Skip to content
Menu

Conditional Access Compliant Device Access Policy CAL005-Selected Grant access for All users on less-trusted locations when Browser and Modern Auth Clients and Compliant

Less than 1 minute Time to read Minutes

Introduction

Conditional Access compliant device requirement policies exist to solve a very common security problem. Users increasingly sign in from locations that an organization does not fully trust, such as public networks, unmanaged home environments, or unknown internet endpoints. While identity verification protects the account itself, it does not guarantee that the device accessing company resources is secure.

Conditional Access allows organizations to reduce that risk by evaluating the security posture of the device during the sign-in process. When access originates from a location that carries higher uncertainty, the platform can require that the device meets defined security standards before allowing access to applications.

This policy reflects that design philosophy. It introduces a Conditional Access compliant device requirement when users sign in from a less-trusted location using modern authentication clients or a browser. Rather than blocking access entirely, the design permits access when the device itself demonstrates that it is managed or trusted.

In practice, this approach balances usability and security. Users can continue to work from anywhere, but the device they use must meet defined security expectations.

Link
Download CA Template CAL005 from GitHub

Download CA Template CAL005 from GitHub

This Policy in One Line

This Conditional Access policy requires users connecting from a less-trusted location through browsers or modern authentication clients to use either a compliant device or a domain-joined device to gain access.

What This Conditional Access Policy Does

The intention of this policy is to introduce device trust verification when sign-ins originate from a location that is considered less reliable. Conditional Access evaluates several signals during authentication, and one of the most important signals is the device that the user is signing in from.

In this design, the policy activates when access comes from a defined location category representing environments that are not fully trusted. At that moment, Conditional Access evaluates whether the device participating in the sign-in meets one of two acceptable trust states.

The first acceptable state is device compliance. A compliant device is typically managed by the organization and evaluated against security rules such as encryption status, operating system configuration, and security posture. The second acceptable state is domain join status, which confirms that the device is joined to the organization’s directory environment.

By allowing access when either condition is satisfied, the policy ensures that users connecting from uncertain locations are still working from devices that the organization can trust.

Who the Policy Applies To

This policy is designed with broad user coverage in mind. The configuration applies the Conditional Access evaluation to all users attempting to access resources when the defined location condition is met.

In large environments this approach ensures that device trust requirements are applied consistently across the organization. Rather than limiting the protection to specific roles or departments, the policy introduces a security baseline that affects every user identity when connecting from the targeted location.

At the same time, organizations commonly maintain carefully managed exception groups for operational or emergency scenarios. These exception groups allow administrators to temporarily bypass enforcement when troubleshooting access issues or when certain technical workloads cannot meet device trust requirements.

This structure provides a balance between strong security coverage and operational flexibility. The majority of users are protected by the device requirement, while controlled exceptions can still be handled through structured approval processes.

What Apps and Services the Policy Protects

The policy targets nearly the entire application surface available through the identity platform. Conditional Access evaluates sign-ins for all cloud applications that rely on modern authentication and federated identity through Microsoft Entra ID.

By applying the policy broadly across applications, the design ensures that device trust requirements are not limited to a single service or productivity platform. Instead, the device verification requirement follows the user identity across the application ecosystem.

This approach is a common architectural decision. If device trust requirements are applied inconsistently across applications, users may unintentionally bypass security protections simply by accessing a different service.

A broad application scope prevents this gap. Whenever the user signs in to protected resources from a less-trusted location, Conditional Access ensures that the device meets the required security posture before access is granted.

Platforms, Devices, and Client Apps in Scope

Conditional Access policies evaluate the type of client application used during the sign-in process. In this policy, two client application categories are evaluated: browser-based access and modern authentication clients used by mobile and desktop applications.

These client types represent the most common authentication paths for modern productivity platforms and cloud services. Browser sessions typically occur when users access web-based portals or cloud applications, while modern authentication clients represent native applications on desktops or mobile devices.

No platform restrictions are defined in the configuration. This means the policy can evaluate sign-ins regardless of operating system, including Windows, macOS, iOS, Android, or other supported environments.

Instead of restricting access by operating system, the design focuses on the trust level of the device itself. Whether the user signs in from a laptop, workstation, or mobile device, Conditional Access evaluates whether the device is compliant or joined to the organization’s directory before allowing access.

How Access Is Decided

During the authentication process, Conditional Access evaluates several contextual signals. In this policy the key signal is the location from which the sign-in originates.

When the sign-in originates from the defined location category associated with less-trusted environments, the device verification requirement is triggered. Conditional Access then checks the trust state of the device attempting the sign-in.

