How to create conditional access policy in Azure
To create a Conditional Access policy in Azure Active Directory (Azure AD), follow these steps:
1. Sign in to the Azure portal: Navigate to https://portal.azure.com and sign in with an account that has permissions to manage Azure AD settings.
2. Access Conditional Access policies: In the Azure portal, search for "Azure Active Directory" in the search bar, and then select the Azure AD service from the search results.
3. Navigate to Conditional Access: In the Azure AD blade, select the "Security" option from the left-hand menu, then select "Conditional Access" under the "Security" section. This will take you to the Conditional Access policies page.
4. Create a new Conditional Access policy:
- Click on the "+ New policy" button to create a new Conditional Access policy.
5. Configure policy settings:
- Name: Enter a name for the policy that describes its purpose or target users.
- Assignments: Specify the users, groups, or applications to which the policy should apply. You can target specific users or groups, all users, or specific applications.
- Cloud apps or actions: Choose the cloud apps or actions that the policy should apply to. This can include Office 365 apps, Azure apps, or other SaaS apps integrated with Azure AD.
- Conditions: Define conditions that must be met for the policy to be enforced. This can include factors such as sign-in risk level, device state, location, or client apps.
- Access controls: Specify the access controls to apply when the policy conditions are met. This can include requiring multi-factor authentication, blocking access, granting access, or requiring device compliance.
- Session controls (optional): Optionally, configure session controls such as session lifetime, persistent browser session, or sign-in frequency.
- Grant controls (optional): Optionally, configure grant controls such as requiring device to be marked as compliant or requiring hybrid Azure AD joined device.
- Exclusions (optional): Optionally, specify exclusions for users, groups, locations, or devices to exclude from the policy.
- Enforcement (optional): Optionally, configure session controls such as enabling or disabling policy enforcement.
6. Review and create policy:
- Review the configured settings to ensure they meet your requirements.
- Click on the "Create" button to create the Conditional Access policy.
7. Verify policy application:
- After creating the policy, it will be applied to the users, groups, or applications specified in the policy assignments.
- Test the policy by signing in with a user account that meets the specified conditions to verify that the policy is enforced as expected.
By following these steps, you can create a Conditional Access policy in Azure AD to enforce access controls and security measures based on specific conditions and requirements.
Comments