Conditional access provides a valuable additional security layer for your organisation cyber defences. As well as a great mechanism for deploying MFA or multi factor authentication. It’s been a while since I looked at this, so
I though I’d make a session on deploying and managing conditional access.
Here, I take a look at not only what CA is, but also how it works. I’ll also demo the new conditional access templates, Continuous Access Evaluation, identity protection among other new features.
What is Conditional Access?
The modern security perimeter now extends beyond an organization's network to include user and device identity. Organizations can use identity-driven signals as part of their access control decisions.