Skip to content

Conditional Access & External Identities

Source: Azure Master Class v3 - Part 2 - Identity by John Savill
Timestamps: 01:56:00 - 02:28:19


Conditional Access Overview

📺 Video Reference: 01:56:07

Conditional Access is the Zero Trust policy engine at the heart of modern identity security.

The Core Concept

Zero Trust Mindset

"Never trust, always verify"

Every access request is evaluated based on:

  • Who is requesting access
  • What they're accessing
  • Where they're coming from
  • How they authenticated
  • What device they're using

Conditional Access Policy Structure

📺 Video Reference: 01:57:42

Every policy has two parts: Assignments (when to apply) and Access Controls (what to do).

Assignments (Conditions)

Access Controls

Control TypeOptions
GrantBlock, Allow with conditions
SessionLimit capabilities within apps

Grant Controls

ControlDescription
Block accessDeny authentication
Grant accessAllow with requirements
Require MFAMust complete MFA
Require device complianceIntune compliant device
Require Hybrid Azure AD JoinDomain-joined + synced
Require approved client appSpecific app list
Require app protection policyMAM policy applied
Require password changeForce immediate change
Require authentication strengthSpecific MFA type

Session Controls

ControlDescription
App-enforced restrictionsLimited SharePoint/Exchange access
Conditional Access App ControlRoute through Defender for Cloud Apps
Sign-in frequencyHow often to re-authenticate
Persistent browser sessionRemember vs always prompt
Customize continuous access evaluationReal-time policy enforcement

Common Conditional Access Scenarios

📺 Video Reference: 02:00:32

Scenario 1: Require MFA for Admins

SettingValue
UsersDirectory roles: All admin roles
Cloud appsAll cloud apps
GrantRequire MFA
ExcludeBreak glass accounts

Scenario 2: Block Legacy Authentication

📺 Video Reference: 02:01:48

Legacy protocols (IMAP, POP3, SMTP) don't support MFA!

Block Legacy Auth First

Legacy authentication is the #1 vector for password spray attacks. Block it immediately!

Scenario 3: Require Compliant Device for Sensitive Apps

Scenario 4: Location-Based Access


Named Locations

📺 Video Reference: 02:03:15

Define locations by:

TypeDescription
IP rangesCIDR blocks (office IPs)
CountriesGeographic boundaries
GPSFrom Authenticator app (compliant network)

Compliant Network Location

Uses GPS from the Microsoft Authenticator app to verify physical location.

GPS-Based Location

Useful when IP-based detection isn't reliable (e.g., users on mobile networks).


Risk-Based Policies

📺 Video Reference: 02:04:56

Entra ID Protection calculates risk levels in real-time:

Sign-in Risk

"Is this specific authentication attempt risky?"

Risk SignalExample
Anonymous IPUsing Tor, VPN exit nodes
Atypical travelLondon → Tokyo in 1 hour
Unfamiliar propertiesNew device, new location
Malicious IPKnown attack infrastructure
Password sprayDetected attack pattern

User Risk

"Is this user account compromised?"

Risk SignalExample
Leaked credentialsFound on dark web
Threat intelligenceAccount linked to attack
Anomalous behaviorUnusual patterns over time

Risk-Based Policy Example


Continuous Access Evaluation (CAE)

📺 Video Reference: 02:06:30

Traditional tokens: Valid for 1 hour regardless of what happens.

Problem: User disabled? They still have access for up to an hour!

CAE Solution

Critical events that trigger CAE:

  • User account disabled
  • Password change
  • MFA registration change
  • Location policy violation (if IP-based)

Near Real-Time Revocation

CAE reduces the "token theft" window from ~1 hour to minutes.


External Identities

📺 Video Reference: 02:09:00

Three scenarios for external users:


B2B Collaboration (Guest Users)

📺 Video Reference: 02:10:15

Invite external users to collaborate within your tenant.

