You can configure Microsoft Azure AD Conditional Access to use Identity as a Service for multi-factor authentication. To do this, you must add a Microsoft Azure AD Conditional Access application to Identity as a Service. This integration guide describes how to integrate Microsoft Azure AD Conditional Access with Identity as a Service. o integrate Microsoft Entra ID Active Directory with Identity as a Service, see Integrate Microsoft Entra ID active directory with Identity as a Service.
Notes: You can configure one
or more Microsoft Azure AD Conditional Access OIDC applications for your
Microsoft Entra ID custom tenant that can be used across all application
within that tenant. For example, you can create multiple Identity as a
Service Microsoft Azure AD Conditional Access OIDC applications and set
each application to require a different authenticator.
Microsoft Azure AD Conditional Access is being replaced with Microsoft
Entra ID. See Integrate
Microsoft Entra ID External Authentication
To integrate Microsoft Azure AD Conditional Access OIDC with Identity as a Service, complete the following steps:
a. Synchronize your Microsoft Azure AD Conditional Access users with Identity as a Service. See Synchronize Microsoft Entra ID External users with Identity as a Service and Sync an on-premises AD with Microsot Enra ID External.
b. If you have not done so already, Create a gateway
c. Obtain
the Microsoft Entra ID customer Tenant ID.