Your Conditional Access policies seem well-structured, but there are a few potential reasons why the block policy isn't applying as expected when logging in from an iOS mobile app.
- Application might be using a different user-agent
- The mobile app might not be reporting itself as an iOS device in the way Conditional Access expects.
- Conditional Access policies primarily rely on user-agent strings to detect the device platform.
- Since the log shows "Browser: Mobile Safari," it suggests that the authentication request is browser-based rather than coming from the Tresorit mobile app directly.
To resolve it, instead of only filtering by device platform, try adding a condition based on the client app type.
- Modify your block policy:
- Under Conditions → Client apps, select "Browser" and "Mobile apps and desktop clients."
- This ensures that both the browser and mobile app authentications are blocked.
- Modern vs. legacy authentication
- If the mobile app is using legacy authentication (Basic Auth) instead of modern authentication, Conditional Access policies may not be able to evaluate it properly.
- Check Sign-in logs → Authentication details to confirm whether the authentication is done using legacy or modern authentication.
To resolve it, if legacy authentication is detected, enforce modern authentication and block legacy authentication protocols via Conditional Access.
- Policy evaluation order / overlapping policies
- If there are other Conditional Access policies (besides the two you mentioned), they might be overriding or conflicting with your block policy.
- Check if any higher-priority policies allow sign-in under different conditions.
To resolve it, go to Entra Admin Center → Conditional Access and review all policies that might be affecting Tresorit.
- iOS devices enrolled in Intune (compliance policy conflicts)
- If the mobile device is enrolled in Microsoft Intune, it could be marked as "Compliant" and be granted access due to another policy allowing compliant devices.
To resolve it, check whether the device compliance status is affecting the access decision. If so, modify your block policy to also exclude compliant devices from access if needed.
- Session persistence / token caching
- If you've previously logged in successfully from the iOS device, an active session or a refresh token may still be valid.
- Sometimes, Conditional Access policies only apply to new authentication attempts, and existing sessions remain valid.
To resolve it, in Entra Admin Center → Sign-in logs, check if the sign-in is using a refresh token instead of a new authentication. If refresh tokens are an issue, revoke all active sessions for the user via:
- Entra ID → Users → Select user → Sign-in logs → Revoke sessions
- Ask the user to sign out and log in again to test.
If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.
hth
Marcin