How It Works

Guest Object in Your Tenant

PropertyValue
User TypeGuest
SourceExternal Azure AD (or other IDP)
UPNuser_fabrikam.com#EXT#@contoso.onmicrosoft.com
AuthenticationAt their home tenant
AuthorizationAt your tenant (Contoso)

What Guests Can Do

Access TypeConfigurable
Read directoryYes - can limit
Access shared resourcesYes - per resource
Join TeamsYes
Access SharePointYes
Use internal appsYes - via assignment

Invitation Settings

SettingOptions
Who can inviteAdmins only / Members / Guests
Allow self-service sign-upYes / No
Allowed domainsAny / Specific list / Block list

Cross-Tenant Access Settings

📺 Video Reference: 02:14:20

Fine-grained control over B2B relationships.

Inbound Settings

Control access from other organizations to your tenant.

SettingOptions
UsersAll / Specific groups
ApplicationsAll / Specific apps
Trust MFA from partnerYes / No
Trust device complianceYes / No

Outbound Settings

Control access from your tenant to other organizations.

SettingOptions
UsersAll / Specific groups
ApplicationsAll / Specific apps

Trust Settings

The most powerful part of cross-tenant access:

Trust SettingEffect
Trust MFAAccept partner's MFA (no double MFA!)
Trust compliant deviceAccept partner's Intune compliance
Trust Hybrid Azure AD joinAccept partner's domain-joined status

Eliminate Double MFA

If you trust MFA from Fabrikam, a Fabrikam user who completed MFA at home won't be prompted again in your tenant!


B2B Direct Connect

📺 Video Reference: 02:17:00

For Teams shared channels—direct federation without guest objects.

Key difference from B2B:

  • No guest user object in your directory
  • User stays in their own tenant
  • Access via shared channel trust

External ID for Customers (CIAM)

📺 Video Reference: 02:18:30

Build customer-facing applications with identity:

Use Cases

ScenarioSolution
Consumer mobile appExternal ID with social login
Partner portalB2B Collaboration
Customer web appExternal ID with branding
Contractor accessB2B with Cross-Tenant Access

CIAM Features

FeatureDescription
Custom brandingCompany look and feel
Self-service sign-upNo IT involvement
Social identity providersGoogle, Facebook, Apple
Progressive profilingCollect info over time
Custom user attributesStore app-specific data

Global Secure Access

📺 Video Reference: 02:20:45

Microsoft's SASE (Secure Access Service Edge) solution.

Two Components

Microsoft Entra Internet Access

Replace traditional proxies with cloud-delivered security:

FeatureDescription
Web content filteringBlock categories of sites
Threat protectionMalware, phishing protection
DLP integrationData loss prevention
Universal tenant restrictionsControl which tenants users can access

Microsoft Entra Private Access

Zero Trust replacement for VPN:

FeatureDescription
App-level accessAccess specific apps, not entire network
Conditional AccessApply CA policies to on-prem apps
No network-level accessCannot lateral move
Identity-basedUser must authenticate

Replace VPN

Private Access provides identity-based, app-specific access instead of network-based VPN that exposes your entire network.


Security Defaults

📺 Video Reference: 02:24:00

For organizations without Entra ID P1/P2:

What Security Defaults Enable

ProtectionDescription
Require MFA registrationAll users must register
MFA for adminsAlways required
MFA for usersWhen risky (heuristic-based)
Block legacy authenticationBlocked entirely
Protect privileged operationsExtra verification

Security Defaults vs Conditional Access

If you have P1/P2, use Conditional Access for fine-grained control. Security Defaults is all-or-nothing.


Policy Evaluation Order

📺 Video Reference: 02:26:00

All applicable policies are evaluated, then combined:

Key rules:

  1. If ANY policy blocks → Blocked
  2. ALL grant requirements from ALL policies must be satisfied
  3. Exclusions override includes
  4. More specific conditions win

Quick Reference

Conditional Access Policy Checklist

  • [ ] Block legacy authentication
  • [ ] Require MFA for all admins
  • [ ] Require MFA for all users
  • [ ] Block high-risk sign-ins
  • [ ] Require password change for high-risk users
  • [ ] Require compliant device for sensitive apps
  • [ ] Create named locations for offices
  • [ ] Exclude break-glass accounts from all policies
  • [ ] Enable CAE for supported apps

External Identity Decision Tree


Further Reading

Released under the MIT License.