Conditional Access

Driven by the shift to mobile and cloud and increased number of cybersecurity threats, conditional access is a process that enables IT Services to validate or verify devices and users using a set of automated policies to protect university networks and data. Policies may pertain to a specific use context or any number of factors, such as the user profile, the state of the device, time of day, geographical location and what data the user is attempting to access. 

Device Compliance Policies

Any devices used by university employees that are not meeting minimum requirements, as defined in device's assigned compliance policy, will not be granted full access to University apps, systems and data. This includes devices, both university-owned and personal, that are not enrolled in Intune - a device administration platform designed to asses compliance and automate software provisioning and updates. This approach is known as conditional access, and is required in order to protect University systems and data from threats such as ransomware, viruses and other types of malware. IT Services is currently running a pilot implementation of conditional access involving a limited number of users. The full implementation is expected to take place in Q4 or 2023.

Minimum requirements vary for different operating systems:

When you try to access University apps, systems and data on a device that is non-compliant, the following message will come up:

Clicking the Open button will launch Company Portal app that will provide additional information about your device. 

Scroll down, until you see two links

  • Click on Learn More to see more details on your device compliance status.
  • Click on Check status to refresh your device compliance status. This process may take a while.

Details

Article ID: 139049
Created
Fri 10/29/21 10:29 AM
Modified
Sat 5/20/23 4:25 PM

Related Articles (2)

In order for your macOS computer to be deemed as compliant, it must meet a number of requirements. Non-compliant devices will not be able to access some of the resources and systems.
In order for your work computer to be deemed as compliant, it must meet a number of requirements. Non-compliant devices will not be able to access some of the resources and systems starting in Q4 of 2023.