I have created a conditional access policy to only allow access to an application (Zendesk) where we use Azure AD Single Sign-on. The policy does work if I select MFA or if I exclude my trusted IPs.
Every setting will take effect on the policy with the single exception of the "Require device to be marked as compliant" option under Grant Access. This will simply prevent access because after logging in, the device being use is not recognized as a compliant device... however in Intune and in Azure AD the device is defined as compliant.
This is frustrating because we don't want to prompt for MFA on approved devices, i.e., company provided/managed laptops for our remote employees.
Has anyone been able to use this policy and if so, can you shed any light on why this might be an issue?
I'm facing now the same issue with LOB app which is trying to connect to Exchange. Based on error it looks like during authorization app is not reporting device ID to Azure, that is why Azure is not able to process request.
Trying to fix that with support for almost a month. No luck yet.
since a few weeks you need to have a compliance policy assigned to your devices otherwise they are treated as non-compliant. So there are to options to get your device to a compliant state. Assign a compliance policy to the user or device or change the default to allow devices without compliance policy to be treated as compliant by default.