Driven by the shift to mobile and cloud and increased number of cybersecurity threats, conditional access is a process that enables IT Services to validate or verify devices and users using a set of automated policies to protect university networks and data. Policies may pertain to a specific use context or any number of factors, such as the user profile, the state of the device, time of day, geographical location and what data the user is attempting to access.
Device Compliance Policies
Any devices used by university employees that are not meeting minimum requirements, as defined in device's assigned compliance policy, will not be granted full access to University apps, systems and data. This includes devices, both university-owned and personal, that are not enrolled in Intune - a device administration platform designed to asses compliance and automate software provisioning and updates. This approach is known as conditional access, and is required in order to protect University systems and data from threats such as ransomware, viruses and other types of malware. IT Services is currently running a pilot implementation of conditional access involving a limited number of users. The full implementation is expected to take place in Q4 or 2023.
Minimum requirements vary for different operating systems:
When you try to access University apps, systems and data on a device that is non-compliant, the following message will come up:

Clicking the Open button will launch Company Portal app that will provide additional information about your device.

Scroll down, until you see two links
- Click on Learn More to see more details on your device compliance status.
- Click on Check status to refresh your device compliance status. This process may take a while.
