How to create a conditional access policy that requires multi-factor authentication (MFA) for all cloud apps through PowerShell

To add conditional access through PowerShell, you can use the Azure AD PowerShell module (learn how to install), which allows you to manage Azure AD using cmdlets in a PowerShell environment.

Below is an example of how to create a conditional access policy that requires multi-factor authentication (MFA) for all cloud apps:

  1. First, you’ll need to connect to Azure AD using the Connect-AzureAD cmdlet:
Connect-AzureAD
  1. Once connected, you can use the New-AzureADPolicy cmdlet to create a new conditional access policy:
 
$policy = New-AzureADPolicy -Definition @('{"RequireMFA":true}') -DisplayName "Require MFA for all cloud apps" -IsOrganizationDefault $true -Type "ConditionalAccess"
  1. Next, you can use the New-AzureADPolicyRule cmdlet to create a rule for the policy, which specifies the conditions that must be met for the policy to be enforced:
$rule = New-AzureADPolicyRule -PolicyId $policy.Id -Order 1 -Effect Allow -Conditions @('{"ClientApp":"All","Identity":"All"}')
  1. To apply the policy to all users, you can use the New-AzureADPolicyRoleSetting cmdlet to create a role setting that assigns the policy to the “Global” role:
New-AzureADPolicyRoleSetting -Id $policy.Id -RoleTemplateId "Global"
 
  1. Finally, you can use the Add-AzureADPolicyRule cmdlet to add the rule to the policy:
Add-AzureADPolicyRule -Id $policy.Id -RuleId $rule.Id

This will create a new conditional access policy that requires multi-factor authentication for all cloud apps and applies the policy to all users.

Microsoft

Was this article helpful?

Related Articles

Leave A Comment?