How to create conditional access policy in Azure

 To create a Conditional Access policy in Azure Active Directory (Azure AD), follow these steps:

1. Sign in to the Azure portal: Navigate to https://portal.azure.com and sign in with an account that has permissions to manage Azure AD settings.

2. Access Conditional Access policies: In the Azure portal, search for "Azure Active Directory" in the search bar, and then select the Azure AD service from the search results.

3. Navigate to Conditional Access: In the Azure AD blade, select the "Security" option from the left-hand menu, then select "Conditional Access" under the "Security" section. This will take you to the Conditional Access policies page.

4. Create a new Conditional Access policy:

   - Click on the "+ New policy" button to create a new Conditional Access policy.

5. Configure policy settings:

   - Name: Enter a name for the policy that describes its purpose or target users.

   - Assignments: Specify the users, groups, or applications to which the policy should apply. You can target specific users or groups, all users, or specific applications.

   - Cloud apps or actions: Choose the cloud apps or actions that the policy should apply to. This can include Office 365 apps, Azure apps, or other SaaS apps integrated with Azure AD.

   - Conditions: Define conditions that must be met for the policy to be enforced. This can include factors such as sign-in risk level, device state, location, or client apps.

   - Access controls: Specify the access controls to apply when the policy conditions are met. This can include requiring multi-factor authentication, blocking access, granting access, or requiring device compliance.

   - Session controls (optional): Optionally, configure session controls such as session lifetime, persistent browser session, or sign-in frequency.

   - Grant controls (optional): Optionally, configure grant controls such as requiring device to be marked as compliant or requiring hybrid Azure AD joined device.

   - Exclusions (optional): Optionally, specify exclusions for users, groups, locations, or devices to exclude from the policy.

   - Enforcement (optional): Optionally, configure session controls such as enabling or disabling policy enforcement.

6. Review and create policy:

   - Review the configured settings to ensure they meet your requirements.

   - Click on the "Create" button to create the Conditional Access policy.

7. Verify policy application:

   - After creating the policy, it will be applied to the users, groups, or applications specified in the policy assignments.

   - Test the policy by signing in with a user account that meets the specified conditions to verify that the policy is enforced as expected.

By following these steps, you can create a Conditional Access policy in Azure AD to enforce access controls and security measures based on specific conditions and requirements.

Comments

Popular posts from this blog

Copy file to multiple remote server using powershell