The policy allows access when one of two device trust conditions is satisfied. Access is granted if the device is compliant with the organization’s management policies, or if the device is joined to the organization’s directory environment.

This configuration uses a logical evaluation that accepts either condition. In practice this means the device does not need to satisfy both requirements simultaneously. A device that meets one of the trusted states is considered secure enough to proceed.

This design allows flexibility while still maintaining strong device-based access control.

What the User Experience Looks Like During Sign-In

From the user’s perspective, the policy introduces additional security checks only when sign-ins originate from the defined location condition. When the user signs in from a trusted device, the experience typically remains seamless.

For example, a user working from a managed corporate laptop may not notice any change during authentication. The device already meets the compliance or domain join requirement, so Conditional Access allows access immediately after the standard identity verification step.

However, when a user attempts to sign in from an unmanaged device, the experience changes. Conditional Access evaluates the device and detects that it does not meet the required trust criteria. In this situation the sign-in may be blocked or redirected toward device enrollment depending on the broader device management configuration.

This behavior encourages users to work from trusted and managed devices, particularly when accessing company resources from locations that carry higher security risk.

Why This Policy Matters for Security and the Business

Security risks often increase when users connect from unknown or untrusted networks. Attackers frequently attempt to exploit these environments because devices operating outside corporate networks may lack consistent security monitoring or controls.

By introducing a Conditional Access compliant device requirement in these scenarios, organizations reduce the likelihood that unmanaged devices can interact with sensitive applications.

This design protects both the identity and the endpoint simultaneously. Even if user credentials are valid, access will only succeed if the device itself meets the organization’s trust standards.

From a business perspective, this approach supports flexible work patterns while maintaining security expectations. Employees can continue working from home, public locations, or travel environments, but access to corporate resources still requires a trusted device.

The policy therefore strengthens Zero Trust architecture principles without creating unnecessary barriers for legitimate users.

Is This a Foundational or Must-Have Policy?

Policies that enforce device trust from less-trusted locations are widely considered foundational within modern Conditional Access architectures.

Location-based access decisions have historically been used to block access entirely from unknown environments. However, modern Zero Trust strategies prefer a more nuanced approach that evaluates the trust level of the device instead of relying solely on network boundaries.

This policy reflects that modern strategy. Rather than preventing users from accessing applications outside the corporate network, it introduces an adaptive control that evaluates the device itself.

As a result, organizations can safely enable remote work and distributed access models while maintaining consistent endpoint security standards.

Important Design Choices and Things to Notice

One of the most notable design decisions in this policy is the use of device trust conditions instead of additional authentication requirements. Many Conditional Access policies rely on multifactor authentication when risk increases. In this case, the design focuses specifically on the security posture of the device.

Another important element is the broad application scope. By applying the requirement across nearly all cloud applications, the design avoids creating security gaps between services.

The inclusion of both compliant device and domain-joined device conditions also reflects practical enterprise environments. Some organizations rely heavily on modern device management platforms, while others still maintain traditional domain-joined infrastructure.

Allowing either state ensures compatibility with both management approaches while still enforcing device trust.

Conditional Access Design Principles Behind This Policy

This policy aligns closely with the core principles of modern Conditional Access architecture.

First, it applies contextual access control. Instead of enforcing the same rule in every situation, the policy activates when the sign-in originates from a less-trusted location.

Second, it evaluates device trust as a primary security signal. In a Zero Trust model, the device is just as important as the identity itself.

Third, the design maintains usability by allowing multiple trusted device states. This ensures that security controls adapt to real-world infrastructure rather than forcing a single management model.

Together, these principles create a policy that is both secure and practical for modern organizations.

Final Thoughts

The Conditional Access compliant device requirement implemented in this policy illustrates how modern identity platforms can enforce security without restricting flexibility.

When users connect from environments that may carry greater uncertainty, the system shifts its focus to the trustworthiness of the device itself. By requiring either device compliance or domain join status, the organization ensures that corporate resources are accessed only from devices that meet defined security expectations.

This type of policy plays a critical role in enabling secure remote work and distributed access models. Rather than relying on traditional network boundaries, it enforces security decisions based on identity context and device trust.

In a mature Conditional Access architecture, policies like this one form the backbone of device-aware access control across the organization.

Link
Microsoft Entra Conditional Access Visualizer by Merill Fernando

Microsoft Entra Conditional Access Visualizer by Merill Fernando

Categories

Uncategorized (3)

Technology (1)

Security (50)

Migrations (3)

Identity (1)

Table of Content

CA Policies Explained