Hands-On Activity: Setup Conditional Access for Admins in Azure Entra ID

What is Conditional Access?

Conditional Access is a feature in Azure Entra Id (Azure AD), that allows organizations to enforce policies that control how and when users can access resources based on specific conditions.

It acts as a gatekeeper, providing additional layers of security by requiring certain conditions to be met before granting access to corporate applications and services. Think of it as an intelligent security layer that takes into account who, where, how, and on what device the user is trying to access an application.


Key Features of Conditional Access:

Contextual Access Control: It makes access decisions based on specific conditions, such as the user’s role, location, device compliance, and the application they’re trying to access.

Granular Control: You can apply access policies to specific users, groups, and roles (e.g., only global admins or specific departments).

Integration with Identity Protection: Conditional Access can be tied to risk-based policies using Azure Identity Protection to make dynamic decisions based on the user’s sign-in behavior and device state.

Automation of MFA: Multi-factor authentication (MFA) can be triggered for additional security when conditions are met, reducing the risk of unauthorized access.

Security Policies: These policies ensure that only secure, trusted, and compliant devices and users can access your organization’s resources.


Common Scenarios for Conditional Access:

  1. Requiring MFA for admins accessing sensitive resources like the Azure portal or Microsoft 365 admin center.
  2. Blocking access to apps when users sign in from a non-compliant device (e.g., jailbroken phones or unmanaged devices).
  3. Limiting access to company resources from untrusted locations, like requiring users to be on the corporate VPN for access.
  4. Controlling access based on risk—for instance, if a user’s sign-in is flagged as suspicious, they might need to provide additional verification.

Components of a Conditional Access Policy:

1. Assignments:

2. Controls:

3. Enable or Disable the Policy:


Benefits of Conditional Access:


Hands-On Activity: Setting Up Conditional Access for Admins in Azure Entra ID

Objective:

To create and configure a Conditional Access policy that requires Multi-Factor Authentication (MFA) for Global Admins accessing resources from non-compliant devices.

Prerequisites:

Step-by-Step Instructions:

1. Sign In to Azure Portal:

2. Access Azure Entra ID:

3. Go to Conditional Access:

4. Create a New Conditional Access Policy:

5. Name the Policy:

6. Assign the Policy to Global Admins:

7. Configure Conditions: - Location:

- Device Platforms (Optional):

Device State:

8. Set Access Controls:

9. Enable the Policy:

10. Testing the Policy:

Outcome:

By completing this task, students will understand how to configure and enforce Conditional Access policies that secure access for Global Admins. They will have learned how to:

Questions:

  1. What impact does enforcing MFA have on securing privileged accounts like Global Admins?
  2. How could this policy be modified to also include Security Administrators or Other Admin Roles?
  3. How might this Conditional Access policy help in meeting organizational security and compliance requirements?
  4. How does enforcing MFA for admins help protect the organization’s Azure resources?
  5. Why is it important to target specific roles like Global Administrator in Conditional Access policies rather than applying policies to all users?
  6. What challenges might arise if the device compliance condition is too strict or too lenient?
💬
AI Learning Assistant