Microsoft Entra Conditional Access: signals, controls, and “if-then” access rules

az-900beginner

Azure architecture and services

Microsoft Entra Conditional Access: signals, controls, and “if-then” access rules

Short Summary

In this lesson, you learn what Microsoft Entra Conditional Access is and why it matters for securing access to cloud apps. You’ll see how it evaluates sign-in context (signals) and then enforces an outcome (controls), such as requiring extra verification or blocking access. You’ll also connect it to Zero Trust: don’t assume a sign-in is safe just because it “looks normal.”

Learning Objectives

By the end of this lesson, you will be able to:

  • Define Microsoft Entra Conditional Access in one clear sentence.
  • Recognize common sign-in signals that Conditional Access can evaluate.
  • Differentiate Conditional Access from Multifactor Authentication (MFA) and from network firewalls.
  • Explain how Conditional Access supports a Zero Trust approach using “if-then” policies.

Core Concepts

Microsoft Entra Conditional Access is a Zero Trust policy engine that helps you control access to apps and resources using identity-driven signals. Instead of trusting the network perimeter, you use sign-in context to decide what should happen.

A simple mental model is an “if-then” rule:

  • If a sign-in matches certain conditions (signals),
  • Then enforce an outcome (access controls), such as allowing access, requiring extra steps, or blocking access.

Signals (the “if” part)

Conditional Access can evaluate signals such as:

  • Who is signing in (user, group, role)
  • What they’re trying to access (cloud app / target resource)
  • Where they’re signing in from (locations, networks)
  • How they’re signing in (client app like browser vs mobile/desktop clients)
  • Device context (device platform, and whether the device is managed/compliant if integrated with device management)
  • Risk signals (like sign-in risk or user risk) when your tenant has risk detections available through Microsoft Entra ID Protection

Controls (the “then” part)

Conditional Access enforces access controls, commonly including:

  • Grant controls (for example: require Multifactor Authentication (MFA), require a compliant device, or block access)
  • Session controls (limit what a user can do during the session in certain scenarios)

What Conditional Access is NOT

  • It is not a network firewall. It doesn’t inspect or filter network packets.
  • It is not the same thing as MFA. MFA is one control; Conditional Access is the policy logic that decides when to require MFA (or when to block access, or require other conditions).

Conditional Access vs Security Defaults

Microsoft Entra security defaults provide a baseline set of identity security settings. Conditional Access is the tool for custom, granular “if-then” policies (per app, per group, per condition). In practice, security defaults and Conditional Access aren’t meant to be used together—using Conditional Access policies prevents enabling security defaults.

Practical Understanding

Practical Situation 1: “When sign-ins come from outside trusted places, ask for extra proof”

A company wants users to sign in normally from trusted locations, but require an additional verification step when sign-ins come from outside those locations.

How to think about it: Location is a signal, and requiring Multifactor Authentication (MFA) is a control. You’re raising the bar only when context suggests higher risk.

Common misunderstanding: “Turning on MFA for everyone is the same as Conditional Access.” MFA is a requirement; Conditional Access is the policy that decides when to require it.

Practical Situation 2: “When a sign-in looks risky, tighten the rules”

A company wants stricter access rules when sign-ins are flagged as risky, but a smoother experience when risk is low.

How to think about it: Risk can be a signal in Conditional Access when risk detections are available (for example, via Microsoft Entra ID Protection). You then enforce a stronger control, such as requiring MFA or blocking access.

Common misunderstanding: “Risk-based decisions happen automatically with no setup.” Conditional Access only applies what you configure in policies.

Practical Situation 3: “When the device isn’t managed or compliant, limit access”

A company wants to block access to sensitive apps unless users sign in from devices that meet company security requirements.

How to think about it: Device context is the signal, and “require a compliant device” (or block access) is the control. This reduces the chance of sensitive access from unmanaged or insecure endpoints.

Common misunderstanding: “This is a networking problem.” This decision is made at the identity/access layer, not by network packet filtering.

Practical Situation 4: “When you need a baseline fast vs custom rules, choose the right approach”

A small org wants a simple baseline set of protections quickly, while a larger org needs different rules for different apps and different groups.

How to think about it: Security defaults are a baseline approach. Conditional Access is for targeted, customized “if-then” rules per app/user/group/location/device context.

Common misunderstanding: “Baselines fully replace Conditional Access.” Baselines help you start, but they don’t cover many app-specific or context-specific scenarios.

Common Pitfalls

  • Mistake: Assuming Conditional Access is the same as enabling MFA. Correction: Conditional Access is the policy engine; MFA is one possible control it can enforce.

  • Mistake: Thinking Conditional Access is a network firewall or perimeter security tool. Correction: Conditional Access works at the identity and access layer, using sign-in context for apps and resources.

  • Mistake: Believing Conditional Access is “automatic” and secure without design/testing. Correction: You need to create, test, and enable policies before Conditional Access changes access behavior.

  • Mistake: Confusing Conditional Access with security defaults. Correction: Security defaults are a baseline; Conditional Access is for granular “if-then” rules (and they aren’t meant to be enabled together).

  • Mistake: Forgetting that every policy needs both a signal and a control. Correction: Ask yourself: “What signals am I checking?” and “What control should happen when those signals match?”

Check Your Understanding

  1. Describe (in one or two sentences) what Conditional Access does without using the words “MFA” or “firewall.”
  2. Write two “if-then” rules you would want in a company (for example, based on location or device context).
  3. Explain the difference between a sign-in signal and an access control in your own words.
  4. Pick one sensitive app (email, finance, admin portal). What signals would you evaluate before allowing access?
  5. Describe a situation where security defaults might be enough, and a situation where you would need custom Conditional Access policies.

Further Reading