{"id":4918,"date":"2024-11-06T15:44:40","date_gmt":"2024-11-06T15:44:40","guid":{"rendered":"https:\/\/www.pax8.com\/blog\/?p=4918"},"modified":"2024-11-06T15:44:40","modified_gmt":"2024-11-06T15:44:40","slug":"conditional-access","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/conditional-access\/","title":{"rendered":"Why MSPs should adopt conditional access policies with their clients"},"content":{"rendered":"<p>As a managed service provider (MSP), you play a crucial role in ensuring your clients\u2019 security. One of the most effective ways to achieve this as an MSP is by adopting and implementing conditional access (CA) policies. These policies, integrated through Microsoft Security platforms, offer a robust framework for enhancing security while maintaining user productivity. Read on to learn why you should adopt CA policies with your clients.<\/p>\n<h2>What is conditional access, and how does it work?<\/h2>\n<p>Conditional access uses identity-driven signals from devices to make decisions about whether to give that user access to data and programs as well as to enforce organizational policies. It&#8217;s part of <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/conditional-access\/overview\" target=\"_blank\" rel=\"noopener\">Microsoft\u2019s<\/a> Zero Trust policy.<\/p>\n<p>At their core, CA policies are simple \u201cif-then statements,\u201d meaning that if a user wants access to a resource, then they first need to complete a certain action. So, if a user wants to access an application or service like, say, Microsoft 365, that user first has to satisfy a requirement, such as multifactor authentication (MFA).<\/p>\n<p>Some of the identity-driven signals a CA policy can leverage include:<\/p>\n<ul>\n<li>User or group membership<\/li>\n<li>IP location<\/li>\n<li>The device the signal comes from<\/li>\n<li>Application the user is trying to access<\/li>\n<li>Real-time and calculated risk detection<\/li>\n<\/ul>\n<p>The policy can use these signals to then either block access or acquire it through means such as the following:<\/p>\n<ul>\n<li>MFA<\/li>\n<li>A compliant device<\/li>\n<li>An approved app<\/li>\n<li>Password change<\/li>\n<li>Agreeing to terms of use<\/li>\n<\/ul>\n<h2>Why is it important to enable conditional access?<\/h2>\n<p>Conditional access policies are a crucial part of developing an overall <a href=\"https:\/\/www.pax8.com\/explore\/americas-en-us\/security-program\/\" target=\"_blank\" rel=\"noopener\">security strategy<\/a>, especially when it comes to enforcing MFA. A strong conditional access strategy also helps organizations maintain flexibility for their users to access programs and data remotely while securing their digital environments. As remote work, cloud services, and mobile devices become more prevalent, traditional security measures like firewalls are <a href=\"https:\/\/www.pax8.com\/blog\/kickoff-beyond-emea-2024\/\" target=\"_blank\" rel=\"noopener\">no longer sufficient<\/a>. You need to ensure that only authorized users on trusted devices can access company data to reduce your clients\u2019 risk of breaches while maintaining a seamless experience for employees.<\/p>\n<p>Without CA as part of a greater <a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/zero-trust\/zero-trust-overview\" target=\"_blank\" rel=\"noopener\">Zero Trust strategy<\/a>, organizations are vulnerable to security gaps, such as unauthorized access from compromised devices or accounts. These can lead to <a href=\"https:\/\/www.pax8.com\/blog\/scary-cybersecurity-breach-examples\" target=\"_blank\" rel=\"noopener\">terrible cyber attacks<\/a> that can cost organizations millions of dollars, downtime, and a damaged reputation. By implementing conditional access policies, you can enforce granular control over who can access what, and under which circumstances, significantly improving security without sacrificing productivity.<\/p>\n<h2>What does conditional access offer?<\/h2>\n<p>Here are the benefits of using conditional access policies to enforce MFA:<\/p>\n<p style=\"padding-left: 40px\"><strong>1. Enhanced security:<\/strong> CA policies ensure that MFA is required when specific conditions are met, adding an extra layer of security beyond just a username and password. This significantly reduces the chance of account compromise \u2014 by <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/08\/20\/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks\/#:~:text=MFA%20is%20easier%20than%20you%20think%20*,disruption%20or%20concern%20over%20what%20may%20break.\" target=\"_blank\" rel=\"noopener\">99.9%<\/a>.<\/p>\n<p style=\"padding-left: 40px\"><strong>2. Granular control:<\/strong> These policies allow for granular control over who is required to use MFA and when. For example, you can require MFA for users accessing sensitive resources or from untrusted locations.<\/p>\n<p style=\"padding-left: 40px\"><strong>3. Customizable conditions:<\/strong> You can set <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/conditional-access\/concept-conditional-access-conditions\" target=\"_blank\" rel=\"noopener\">conditions<\/a> based on user, location, device state, application, and real-time risk information, tailoring the security requirements to your organization\u2019s needs.<\/p>\n<p style=\"padding-left: 40px\"><strong>4. User-friendliness:<\/strong> While enhancing security, CA policies can be designed to be user-friendly, minimizing the impact on the user experience. Users can <a href=\"https:\/\/www.ibm.com\/topics\/multi-factor-authentication\" target=\"_blank\" rel=\"noopener\">authenticate<\/a> via phone call, text message, or mobile app verification, which are familiar methods for many.<\/p>\n<p style=\"padding-left: 40px\"><strong>5. Integration with Azure AD:<\/strong> CA policies are integrated with <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/identity-management-best-practices\" target=\"_blank\" rel=\"noopener\">Azure Active Directory<\/a> (Azure AD), which provides a central identity and access management (IAM) system for Azure resources and applications, improving security by ensuring appropriate access and reducing the risk of unauthorized access.<\/p>\n<p style=\"padding-left: 40px\"><strong>6. Compliance:<\/strong> Enforcing MFA through CA helps organizations meet <a href=\"https:\/\/aws.amazon.com\/what-is\/mfa\/\" target=\"_blank\" rel=\"noopener\">compliance<\/a> requirements that mandate the use of MFA for accessing certain types of data or systems.<\/p>\n<p style=\"padding-left: 40px\"><strong>7. Automated decisions:<\/strong> CA policies can <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/conditional-access\/plan-conditional-access\" target=\"_blank\" rel=\"noopener\">automate<\/a> the decision to grant or block access based on the conditions set, streamlining the authentication process and reducing the need for manual intervention.<\/p>\n<p style=\"padding-left: 40px\"><strong>8. Reporting and monitoring:<\/strong> These policies come with <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/conditional-access\/plan-conditional-access\" target=\"_blank\" rel=\"noopener\">reporting and monitoring<\/a> capabilities, allowing administrators to track compliance and understand how the policies are being applied across the organization.<\/p>\n<h2>What challenges are imposed by conditional access?<\/h2>\n<p>Implementing conditional access needs to be planned and executed carefully to avoid unintended consequences, such as users getting locked out of apps and devices unnecessarily. You can avoid some of these consequences by:<\/p>\n<ul>\n<li>Having clients communicate the plan to employees, as well as how to troubleshoot.<\/li>\n<li>Using emergency access or break-glass accounts that are exempt from CA.<\/li>\n<li>Excluding service accounts and service principals, such as the Microsoft Entra Connect Sync Account, from CA.<\/li>\n<li>Applying CA policies to every app.<\/li>\n<li>Minimizing the number of CA policies.<\/li>\n<li>Test and monitor policies in report-only mode to ensure they achieve the intended result.<\/li>\n<li>Deciding on naming standards for emergency access controls.<\/li>\n<li>Blocking countries and regions from which you never expect a sign-in.<\/li>\n<\/ul>\n<h2>Final thoughts<\/h2>\n<p>It\u2019s important to note that while conditional access policies provide robust security benefits, they should be implemented thoughtfully to balance security needs with user convenience. Proper planning and communication with users are key to a successful deployment.<\/p>\n<p>Pax8 can help you and your clients get ready for conditional access implementation. <a href=\"https:\/\/www.pax8.com\/blog\/contact-pax8\/\" target=\"_blank\" rel=\"noopener\">Reach out to one of our reps<\/a> to start the discussion. And if you\u2019re unsure if your client is already compliant with MFA requirements, take our quiz to find out!<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/explore\/americas-en-us\/microsoft-security-coe-quiz-na\/\" target=\"_blank\" rel=\"noopener\">Take the quiz<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conditional access is crucial to developing an overall strong security posture with MFA. Read on to learn more about conditional access policies and what they offer. <\/p>\n","protected":false},"author":171,"featured_media":4930,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4,85,5],"tags":[],"class_list":["post-4918","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msp","category-reduce-risk","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Implementing conditional access | Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Conditional access is crucial to an overall strong security posture with MFA. Read on to learn more about the benefits and challenges of conditional access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/conditional-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why you should adopt conditional access policies\" \/>\n<meta property=\"og:description\" content=\"Conditional access is crucial to an overall strong security posture with MFA. Read on to learn more about the benefits and challenges of conditional access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/conditional-access\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-06T15:44:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/10\/Blog-Image_Security-Series-November_2024-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"pmysliviec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Why you should adopt conditional access policies\" \/>\n<meta name=\"twitter:description\" content=\"Conditional access is crucial to an overall strong security posture with MFA. Read on to learn more about the benefits and challenges of conditional access.