy, only apply the Require application protection policy grant.
2323

2424
After March 2026, Microsoft will stop enforcing require approved client app control, and it will be as if this grant isn't selected. Use the following steps before March 2026 to protect your organization’s data.
2525

2626
## Edit an existing Conditional Access policy
2727

2828
Require approved client apps or app protection policy with mobile devices
2929

30-
The following steps will make an existing Conditional Access policy require an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an app protection policy created in Microsoft Intune.
30+
The following steps make an existing Conditional Access policy require an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an app protection policy created in Microsoft Intune.
3131

3232
Organizations can choose to update their policies using the following steps.
3333

@@ -51,7 +51,7 @@ Repeat the previous steps on all of your policies that use the approved client a
5151

5252
Require app protection policy with mobile devices
5353

54-
The following steps will help create a Conditional Access policy requiring an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an [app protection policy created in Microsoft Intune](/mem/intune/apps/app-protection-policies).
54+
The following steps help create a Conditional Access policy requiring an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an [app protection policy created in Microsoft Intune](/mem/intune/apps/app-protection-policies).
5555

5656
Organizations can choose to deploy this policy using the following steps.
5757

0 commit comments

Comments
 (0)