How Conditional Access policies can further secure your environment

How Conditional Access policies can further secure your environment

If you've been in the IT world for a while, you would have heard of all the talk around multifactor authentication and more recently, a lot more talk about 'Conditional Access'. In this post, I'm going to break down how you can use Conditional Access within your environment and how it can help organisations secure authentication.

Conditional Access is a feature within Microsoft's Azure Active Directory that allows administrators to add an extra layer of security to the authentication process.

?Traditionally, using multifactor authentication, users sign-in using their username and password and are then prompted to prove they are who they say they are by means of a unique SMS code, a Authentication App, or some other means. Once the user has done this, they have then proven they are indeed who they say they are, and the login process continues without much further granularity.

?Enter Conditional Access…..

?Conditional Access allows administrators to assess other values and variables during the sign-in process. Some of these may include

  • The user's location
  • The device's operating system
  • The application being signed into
  • The client application being used
  • Whether the device is Azure AD joined

?Let's look at these two examples below.

?Company A has 100 employees all working from Australia. No employees are expected to work outside of Australia. Administrators can then create a Conditional Access policy to block access to any of the applications within their organisation (provided they use Azure AD for auth) from outside of Australia.

?Or maybe the organisation expects all devices that sign into their organisation to be enrolled in Microsoft Intune. Administrators can create a Conditional Access policy that checks the device during the sign-in process to determine if it is compliant with the organisation's policies.

?Multifactor authentication can also be managed from within the Conditional Access policy to ensure that users are required to MFA prior to logging in. The extra granularity allows organisations to create "Trusted Locations" which may not require MFA. For example, when a user is signing in from their corporate IT network where the physical network is secured and the organisation owns the public IP address.

?Organisations using Azure AD with Premium Plan 1 licensing are eligible to enable Conditional Access policies and those are not are able to purchase P1 licensing as add-on if required.

?Hope that gives you a bit of an idea of how you can use Conditional Access within your environment and as usual, if you need help, reach out!

要查看或添加评论,请登录

Elias Atie的更多文章

  • How businesses can better handle telco outages

    How businesses can better handle telco outages

    In the past 48 hours, businesses small, medium and large have been thrown into into disarray due to the major Optus…

    1 条评论
  • Power Apps - What is it?

    Power Apps - What is it?

    Unless you've been living under a rock for the past few years, you would have heard of Microsoft Power Apps and all its…

    1 条评论
  • To cloud or not to cloud

    To cloud or not to cloud

    It's 2022 - the last time you purchased new hardware for the organisation was 7 years ago and things are starting to go…

  • Four Free Tips to Secure Microsoft 365

    Four Free Tips to Secure Microsoft 365

    Hi, Elias Atie from Cloud Context here. Today, I'm going to give you a few tips that are going to help you ensure that…

  • So you've deployed Microsoft Teams

    So you've deployed Microsoft Teams

    Good work, you've managed to deploy Microsoft Teams! You've been planning to deploy it for months, and you scheduled…

社区洞察

其他会员也浏览了