Skip to content

Commit 5ea927a

Browse files
Update entra-conditional-access-policy.md
Added note to add a Service Principal for the app Microsoft Defender for Cloud Apps - Session Controls to make it available in the Conditional Access Account Picker
1 parent 61d2722 commit 5ea927a

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

defender-for-cloud-apps/includes/entra-conditional-access-policy.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,13 @@ For more information, see [Conditional Access policies](/azure/active-directory/
3838
To protect your SaaS applications with Session Controls, you must allow access to this application.
3939
>
4040
>If you have any Conditional Access policies that have **“Block Access”** selected in the **“Grant Access”** Control under a Microsoft Entra ID Conditional Access policy scoped to this app, end users will not be able to access the protected applications under session controls. <br><br>
41-
>It's important to ensure that this application isn't unintentionally restricted by any Conditional Access policies. For policies that restrict all or certain applications, please ensure this application is listed as an exception in the **Target resources** or confirm that the blocking policy is deliberate.<br>
41+
>It's important to ensure that this application isn't unintentionally restricted by any Conditional Access policies. For policies that restrict all or certain applications, please ensure this application is listed as an exception in the **Target resources** or confirm that the blocking policy is deliberate.
42+
>
43+
>You may need to add create the following service principal to make the app available in the Conditional Access app picker.
44+
># Connect with the appropriate scopes to create service principal
45+
Connect-MgGraph -Scopes "Application.ReadWrite.All"
46+
47+
# Create service principal for the service **Microsoft Defender for Cloud Apps - Session Controls**
48+
New-MgServicePrincipal -AppId 8a0c2593-9cbc-4f86-a247-beb7aab00d83<br>
4249
>
4350
>To ensure your location-based conditional access policies function correctly, include the **Microsoft Defender for Cloud Apps – Session Controls** application in those policies.

0 commit comments

Comments
 (0)