Conditional Access is a key component of Azure AD's security capabilities. It allows you to define specific rules and policies that determine whether a user or device is authorized to access protected resources.
Different policies cater to various risk levels – low, medium, and high.
Azure AD Identity Policy: Defines what a user can do. Azure AD Conditional Access Policy: Determines whether access is granted or denied. Device Compliance Policy: Ensures device security configurations. User Risk Policy: Determines Access Based on user risk profile. Location Policy: Defines how access is granted based on the user’s location.
A user is attempting to access a resource remotely. Conditional Access policy requires MFA authentication to verify the user's identity. This enhances security by reducing the risk of compromised credentials.
Attribute-Based Access Control (ABAC): A more granular control model that utilizes attributes (like user, device, location, and application) to define access rules.
[Link to Azure documentation on Conditional Access]