Skip to content

Sample policies to implement a Zero Trust User Access strategy using Entra ID Conditional Access

License

Notifications You must be signed in to change notification settings

0x6f677548/zerotrust-ca-policies

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Zero Trust - Conditional Access Policies

This repository contains a set of sample policies that can be used to implement a Zero Trust model using Entra ID (Azure AD) Conditional Access. These polices are based on the samples available at https://github.com/microsoft/ConditionalAccessforZeroTrustResources and the recommended guidelines but have been modified to be deployed without the Microsoft365DSC dependency, by using CA-PowerToys tool, which allows the policies deployment using Graph API.

Why ?

While Microsoft365DSC is a great tool, the used format is not human readable and easy to use in a Policy-as-Code model, since dependencies between policies, groups and applications are not always clear, with guid's being used instead of names. This makes it hard to understand the impact of a policy change and also to migrate policies between environments.

Files

groups.json

Contains the groups that are used in the policies. These groups should be created prior to deploying the policies. The groups are created using the CA-PowerToys tool

policies-humanreadable.json

Contains the policies in a human readable format. This file is used to generate the policies.json file using the CA-PowerToys tool, or, eventually, to be directly imported using the same tool.

Usage

Since the policies are deployed using the CA-PowerToys tool, the usage is the same as described in the CA-PowerToys documentation

About

Sample policies to implement a Zero Trust User Access strategy using Entra ID Conditional Access

Topics

Resources

License

Stars

Watchers

Forks