Azure Active Directory (AD) Conditional Access provides added security by allowing access to your applications across cloud and on-premises only from trusted and compliant devices. It is a policy-based approach. You can configure a Conditional Access policy with the required conditions to apply the access controls. Conditions can be device type, users’ attributes, operating systems, client application accessed over web or cloud apps, network login location, sign-in risks, and so forth.
A Conditional Access policy works only when modern authentication (ADAL-based) is used with Office 365 resources. You cannot apply a Conditional Access policy to on-premises applications, such as local SharePoint or Exchange.
For more information, see the following Microsoft documentation:
Using Conditional Access policies, you can accomplish the following requirements:
Restricting access to protected applications only from managed and trusted devices: corporate devices and BYOD.
Restricting access only from compliant devices with appropriate security profile.
Securing the enterprise data outside the network boundary.
Managing devices:
Visibility of the number of devices accessing the application.
Visibility of the security strength of devices accessing the application.
Assigning and revoking devices.
Defining a group of users or devices and applying policies.
Access Manager supports Conditional Access for devices on the following platforms:
Windows 10, Windows Server 2016, Windows Server 2019
iOS, macOS
Android
Microsoft Word app has been used as an example here.
When a user tries to access the Word App, the request is sent to Access Manager for authenticating the user and the device.
1 A: If the device of the user is not registered: The device is registered automatically to Azure AD through Hybrid Azure AD join.
1 B: The device is evaluated to see if it is compliant with the company policies. If the device is compliant, the required properties are set in Azure AD.
Access Manager sends an access token and a refresh token required for accessing Office 365 to the Word app.
The Word app sends the access token to Office 365.
Based on the access token, Office 365 grants the user with access to the content in the Word app.
You must meet the following requirement to enable Conditional Access:
Azure AD Premium P1 license for users.
Devices are registered to Azure AD or Hybrid AD Join. See Automatic Hybrid Azure AD Join for Windows Devices.
Log in to Microsoft Azure as an administrator.
In the Azure portal, click Azure Active Directory.
Under Security, click Conditional Access.
Click New policy.
Specify a name for the policy. For example, test hybrid azure.
Under Assignment, click Users and groups.
Perform the following actions:
Click Select users and groups > Users and groups.
Click Select.
Select the user for whom you want to control access.
Click Select > Done.
Click Cloud apps and select apps for which you require to apply this policy.
Click Conditions and then select required conditions, such as Device platforms, Sign-In risk, Locations, Client apps, and Device state (if the device is managed).
Under Access Controls, click Grant.
Perform the following actions:
Select Grant access > Require Hybrid Azure AD Joined device.
Click Select.
Under Enable policy, click On.
Click Create.
For more information about creating a Conditional Access policy, see Create your Conditional Access policy.
Log in to the Windows machine.
Windows is auto-registered to Azure AD through hybrid AD Join.
Ensure that the device is registered.
Log in to the Azure portal.
Click Azure Active Directory > Devices.
Verify that your device is listed and Join Type is Hybrid Azure AD joined.
Open Microsoft Office in a web browser.
You are logged in to Office if the device is hybrid Azure AD joined. If the device is not hybrid Azure AD joined, Office 365 denies the access.
Log in to the Azure portal.
Click Azure Active Directory.
Under Monitoring, click Sign-ins.
Select the event, and then click Conditional Access to verify the policy execution status.