Close Menu
    Facebook X (Twitter) Instagram
    Sunday, October 12
    X (Twitter) LinkedIn Reddit RSS
    All about Endpoint Management
    • Home
    All about Endpoint Management
    Home»Intune»Azure Active Directory»MyApps and Conditional Access – Exclude with ease

    MyApps and Conditional Access – Exclude with ease

    Eswar KonetiBy Eswar KonetiJanuary 26, 6:12 pm3 Mins Read Azure Active Directory 5,766 Views
    Share
    Facebook Twitter LinkedIn Reddit

    Azure Active Directory (Azure AD) Conditional Access is a powerful feature that allows administrators to control access to cloud applications based on specific conditions.

    These conditions can include factors such as location, device type, and network status. By using Conditional Access, administrators can ensure that only authorized users are able to access sensitive resources, and that these users are doing so from a secure location or device.

    This helps to protect the organization from potential security threats, such as cyber attacks or data breaches. Conditional Access can be configured for specific users, groups, or entire organizations, and can be applied to all cloud applications or specific ones.

    Conditional Access can be created and applied to a wide range of applications, including built-in Microsoft applications and any Azure AD integrated applications including gallery, non-gallery, and applications published through Application Proxy.

    However, it is important to note that the list provided in the Microsoft website is not exhaustive and there may be certain first party apps that cannot be excluded from the Conditional Access policy. One such example is the Microsoft App Access panel.

    There has been a feature request that has appeared in multiple forums, feedback, and other social networking sites which is to exclude the app “Microsoft App Access panel” from the conditional access policy.

    This feature request is driven by various use cases such as B2B collaboration and setting up MFA from untrusted devices, etc. For more information about this feature request and related discussions, please refer to some of the posts in forums and feedback sites.

    https://feedback.azure.com/d365community/idea/d5253b08-d076-ed11-a81b-000d3adb7ffd

    https://learn.microsoft.com/en-us/answers/questions/871216/how-to-exclude-microsoft-app-access-panel-from-the

    Support conditional access for MyApps.microsoft.com · Community (azure.com)

    A new preview feature from Microsoft for 'my apps' now allows for exclusion in conditional access policies.

    image

    If this option is set to yes, applications will be launched from the new My Apps launching endpoint improving performance and resilience as well as addressing existing issues with conditional access for My Apps. If this option is set to no, applications will continue to be launched from the legacy https://account.activedirectory.windowsazure.com endpoint

    Before we enable the preview feature, if you search for myapps in conditional access policy (excluded cloud apps), you will not find it.

    image

    How to enable the My apps for conditional access policy?

    Go to Azure AD portal, click on enterprise applications https://entra.microsoft.com/#view/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/~/AppAppsPreview

    Under manage, you will see app launchers, click on it

    image

    Click on settings https://entra.microsoft.com/#view/Microsoft_AAD_IAM/AppLaunchersBlade/~/Settings

    you will see preview settings, enable the settings and save it.

    image

    image

    Now lets create a new conditional access policy or use existing conditional access policy to exclude Myapps application

    image

    image


    After you create or update the conditional access policy, user can go to https://myapps.microsoft.com,   Click “Try the preview”,  then you could click the application you want to access.

    Current View:

    image

    Preview view:

    image

    This preview feature should help to explore higher possibilities to improve the end-user experience with conditional access policies.

    AAD Azure AD B2B CAP conditional access Exclude apps Identity Microsoft App Access Panel Myapps Zero trust
    Share. Twitter LinkedIn Email Facebook Reddit

    Related Posts

    Export Microsoft Entra ID User Authentication Methods to CSV using PowerShell & Microsoft Graph API

    August 13, 2:08 pm

    Automating Intune Deployment Rings Using Entra ID Dynamic Groups and Regex

    July 01, 10:31 pm

    Exporting Intune Win32 Apps with All Properties Using PowerShell and Microsoft Graph

    June 30, 7:01 pm

    Leave a ReplyCancel reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Sign Up

    Get email notifications for new posts.

    Author

    I’m Eswar Koneti ,a tech enthusiast, security advocate, and your guide to Microsoft Intune and Modern Device Management. My goal? To turn complex tech into actionable insights for a streamlined management experience. Let’s navigate this journey together!

    Support

    Awards

    Archives

    © Copyright 2009-2025 Eswar Koneti, All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.