Forum Discussion
Exclusion of Copilot App (for O365) from Conditional Access Policies does not work
Hi,
we've built a Conditional Access Policy in EntraID that forces MFA for all Cloud Apps. We want to exclude "Microsoft 365 Copilot"/ "Copilot App" so no Reauthentication is necessary for Copilot in the frame of accessing O365 content. Exclusion has been made for a range of identified Copilot applications that are shown in Sign-in logs.
However, reauthentication still pops up. No other conditional access policy is applied. It's this specific policy that requires reauthentication.
What's the reason why the exclusion does not work? Is there something else necessary to be taken into consideration so the exclusion works fine?
Many thanks in advance!
1 Reply
- Ankit365Brass Contributor
This behavior comes down to how Copilot actually accesses data in Microsoft 365. Even though you see a “Copilot” app ID in your Entra ID sign-in logs, Copilot itself is not a standalone cloud app in the sense Conditional Access expects. Under the hood, Copilot relies on the same Microsoft 365 service endpoints (Exchange Online, SharePoint Online, Teams, etc.) to retrieve and process data. So when you exclude the “Copilot” app from your policy, the Conditional Access engine still enforces the rule at the point where those underlying services are being accessed, and that’s why the MFA prompt continues to appear.
the Conditional Access evaluation happens against the real resource Copilot is calling, not the Copilot front-end identity you’re excluding. Right now Microsoft doesn’t provide a way to carve Copilot out of a blanket “all cloud apps” MFA policy. The recommended approach is to adjust the scope of your policy at the service level instead of trying to exclude Copilot directly. For example, you could refine the policy to target specific apps where you want MFA, or rely on session controls and sign-in frequency settings rather than enforcing MFA on every request.
So the reason the exclusion is failing isn’t a misconfiguration on your sideit’s simply because Copilot is layered on top of Exchange, SharePoint, OneDrive, and Teams, and those are the apps Conditional Access actually controls. If your requirement is to reduce reauthentication friction for Copilot, the practical path is to tune sign-in frequency or session persistence rather than excluding the Copilot app object.