- givenname
- surname
- emailaddress
- name
Each Entra ID application may have specific needs that go beyond basic requirements. This page covers the most common advanced requirements. NOTE: This page is incomplete. Content is expected to be finished by 1/18/2022.
Assignments | |
Users and groups | Include | Exclude |
Cloud apps | Include | Exclude |
User actions | |
Register security information | |
Conditions | |
Sign-in risk (Entra ID Identity Protection, via Entra ID P2) | High | Medium | Low | No risk |
Note: Typical risks are atypical travel, unusual login, malware linked ip, leaked creds, known attack pattern | |
Device platforms | Include | Exclude |
Locations | Include | Exclude |
Client apps | Browser | Mobile apps and desktop clients | Modern authentication clients | Exchange ActiveSync clients | Other clients |
Device State | Include | Exclude, where {Device Hybrid Entra ID joined, Device marked as compliant} |
Access controls | |
Block access | |
Grant access | Require Multi-Factor Authentication |
Require device to be marked as compliant | |
Require Hybrid Entra ID Joined device | |
Require approved client app | |
Require app protection policy | |
Terms of Use | |
Require one of the selected controls | |
Require all of the selected controls | |
Session | Use app enforced restrictions |
Use Conditional access app control (Cloud App Security, via M365 A5) See https://docs.microsoft.com/en-us/cloud-app-security/proxy-intro-aad & https://docs.microsoft.com/en-us/cloud-app-security/session-policy-aad | |
Sign-in frequency | |
Persistent browser session |