Why Conditional Access Matters
In Azure, security is no longer about protecting a single network perimeter. With cloud and hybrid work, identities access resources from anywhere — home, office, mobile.
Conditional Access (CA) is the policy engine in Entra ID that enforces rules to ensure only trusted users, under trusted conditions, can access resources.
Think of CA as a bouncer at the door — it checks identity, device health, location, and risk before letting someone in.
Key Design Elements
1. Conditional Access Policies
Define if/then rules for access.
-
IF: A user attempts to access a resource (Teams, SharePoint, VM, SaaS app).
-
THEN: Apply a control (require MFA, block access, require compliant device).
Common rules:
-
Block legacy authentication (old protocols like POP/IMAP).
-
Require MFA for sign-ins from outside corporate network.
-
Allow only compliant devices (managed by Intune).
2. Multi-Factor Authentication (MFA)
Adds something you know (password) + something you have (phone, app, token).
-
Methods: Authenticator app push, SMS, voice call, FIDO2 security key.
-
Can be enforced globally or via Conditional Access.
Best practice: Don’t blanket require MFA everywhere. Use risk-based MFA — apply it only when sign-in risk is high.
3. Zero Trust Security Model
-
Principle: “Never trust, always verify.”
-
Every request must be authenticated, authorized, and encrypted.
-
Access depends on:
-
User identity (who they are).
-
Device state (compliant or jailbroken).
-
Location (trusted office IP vs unknown region).
-
Risk signals (detected unusual behavior).
-
Zero Trust shifts from “trusting the internal network” to “always validate every request.”
🚨 Confusion Buster
-
MFA vs Conditional Access:
-
MFA = an authentication method.
-
Conditional Access = the policy engine that decides when MFA should apply.
-
-
Zero Trust vs CA:
-
Zero Trust = security philosophy.
-
CA = Microsoft’s implementation of it.
-
Example Enterprise Scenario
A financial company wants to:
-
Block legacy sign-ins.
-
Require MFA if users log in from outside the country.
-
Allow internal office access without MFA for convenience.
Correct design:
-
Use Conditional Access policy → block legacy auth.
-
Add location-based policy → require MFA outside corporate IPs.
-
Allow compliant office IPs without MFA.
Exam Tips
-
If question says “require extra authentication only for risky sign-ins” → Conditional Access with MFA.
-
If question says “company wants to block outdated protocols” → Conditional Access (block legacy auth).
-
If question says “security principle: never trust, always verify” → Zero Trust.
What to Expect in the Exam
-
Direct Q: “Which Entra ID feature enforces if/then rules for access?” → Conditional Access.
-
Scenario Q: “Company requires MFA only when employees access apps from outside the office.” → Conditional Access policy.
-
Trick Q: “MFA and Conditional Access are the same.” → False.