Access to an Entra ID application is the primary thing that can be protected with this capability, with a policy able to target one or many Entra ID applications.
A summary of the configuration options is represented in the grid below.
Assignments are an intersection of all options chosen, so you can assign a policy to as little as one user and one application.
All controls chosen are required. And if more than one policy applies, then all controls for all policies are required.
Assignments |
Users and groups |
Include | Exclude |
Cloud apps |
Include | Exclude |
|
User actions |
|
Register security information |
Conditions |
Sign-in risk (Entra ID Identity Protection, via Entra ID P2) |
High | Medium | Low | No risk |
|
Note: Typical risks are atypical travel, unusual login, malware linked ip, leaked creds, known attack pattern |
Device platforms |
Include | Exclude |
Locations |
Include | Exclude |
Client apps |
Browser | Mobile apps and desktop clients | Modern authentication clients | Exchange ActiveSync clients | Other clients |
Device State |
Include | Exclude, where {Device Hybrid Entra ID joined, Device marked as compliant} |
Access controls |
Block access |
|
Grant access |
Require Multi-Factor Authentication |
|
Require device to be marked as compliant |
|
Require Hybrid Entra ID Joined device |
|
Require approved client app |
|
Require app protection policy |
|
Terms of Use |
|
Require one of the selected controls |
|
Require all of the selected controls |
Session |
Use app enforced restrictions |
|
Use Conditional access app control (Cloud App Security, via M365 A5)
See https://docs.microsoft.com/en-us/cloud-app-security/proxy-intro-aad & https://docs.microsoft.com/en-us/cloud-app-security/session-policy-aad |
|
Sign-in frequency |
|
Persistent browser session |
After a user has signed in and gotten an identity token from Entra ID, they use that identity token to request an access token so they can access an Entra ID application. Prior to issuing an access token, Entra ID will evaluate whether any Conditional Access policies apply. If so, it checks to see if the conditions are present, and if so, it requires the access controls. In some cases, the access controls are not interactive, so an error will be generated indicating what the user needs to do in order to successfully get an access token in the future.