Lab: Explore access management in Azure AD with Conditional Access
This lab maps to the following Learn content:
- Learning Path: Describe the capabilities of Azure Active Directory (Azure AD), part of Microsoft Entra
- Module: Describe the access management capabilities of Azure AD
- Unit: Describe Conditional Access in Azure AD
Lab scenario
In this lab, you’ll explore conditional access MFA, from the perspective of an admin and a user. As the admin, will create a policy that will require a user to go through multi-factor authentication when accessing a cloud based Microsoft Azure Management application. From a user perspective, you’ll see the impact of the conditional access policy, including the process to register for MFA.
Estimated Time: 30 minutes
Task 1
In this task you, as the admin, will reset the password for the user Debra Berger. This step is needed so you can initially sign in as the user in subsequent tasks.
-
Open Microsoft Edge. In the address bar, enter portal.azure.com.
- Sign in with your admin credentials.
- In the Sign-in window, enter admin@WWLxZZZZZZ.onmicrosoft.com (where ZZZZZZ is your unique tenant ID provided by your lab hosting provider) then select Next.
- Enter the admin password that should be provided by your lab hosting provider. Select Sign in.
- When prompted to stay signed- in, select Yes.
-
On the top left corner of the screen, next to where it says Microsoft Azure, select the Show portal menu icon (the three horizontal lines also referred to as hamburger icon) then from the left navigation panel, under Favorites, select Azure Active Directory. If it is not listed under favorites, then in the search box, enter Azure Active Directory, then from the results list, select Azure Active Directory.
-
From the left navigation panel, select Users.
-
Select Debra Berger from the list of users.
-
Select Reset password from the top of the page. Since you haven’t previously signed in as Debra Berger, you don’t know her password, and will need to reset the password.
-
When the password reset window opens, select Reset Password. IMPORTANT, make a note of the new password, as you’ll need it in a subsequent task, to be able to sign in as the user.
-
Close the password reset window by selecting the X at the top right corner of the page, then close out of the Debra Berger window by selecting the X at the top right corner of the page.
-
Close the Users window by selecting the X at the top right corner of the page.
-
You’re now back on the **Contoso Overview** page. Keep this window open.
Task 2
In this task, you’ll go through the process of creating a conditional access policy in Azure AD.
-
Open the browser tab, labeled Contoso – Microsoft Azure. If you previously closed the browser tab, open Microsoft Edge and in the address bar enter portal.azure.com and sign in with your admin credentials, then select Azure Active Directory.
-
From the left navigation panel, select Security.
-
From the left navigation panel, select Conditional Access.
-
The Conditional Access Policies screen is displayed. Any existing Conditional Access Policies are listed here. Select + New policy.
-
In the Name field, enter MFA Test Policy.
-
Under Users or workload identities, select 0 users or workload identities selected.
-
You’ll now see the option to Include or Exclude users or groups. Make sure Include is selected (underlined).
-
Select the option for Select users and groups and select Users and groups. The window to Select users and groups opens.
-
In the Search bar, enter Debra. Select Debra Berger from beneath the search bar, then press the Select button on the bottom of the page. Note, a common practice is to assign the policy to users in a group. For the purpose expediency with this lab, we’ll assign the policy to a specific user.
-
Under Cloud apps or actions, select No cloud apps, actions, or authenticated contexts selected.
-
You’ll now see the option to Include or Exclude cloud apps or user actions. Make sure Cloud apps is listed in the field labeled Select what this policy applies to. If not already listed, then select it from the drop-down. Make sure Include is selected (underlined), then select Select apps, then underneath where it says Select, select None. The window to Select Cloud apps opens.
-
In the search bar, enter Azure. From the search results that appear under the search box, select Microsoft Azure Management, then press Select at the bottom of the page. Notice the warning.
-
Under Conditions, select 0 conditions selected. Notice the different options you can configure. Through the policy, you can control user access based on signals from conditions like risk, device platform, location, client apps, or device state. For example, you could include a condition for the policy to apply for any location except selected or trusted locations such as your headquarters’ network. For this policy, do not set any conditions.
-
Now you’ll set the access controls. Under Grant, select 0 controls selected.
-
The Grant window opens. Ensure Grant access is selected and then select Require multifactor authentication. Scroll down a bit on the right window and under the section For multiple controls, leave the default Require all the selected controls. Press Select at the bottom of the page.
-
At the bottom of the page, Under Enable policy, select On, then select Create.
-
After a few seconds, the MFA Pilot policy should appear in the list of conditional access policies (if needed, select Refresh at the top of the page).
-
Sign out of Azure and close your browser windows.
Task 3
In this task you’ll see the impact of the conditional access policy, from the perspective of the user, Debra Berger. You’ll start first by signing-in to an application that is not included in the conditional access policy (the Microsoft 365 portal at login.microsoftonline.com). Then you’ll repeat the process for an application that is included in the conditional access policy (the Azure portal at portal.azure.com). Recall that the policy requires the user to go through MFA when accessing a Microsoft Azure Management application. To use MFA, the user must first register the authentication method that will be used for MFA, for example a code sent to a mobile device or an authenticator application.
- Open Microsoft Edge. In the address bar, enter login.microsoftonline.com.
- Sign in as DebraB@WWLxZZZZZZ.onmicrosoft.com (where ZZZZZZ is your unique tenant ID provided by your lab hosting provider) then select Next.
- Enter the password you noted in the earlier task. Select Sign in.
- Since the password provided when you, as the admin, reset the password is temporary you need to update your password (this is not part of the MFA policy). Enter the current password, then enter a new password and then confirm the new password. Make note of the new password as you will need it to complete the task.
- When prompted to stay signed- in, select Yes. You should be successfully logged in to your Microsoft 365 account. MFA was not required for this application as it is not part of the policy.
-
Now you’ll attempt to sign in to an application that meets the criteria for MFA. Open a new browser tab and enter portal.azure.com.
-
You’ll see a window indicating, More information required. Select Next. Note, this will initiate the MFA registration process, as this is the first time you’re accessing the cloud app that that was identified in the conditional access policy. This registration process is required only once. An alternative to having the user go through the registration process is to have the admin configure the authentication method to use.
-
In the Keep your account secure window, you have the option to select the method to use for MFA. Microsoft Authenticator is one option. For expediency in this lab exercise, you’ll choose a different method. Select I want to setup a different method. From the Chose a different method pop-up window, select the drop-down arrow and select Phone then select Confirm.
-
In the window that opens, ensure your country is selected then enter mobile phone number you wish to use. Ensure that Text me a code is selected, then press Next. You’ll receive a text message on your phone with a code that you’ll need to enter where it says enter code. Enter the code you received, then press Next. Once confirmed, the screen will display, “SMS verified. Your phone was registered successfully”. Select Next. then select Done. this completes the one-time registration process.
- You should now be able to access the Azure portal. The Azure portal is a Microsoft Azure Management application and therefore requires multi-factor authentication, per the conditional access policy that was created.
- If you get a message indicating that your sign-in timed out you, enter the password and select Sign in.
- You’ll see a window that requires you to verify your identity. Select where it says Text =X XXXXXXX to receive a code on your mobile phone, enter the code and select Verify.
- If you’re prompted to stay signed in, select No.
- Sign out by selecting on the user icon next to the email address on the top right corner of the screen and selecting sign out. Then the close all the browser windows.
Review
In this lab, you went through the process of setting up a conditional access policy that requires users to go through MFA when they access Microsoft Azure Management cloud application. Then, as a user you went through the registration process for MFA and saw the impact of the conditional access policy that required you to use MFA when accessing the Azure portal.