What is Conditional Access?
Conditional Access is a policy-driven access control approach that evaluates signals such as user identity, device health, location, and risk level in real time before granting access to applications or data. If the signals look unusual, the request is blocked or challenged.
How Conditional Access works
Three-step view of how it operates in practice.
Collect signals
When a user tries to sign in, the system captures signals: user, device posture, location, IP reputation, application sensitivity.
Evaluate policy
Signals are compared against policies you define — for example, block sign-ins from countries you don’t operate in, or require MFA on personal devices.
Grant, challenge, or block
Based on the evaluation, the request gets through, gets a step-up challenge (MFA or device compliance), or is blocked outright.
Common conditional access policy patterns
A clear breakdown of the common variants.
Location-based
Block sign-ins from countries outside your operating footprint.
Device-based
Time-based one-time codes from an app like Microsoft Authenticator or Google Authenticator. Offline-capable and phishing-resistant against many attacks.
Application-sensitivity
The user approves a sign-in with a tap on their phone. Easy to use but vulnerable to MFA fatigue attacks — always pair with number matching.
Risk-based
FIDO2 keys like YubiKey, or device-bound passkeys. Phishing-resistant by design — the key will not authenticate against a fake domain.
Why Conditional Access matters for SMBs
Conditional Access is a policy-driven access control approach that evaluates signals such as user identity, device health, location, and risk level in real…
Common Conditional Access mistakes
- Policies only for end usersAdmin and service accounts need the strictest policies. Attackers target them first.
- No emergency break-glass accountAdmins, finance, and anyone with access to money or sensitive data should use an app or hardware key — never SMS alone.
- Testing in productionUse report-only mode to preview policy impact before enforcement.
- Forgetting guests and vendorsExternal collaborators need conditional access too, especially for sensitive apps.
Conditional Access frequently asked questions
LogicalNet services related to MFA
Related glossary terms
Need help designing conditional access policies?
Talk to a LogicalNet identity expert. We will review your current environment, recommend the right MFA methods for each group of users, and help you deploy without disrupting the business.