Set-EntraConditionalAccessPolicy
Updates a conditional access policy in Microsoft Entra ID by Id.
Syntax
Set-EntraConditionalAccessPolicy
-PolicyId <String>
[-Conditions <ConditionalAccessConditionSet>]
[-GrantControls <ConditionalAccessGrantControls>]
[-DisplayName <String>]
[-Id <String>]
[-State <String>]
[-SessionControls <ConditionalAccessSessionControls>]
[<CommonParameters>]
Description
This cmdlet allows an admin to update a conditional access policy in Microsoft Entra ID by Id. Conditional access policies are custom rules that define an access scenario.
Examples
Example 1: Updates a conditional access policy in Microsoft Entra ID by PolicyId.
PS C:\> $cond = New-Object -TypeName Microsoft.Open.MSGraph.Model.ConditionalAccessConditionSet
PS C:\> $control = New-Object -TypeName Microsoft.Open.MSGraph.Model.ConditionalAccessGrantControls
PS C:\> $session = New-Object -TypeName Microsoft.Open.MSGraph.Model.ConditionalAccessSessionControls
PS C:\> Set-EntraConditionalAccessPolicy -PolicyId 6b5e999b-0ba8-4186-a106-e0296c1c4358 -DisplayName "MFA policy 1" -State "Enabled" -Conditions $cond -GrantControls $control -SessionControls $session
The first command creates new ConditionalAccessConditionSet object.
The second command creates new ConditionalAccessGrantControls object.
The third command creates new ConditionalAccessSessionControls object.
The final command updates a conditional access policy in Microsoft Entra ID.
Example 2: Updates display name for a conditional access policy in Microsoft Entra ID by PolicyId.
PS C:\> Set-EntraConditionalAccessPolicy -PolicyId 6b5e999b-0ba8-4186-a106-e0296c1c4358 -DisplayName "MFA policy 1"
This command updates a conditional access policy in Microsoft Entra ID.
Example 3: Updates state for a conditional access policy in Microsoft Entra ID by PolicyId.
PS C:\> Set-EntraConditionalAccessPolicy -PolicyId 6b5e999b-0ba8-4186-a106-e0296c1c4358 -State "Enabled"
This command updates a conditional access policy in Microsoft Entra ID.
Parameters
-Conditions
Specifies the conditions for the conditional access policy in Microsoft Entra ID.
Type: | ConditionalAccessConditionSet |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisplayName
Specifies the display name of a conditional access policy in Microsoft Entra ID.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-GrantControls
Specifies the controls for the conditional access policy in Microsoft Entra ID.
Type: | ConditionalAccessGrantControls |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Id
Specifies the ID of a conditional access policy in Microsoft Entra ID.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-PolicyId
Specifies the policy id of a conditional access policy in Microsoft Entra ID.
Type: | String |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-SessionControls
This control allows organizations to require Microsoft Entra ID to pass device information to the selected cloud apps.
Type: | ConditionalAccessSessionControls |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-State
Specifies the enabled or disabled state of the conditional access policy in Microsoft Entra ID.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Related Links
Feedback
https://aka.ms/ContentUserFeedback.
Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see:Submit and view feedback for