{"id":52317,"date":"2023-03-16T15:00:01","date_gmt":"2023-03-16T14:00:01","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/?p=52317"},"modified":"2023-03-20T22:37:52","modified_gmt":"2023-03-20T21:37:52","slug":"enforcing-azure-active-directory-security-via-continuous-access-evaluation","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/","title":{"rendered":"Enforcing Azure Active Directory security via Continuous Access Evaluation"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-full size-full webp-format\" src=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceHeader.jpg\" alt=\"An illustration depicting a modern workplace, next to an illustration of Bit the Raccoon.\" width=\"1920\" height=\"700\" data-orig-srcset=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceHeader.jpg 1920w, https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceHeader-300x109.jpg 300w, https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceHeader-1024x373.jpg 1024w, https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceHeader-768x280.jpg 768w, https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceHeader-1536x560.jpg 1536w, https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceHeader-330x120.jpg 330w, https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceHeader-800x292.jpg 800w, https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceHeader-400x146.jpg 400w\" data-orig-src=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceHeader.jpg\" \/><\/p>\n<p>Microsoft\u2019s Azure AD Identity Protection and Azure AD Conditional Access provides the ability to\u00a0<a title=\"Original URL: https:\/\/techcommunity.microsoft.com\/t5\/itops-talk-blog\/what-s-the-difference-between-azure-active-directory-identity\/ba-p\/1320887?WT.mc_id=itopstalk-newsletter-abartolo. Click or tap if you trust this link.\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/itops-talk-blog\/what-s-the-difference-between-azure-active-directory-identity\/ba-p\/1320887?WT.mc_id=itopstalk-newsletter-abartolo\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"0\">monitor user sign-in attempts and analyse them for risk<\/a>. Reducing the risk of a compromised account or a risky sign-in attempt from successfully completing an authentication and authorisation attempt is quite important, but what if circumstances change after a user has successfully logged in?<\/p>\n<p>An end user is issued with an OAuth 2.0 access token at the time of a successful authentication, and that token has a lifespan making the end user\u2019s session valid until that token expires. Configurable Token Lifetime policy is one hour by default unless configured otherwise. Imagine, however, if you\u2019re an admin who needs to block a specific user\u2019s access immediately, or if the service detects that a user is now accessing authenticated driven data from a free Wi-Fi at a coffee shop instead of from their corporate office. The end user\u2019s non-expired access token would need to be immediately revoked forcing them to re-attempt authentication and authorisation &#8211; which will fail if their account has been disabled or may present them with a multi-factor authentication challenge because of their new location.<\/p>\n<p>This is addressed via Continuous Access Evaluation, which provides a standard way for an identity provider or a service (also known as the relaying party or resource provider) to stop honouring a valid token and to re-issue an authentication and authorisation attempt. <a title=\"Original URL: https:\/\/techcommunity.microsoft.com\/t5\/itops-talk-blog\/azure-ad-security-enforcement-with-continuous-access-evaluation\/ba-p\/1359428?WT.mc_id=ITOPSTALK-newsletter-abartolo. Click or tap if you trust this link.\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/itops-talk-blog\/azure-ad-security-enforcement-with-continuous-access-evaluation\/ba-p\/1359428?WT.mc_id=ITOPSTALK-newsletter-abartolo\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"1\">Sonia Cuff<\/a>\u00a0has recently shared a brilliant writeup detailing how with Continuous Access Evaluation in place, the lifespan of a token is no longer important, as we can re-challenge a user whenever circumstances change, without having to wait for their token to expire.<\/p>\n<p><span lang=\"en-US\">As you are aware, our team thrives on IT Professionals feedback which inspires the content we create. This includes <a href=\"http:\/\/www.itopstalk.com\" target=\"_blank\" rel=\"noopener\">technical articles<\/a>, <a href=\"http:\/\/aka.ms\/azupdateshow\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"2\">demo videos and interviews<\/a>. We are also actively monitoring and engaging with the\u00a0<\/span><a title=\"Original URL: https:\/\/twitter.com\/hashtag\/AzOps. Click or tap if you trust this link.\" href=\"https:\/\/twitter.com\/hashtag\/AzOps\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"3\"><span lang=\"en-US\">#AzOps<\/span><\/a><span lang=\"en-US\">\u00a0hashtag on twitter. Feel free to reach out with any of your questions as our team is always happy to help.<\/span><\/p>\n<h3 class=\"x-hidden-focus\">Learn more<\/h3>\n<ul>\n<li class=\"x-hidden-focus\">This article was written for the Monthly TechNet UK IT Pro Newsletter \u2013\u00a0<a href=\"https:\/\/ncv.microsoft.com\/DFdwHzd7Dw\" target=\"_blank\" rel=\"noopener\">sign up today<\/a>!<\/li>\n<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2021\/09\/03\/getting-started-with-azure-kubernetes-service?ocid=AID3038246\" target=\"_blank\" rel=\"noopener\">Getting started with Azure Kubernetes Service<\/a><\/li>\n<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2021\/08\/24\/azure-orbital-and-why-you-should-skill-up-for-the-future?ocid=AID3038246\" target=\"_blank\" rel=\"noopener\">Azure Orbital, and why you should skill up for the future<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft\u2019s Azure AD Identity Protection and Azure AD Conditional Access provides the ability to\u00a0monitor user sign-in attempts and analyse them for risk.