Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Microsoft Active DirectoryMicrosoft
Video
•
1
view
•
9:21
•

September 8, 2025

Zero Trust Identity: Conditional Access

Module 3 focuses on advanced Zero Trust Identity. It reviews the concept of Conditional Access to enforce "if/then" privilege through stipulations like network location, device compliance, and Identity Governance. Entra Conditional Access provides the core concepts of Assume Breach of core Zero Trust.

At its heart, Conditional Access operates on a powerful "If-Then" framework. It evaluates a set of signals (the "Ifs") and, based on those signals, enforces a specific action (the "Then").

The "Ifs" (Conditions): These are the signals that policies evaluate to decide if access should be granted or restricted. Our content highlighted several key signals:

User Identity: Is the user part of a specific group, like a team of administrators?

Location: Is the user attempting to sign in from a trusted network, like the corporate office, or from an untrusted location, like an unknown country?

Device State: Is the device compliant with your organization's security policies (e.g., encrypted, running the latest antivirus)?

Application: Which application is the user trying to access? Is it a sensitive one, like the payroll or customer relationship management (CRM) system?

Sign-in Risk: Is there a detected risk associated with this sign-in attempt, such as a sign-in from an unusual location?

The "Thens" (Access Controls): These are the actions that are enforced when the conditions are met. Our content emphasized several powerful controls:

Grant Access: Allow the user to proceed, often with an added requirement. For example, "Grant access, but require multi-factor authentication (MFA)."

Block Access: Immediately deny the sign-in attempt. This is typically used for high-risk scenarios, like blocking sign-ins from non-compliant devices.

Require Compliant Device: Force the user to use a device that is enrolled in and managed by a solution like Microsoft Intune.

Require Password Change: A common action in response to a detected user risk.

Technologies

Featured speaker

Matthew Raida

Softchoice

Manager, Workplace Practices

Contributors

Matt Raida
Manager, Workplace Practices
  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies