Proving a user’s identity and ensuring that user’s access is compliant with your organisation’s required policies is key to securing M365, Entra ID, and cloud environments. Whenever you access an application protected by Entra ID, the user will be authenticated and then allowed or denied access based on the evaluation of conditional access policies. How does the flow work? When are and how often are authentication and conditional access policies checked?
Come to this session, and John Craddock will dig into the details of authentication and conditional access policies. He will also explain how Conditional Access Evaluation improves response time to changes in security. A session not to be missed; it will set you on the path to a more secure future.