<\/p>\n","protected":false},"author":430,"featured_media":33150,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[594],"post_tag":[128,519],"content-type":[],"coauthors":[1736],"class_list":["post-52317","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technetuk","tag-azure","tag-technet-uk"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Enforcing Azure Active Directory security via Continuous Access Evaluation - Microsoft Industry Blogs - United Kingdom<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enforcing Azure Active Directory security via Continuous Access Evaluation - Microsoft Industry Blogs - United Kingdom\" \/>\n<meta property=\"og:description\" content=\"Microsoft\u2019s Azure AD Identity Protection and Azure AD Conditional Access provides the ability to\u00a0monitor user sign-in attempts and analyse them for risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs - United Kingdom\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-16T14:00:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-20T21:37:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceThumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anthony Bartolo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anthony Bartolo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/\"},\"author\":[{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/author\/anthony-bartolo\/\",\"@type\":\"Person\",\"@name\":\"Anthony Bartolo\"}],\"headline\":\"Enforcing Azure Active Directory security via Continuous Access Evaluation\",\"datePublished\":\"2023-03-16T14:00:01+00:00\",\"dateModified\":\"2023-03-20T21:37:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/\"},\"wordCount\":378,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceThumb.jpg\",\"keywords\":[\"Azure\",\"TechNet UK\"],\"articleSection\":[\"TechNet UK\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/\",\"name\":\"Enforcing Azure Active Directory security via Continuous Access Evaluation - Microsoft Industry Blogs - United Kingdom\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceThumb.jpg\",\"datePublished\":\"2023-03-16T14:00:01+00:00\",\"dateModified\":\"2023-03-20T21:37:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#primaryimage\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceThumb.jpg\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceThumb.jpg\",\"width\":800,\"height\":450,\"caption\":\"An illustration depicting a modern workplace, next to an illustration of Bit the Raccoon.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enforcing Azure Active Directory security via Continuous Access Evaluation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#website\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs - United Kingdom\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs - United Kingdom\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs - United Kingdom\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enforcing Azure Active Directory security via Continuous Access Evaluation - Microsoft Industry Blogs - United Kingdom","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/","og_locale":"en_US","og_type":"article","og_title":"Enforcing Azure Active Directory security via Continuous Access Evaluation - Microsoft Industry Blogs - United Kingdom","og_description":"Microsoft\u2019s Azure AD Identity Protection and Azure AD Conditional Access provides the ability to\u00a0monitor user sign-in attempts and analyse them for risk.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/","og_site_name":"Microsoft Industry Blogs - United Kingdom","article_published_time":"2023-03-16T14:00:01+00:00","article_modified_time":"2023-03-20T21:37:52+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceThumb.jpg","type":"image\/jpeg"}],"author":"Anthony Bartolo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anthony Bartolo","Est. reading time":"1 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#article","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/"},"author":[{"@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/author\/anthony-bartolo\/","@type":"Person","@name":"Anthony Bartolo"}],"headline":"Enforcing Azure Active Directory security via Continuous Access Evaluation","datePublished":"2023-03-16T14:00:01+00:00","dateModified":"2023-03-20T21:37:52+00:00","mainEntityOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/"},"wordCount":378,"commentCount":0,"publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceThumb.jpg","keywords":["Azure","TechNet UK"],"articleSection":["TechNet UK"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/","url":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/","name":"Enforcing Azure Active Directory security via Continuous Access Evaluation - Microsoft Industry Blogs - United Kingdom","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#primaryimage"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceThumb.jpg","datePublished":"2023-03-16T14:00:01+00:00","dateModified":"2023-03-20T21:37:52+00:00","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#primaryimage","url":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceThumb.jpg","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/ModernWorkplaceThumb.jpg","width":800,"height":450,"caption":"An illustration depicting a modern workplace, next to an illustration of Bit the Raccoon."},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/technetuk\/2023\/03\/16\/enforcing-azure-active-directory-security-via-continuous-access-evaluation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Enforcing Azure Active Directory security via Continuous Access Evaluation"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#website","url":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/","name":"Microsoft Industry Blogs - United Kingdom","description":"","publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#organization","name":"Microsoft Industry Blogs - United Kingdom","url":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs - United Kingdom"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts\/52317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/users\/430"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/comments?post=52317"}],"version-history":[{"count":0,"href":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts\/52317\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/media\/33150"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/media?parent=52317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/categories?post=52317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=52317"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=52317"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=52317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}