What Is Conditional Access in Microsoft Entra ID And How To Use It? A Practical Guide. Part 1
Learn what Conditional Access really is in Microsoft Entra ID, how it works with Intune, and why it’s critical for modern identity security.
2/11/20262 min read


Lets get started with Conditional Access ( Part 1 )
If you work with Microsoft 365 or Intune, you’ve already seen Conditional Access referenced everywhere: Require compliant device, Enforce MFA, Block legacy authentication, Zero Trust. Yet many IT pros still treat Conditional Access as an Intune feature, a security checkbox, or something that magically enforces device security. None of those are correct — and that misunderstanding is the root cause of many broken environments.
What Conditional Access Actually Is
Conditional Access (CA) is a policy decision engine that lives in Microsoft Entra ID. Its only job is to answer one question: Should this sign-in be allowed — and under what conditions?
Conditional Access evaluates:
• Who is signing in
• What they are trying to access
• From where and under what conditions
• What must be true before access is allowed
The output of Conditional Access is not enforcement on the device. The output is a token decision.
What Conditional Access Is NOT
Conditional Access is not:
• A device management tool
• A DLP engine
• A replacement for Intune
• A configuration enforcement mechanism
It cannot inspect registry settings, enforce firewall rules, control clipboard actions, see individual compliance rules, or apply security settings after login.
The Correct Mental Model
Think of the Microsoft security stack like this:
Intune → manages devices
Entra ID → manages identity
Conditional Access → decides access
Intune defines posture. Conditional Access evaluates trust. Conditional Access does not ask why a device is secure — only whether it is trusted enough to issue an access token.
When Conditional Access Is Evaluated
Conditional Access is evaluated at authentication time, during token issuance. It runs before the user reaches the application and does not continuously monitor sessions.
If a user already has a valid token, Conditional Access will not re-evaluate until that token expires. This is by design and explains why policy changes are not always immediately visible.
Why Intune Alone Is Not Enough
Intune can configure devices, enforce settings, assess compliance, and deploy apps. However, Intune cannot block sign-ins, enforce MFA at the identity layer, evaluate identity risk, or stop access from unmanaged identities.
Conditional Access acts as the gatekeeper that determines whether the sign-in meets security requirements.
Common Early Mistake
Many organizations assume that if a device is managed in Intune, it is secure. They then create overly strict Conditional Access policies without fallback access paths, ignore browser scenarios, or add excessive exclusions. The result is broken access and loss of trust in Conditional Access.
Key Takeaway
Conditional Access is not a security feature by itself. It is a decision engine that evaluates sign-ins and issues tokens based on trust signals.