First published on CloudBlogs on Apr 17, 2018
At Microsoft Ignite 2017, we announced the public preview of conditional access for AIP-protected files to further enhance security for your sensitive files. With the integration of Azure Information Protection (AIP) and Azure Active Directory (AAD), conditional access can be set up to allow or block access to AIP protected documents or enforce additional security requirements such as Multi-Factor Authentication (MFA) or device enrollment based on the device, location or risk score of users trying to access sensitive documents. Below is a list of some common scenarios that light up when conditional access policies are enabled for AIP-protected content:
At Microsoft Ignite 2017, we announced the public preview of conditional access for AIP-protected files to further enhance security for your sensitive files. With the integration of Azure Information Protection (AIP) and Azure Active Directory (AAD), conditional access can be set up to allow or block access to AIP protected documents or enforce additional security requirements such as Multi-Factor Authentication (MFA) or device enrollment based on the device, location or risk score of users trying to access sensitive documents. Below is a list of some common scenarios that light up when conditional access policies are enabled for AIP-protected content:
- Require Multi-Factor Authentication : Enforce an MFA challenge to access AIP-protected documents. This can help protect against the risk of stolen and phished credentials.
- Device Compliance/Domain Joined : Allow access only if the user device is domain joined and/or is compliant as per company MDM/MAM policy (device compliance policies are configured in Intune).
- Risky Sign-in : Block access to sensitive content when a user has any of High, Medium or Low likelihood of risky-sign in (i.e., sign-in attempt was not performed by the legitimate owner of a user account).
- Trusted Network: Block access when the user is not at work. In other words, you can require access to sensitive content to be only from a network you trust.
- A financial advisor is allowed to open a “Highly Confidential” customer data file only if she has completed training. This data is available in a line-of-business ERP application.
- A Swiss bank employee currently in the U.S. cannot open a “Confidential – Swiss data” document based on the travel information available in the customer’s Travel Agency database and their current jurisdiction.
- A customer service representative is allowed to access documents that contain “Confidential – Fabrikam Material” only when the organization’s CSR ticket management system has the representative on an active ticket for Fabrikam.
- An organization wants to utilize existing policies related to access control, maintained in their current environment, to sensitive files in their Microsoft 365 solution as well.
- Joe deploys the Ionic Security Data Trust Platform service and configures it with Contoso’s ERP solution to provide a runtime access decision point of Yes/No triggered by the following attributes: User ID and AIP Label ID, both provided by the Azure Information Protection and AAD workflows.
- Joe then sets up Azure Active Directory’s conditional access feature to communicate at run time with Contoso’s Ionic Security instance.
- Finally, Joe creates an AIP Highly Confidential label. Joe configures the label to add a new Conditional Access control which calls into Ionic Security’s policy decision point (PDP).
- In this case, they won’t be as the decision is not being deferred to Ionic Security instance. So, AIP will direct Amy’s request to Azure Active Directory conditional access which calls into the Ionic Security instance behind the scene.
- Ionic Security will be asked to evaluate the decision trigged by Amy’s user ID and the label information.
- If Amy has enough training credentials, as determined by the most appropriate system within Contoso, Ionic Security will return a ‘Yes’ and AIP will allow Amy to open the document. If Ionic Security returns a ‘No’, Amy will continue to be denied access.