Skip to main content

Conditional Access in EntraID

Conditional Access in Entra helps control who can access your organization’s resources by setting rules based on specific conditions like user identity, location, device status, and more. This ensures secure access while protecting sensitive data.

PolicyAssignmentsConditionsAccess
Require Multifactor Authentication for AdminsAdministrators, Global AdminsNoneRequire Multi-Factor Authentication (MFA) for all admin sign-ins.
Securing Security Info RegistrationAll UsersNoneRequire users to secure their security information (e.g., phone number, email) before registering for MFA.
Block Legacy AuthenticationAll Users or Specific GroupsNoneBlock access from legacy authentication methods (e.g., POP, IMAP, SMTP).
Require Multifactor Authentication for Admins Accessing Microsoft Admin PortalsAdministrators, Admin RolesNoneRequire MFA for access to Microsoft admin portals (e.g., Microsoft 365 Admin Center).
Require Multifactor Authentication for All UsersAll UsersNoneRequire MFA for all user sign-ins to secure access to corporate resources.
Require Multifactor Authentication for Azure ManagementAzure Administrators, Azure RolesNoneEnforce MFA for access to Azure management resources.
Require Compliant or Microsoft Entra Hybrid Joined Device or Multifactor Authentication for All UsersAll UsersDevice Compliance (e.g., Compliant or Hybrid-joined devices) or MFARequire either compliant or Microsoft Entra hybrid-joined devices, or MFA, for all users.
Require Compliant DeviceAll Users or Specific GroupsDevice Compliance (e.g., must be enrolled or compliant with organization’s security policies)Block or limit access from non-compliant or unmanaged devices.

Benefits of These Policies

  • Improved Security: Mitigate risks by enforcing multi-layered security controls, such as MFA, location-based policies, and device compliance.
  • Adaptability: Customize policies based on the type of user, device, and location to ensure access is granted only under safe conditions.
  • Reduced Risk: Prevent unauthorized access by using risk-based sign-ins, legacy authentication blocking, and location-based restrictions.