Manage access to environments using Azure Active Directory Conditional Access

Important

This content is archived and is not being updated. For the latest documentation, go to What's new and planned for Dynamics 365 Business Central. For the latest release plans, go to Dynamics 365 and Microsoft Power Platform release plans.

Enabled for Public preview General availability
Users by admins, makers, or analysts - Dec 14, 2021

Business value

Use Azure Active Directory Conditional Access to enforce policies specific to access Dynamics 365 Business Central after first-factor authentication.

Feature details

Admins can set policies in Azure Active Directory specific to accessing Business Central. Policies can be created to change authentication rules based on certain conditions after the user completes the first-factor authentication. For example, you can use policies to require users who are part of certain groups to use multi-factor authentication or to restrict access to certain IP addresses and locations specifically for Business Central.

To learn more about Azure Active Directory Conditional Access, see What is Conditional Access? and Block access by location with Azure AD Conditional Access.

Tell us what you think

Help us improve Dynamics 365 Business Central by discussing ideas, providing suggestions, and giving feedback. Use the forum at https://aka.ms/bcideas.

Thank you for your idea

Thank you for submitting this idea. We listened to your idea, along with comments and votes, to help us decide what to add to our product roadmap.

See also

Block access by location with Azure AD Conditional Access (docs)