Regulating access to your companyβs files, systems, and applications cuts the risk of your data falling into the hands of hackers, threat actors and thieves.
While standard privilege management stops at ID-based authentication, conditional access in Azure Active Directory gives greater flexibility and control by allowing remote connections only when certain conditions are met.
Using conditional access, an administrator can regulate access by user location, device type, the kind of application or file being used and more. To achieve this, the administrator creates an Azure Active Directory security policy that specifies which condition(s) must be met for access to be allowed.
In this back-to-basics CQURE Hacks episode, Paula J demonstrates how to create secure conditional access policies and monitor access in the Azure Active Directory.
>>> Controlling access by a userβs IP address
o Β Add the IP rangeβs location
o Β Define the range to be assigned to the policy
o Β Name the policy e.g., βCorporate IP rangeβ
o Β Specify the trusted IP addresses related to the location
>>> Controlling access by the kind of user or group, e.g., corporate only
o Β Create a new policy
o Β In conditions, specify login from corporate IP addresses
o Β Exclude sign-ins from other users and groups
>>> Controlling access by location
o Β A demonstration using the United States and Poland as examples
>>> Creating emergency access accounts known as βbreak glass accountsβ to prevent yourself being accidentally locked out of your Azure Active Directory
>>>Β Β More ways to regulate access
o Β Blocking access
o Β Enforcing multifactor authentication
o Β Session controls
>>> Final steps
o Β Turning on policies
o Β Testing polices
o Β Monitoring user access via the dashboard
After youβve set up conditional access in Azure Directory, browse our blog to discover more clever ways to secure your data.
Β
Β
The post Back to Basics: Conditional Access in Azure Active Directory appeared first on CQURE Academy.