First published on CloudBlogs on Dec 15, 2016
The digital transformation that’s affecting every organization brings new challenges for IT, as they strive to empower their users to be productive while keeping corporate data secure in an increasingly complex technology landscape. Microsoft Enterprise Mobility + Security (EMS) provides a unique identity-driven security approach to address these new challenges at multiple layers and to provide you with a more holistic and innovative approach to security –one that can protect, detect, and respond to threats on-premises as well as in the cloud. Risk-based conditional access is a critical part of our identity-driven security story. It ensures that only the right users, on the right devices, under the right circumstances have access to your sensitive corporate data. Conditional access allows you to define policies that provide contextual controls at the user, location, device, and app levels, and it also takes risk information into consideration (powered by the vast data in Microsoft’s Intelligent Security Graph ). As conditions change, natural user prompts ensure only the right users on compliant devices can access sensitive data, providing you the control and protection you need to keep your corporate data secure while allowing your people to do their best work from any device. This is an area where we are constantly innovating to bring you the most secure and easy-to-use solution, and today we’re announcing several improvements to Conditional Access in EMS:
The digital transformation that’s affecting every organization brings new challenges for IT, as they strive to empower their users to be productive while keeping corporate data secure in an increasingly complex technology landscape. Microsoft Enterprise Mobility + Security (EMS) provides a unique identity-driven security approach to address these new challenges at multiple layers and to provide you with a more holistic and innovative approach to security –one that can protect, detect, and respond to threats on-premises as well as in the cloud. Risk-based conditional access is a critical part of our identity-driven security story. It ensures that only the right users, on the right devices, under the right circumstances have access to your sensitive corporate data. Conditional access allows you to define policies that provide contextual controls at the user, location, device, and app levels, and it also takes risk information into consideration (powered by the vast data in Microsoft’s Intelligent Security Graph ). As conditions change, natural user prompts ensure only the right users on compliant devices can access sensitive data, providing you the control and protection you need to keep your corporate data secure while allowing your people to do their best work from any device. This is an area where we are constantly innovating to bring you the most secure and easy-to-use solution, and today we’re announcing several improvements to Conditional Access in EMS:
- Risk-based access policies per application . Leverage machine learning on a massive scale to provide real-time detection and automated protection. Now you can use this data to build risk-based policies per application.
- Greater flexibility to protect applications . Set multiple policies per application or set and easily roll out global rules to protect all your applications with a single policy.
- All these capabilities are now available in a unified administrative experience on the Azure portal . This makes it even easier to create and manage holistic conditional access policies to all your applications.
Overview
A Conditional Access policy is simply a statement about When the policy should apply (called Conditions ), and What the action or requirement should be (called Controls ).Conditions (When the policy should apply)
Conditions are the things about a login that don’t change during the login, and are used to decide which policies should apply. Azure AD supports the following Conditions:- Users/Groups are the users/groups in the directory that the policy applies to.
- Cloud apps are the services the user accesses that you want to secure.
- Client app is the software the user is employing to access cloud app.
- Device platform is the platform the user is signing in from.
- Location is the IP-address based location the user is signing in from.
- Sign-in risk is the likelihood that the sign-in is coming from someone other than the user.
Controls (What the action or requirement should be)
Controls are the additional enforcements that are put in place by the policy (such as “do a Multi-factor authentication” challenge) that will be inserted into the login flow. Azure AD supports the following controls:- Block access
- Multi-factor authentication
- Compliant device
- Domain Join
Published Sep 08, 2018
Version 1.0MicrosoftSecurityandComplianceTeam
Iron Contributor
Joined September 05, 2018
Security, Compliance, and Identity Blog
Follow this blog board to get notified when there's new activity