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/10\/Blog-Image_Security-Series-November_2024-2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pmysliviec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/conditional-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/conditional-access\\\/\"},\"author\":{\"name\":\"pmysliviec\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4796ce0b7f3895c287f8d742d950b4a8\"},\"headline\":\"Why MSPs should adopt conditional access policies with their clients\",\"datePublished\":\"2024-11-06T15:44:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/conditional-access\\\/\"},\"wordCount\":899,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/conditional-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2024\\\/10\\\/Blog-Image_Security-Series-November_2024-2.jpg\",\"articleSection\":[\"MSPs\",\"Reduce risk\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/conditional-access\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/conditional-access\\\/\",\"name\":\"Implementing conditional access | Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/conditional-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/conditional-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2024\\\/10\\\/Blog-Image_Security-Series-November_2024-2.jpg\",\"datePublished\":\"2024-11-06T15:44:40+00:00\",\"description\":\"Conditional access is crucial to an overall strong security posture with MFA. Read on to learn more about the benefits and challenges of conditional access.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/conditional-access\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/conditional-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/conditional-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2024\\\/10\\\/Blog-Image_Security-Series-November_2024-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2024\\\/10\\\/Blog-Image_Security-Series-November_2024-2.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/conditional-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why MSPs should adopt conditional access policies with their clients\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4796ce0b7f3895c287f8d742d950b4a8\",\"name\":\"pmysliviec\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/pmysliviec\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Implementing conditional access | Pax8 Blog","description":"Conditional access is crucial to an overall strong security posture with MFA. Read on to learn more about the benefits and challenges of conditional access.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/conditional-access\/","og_locale":"en_US","og_type":"article","og_title":"Why you should adopt conditional access policies","og_description":"Conditional access is crucial to an overall strong security posture with MFA. Read on to learn more about the benefits and challenges of conditional access.","og_url":"https:\/\/www.pax8.com\/blog\/conditional-access\/","og_site_name":"Pax8 Blog","article_published_time":"2024-11-06T15:44:40+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/10\/Blog-Image_Security-Series-November_2024-2.jpg","type":"image\/jpeg"}],"author":"pmysliviec","twitter_card":"summary_large_image","twitter_title":"Why you should adopt conditional access policies","twitter_description":"Conditional access is crucial to an overall strong security posture with MFA. Read on to learn more about the benefits and challenges of conditional access.","twitter_image":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/10\/Blog-Image_Security-Series-November_2024-2.jpg","twitter_misc":{"Written by":"pmysliviec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/conditional-access\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/conditional-access\/"},"author":{"name":"pmysliviec","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4796ce0b7f3895c287f8d742d950b4a8"},"headline":"Why MSPs should adopt conditional access policies with their clients","datePublished":"2024-11-06T15:44:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/conditional-access\/"},"wordCount":899,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/conditional-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/10\/Blog-Image_Security-Series-November_2024-2.jpg","articleSection":["MSPs","Reduce risk","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/conditional-access\/","url":"https:\/\/www.pax8.com\/blog\/conditional-access\/","name":"Implementing conditional access | Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/conditional-access\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/conditional-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/10\/Blog-Image_Security-Series-November_2024-2.jpg","datePublished":"2024-11-06T15:44:40+00:00","description":"Conditional access is crucial to an overall strong security posture with MFA. Read on to learn more about the benefits and challenges of conditional access.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/conditional-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/conditional-access\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/conditional-access\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/10\/Blog-Image_Security-Series-November_2024-2.jpg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/10\/Blog-Image_Security-Series-November_2024-2.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/conditional-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why MSPs should adopt conditional access policies with their clients"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4796ce0b7f3895c287f8d742d950b4a8","name":"pmysliviec","url":"https:\/\/www.pax8.com\/blog\/author\/pmysliviec\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/4918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/171"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=4918"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/4918\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/4930"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=4918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=4918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=4918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}