Integrate Microsoft Azure AD Conditional Access with Identity as a Service

You can configure Microsoft Azure AD Conditional Access to use Identity as a Service for multi-factor authentication. To do this, you must add a Microsoft Azure AD Conditional Access application to Identity as a Service. This integration guide describes how to integrate Microsoft Azure AD Conditional Access with Identity as a Service. o integrate Microsoft Entra ID Active Directory with Identity as a Service, see Integrate Microsoft Entra ID active directory with Identity as a Service.

Notes: You can configure one or more Microsoft Azure AD Conditional Access OIDC applications for your Microsoft Entra ID custom tenant that can be used across all application within that tenant. For example, you can create multiple Identity as a Service Microsoft Azure AD Conditional Access OIDC applications and set each application to require a different authenticator.

Microsoft Azure AD Conditional Access is being replaced with Microsoft Entra ID. See Integrate Microsoft Entra ID External Authentication

To integrate Microsoft Azure AD Conditional Access OIDC with Identity as a Service, complete the following steps:

Step 1: Complete the following prerequisites:

a.      Synchronize your Microsoft Azure AD Conditional Access users with Identity as a Service. See Synchronize Microsoft Entra ID External users with Identity as a Service and Sync an on-premises AD with  Microsoft Entra ID External.

b.      If you have not done so already, Create a gateway

c.      Obtain the Microsoft Entra ID customer Tenant ID.

Step 2: Add Microsoft Azure AD Conditional Access OIDC to Identity as a Service

Step 3: Add a resource rule to protect access to Microsoft Azure AD Conditional Access OIDC

Step 4: Configure the Microsoft Entra ID Tenant

Step 5: Test the Conditional Access Control in Conditional Access Control in Microsoft Entra ID