MC540749 – Plan for Change: “Require approved client app” control in Azure AD Conditional Access will be retired in March 2026

Intune Icon

check before: 2026-03-01

Product:

Azure Active Directory, Entra, Entra ID, Intune, Microsoft 365 Apps

Platform:

Online, World tenant

Status:

Change type:

Admin impact, Retirement

Details:

In March 2026, Azure Active Directory (Azure AD) and Microsoft Intune will retire the Conditional Access "Require approved client app" grant control. Instead we recommend utilizing the "Require application protection policy" grant control, which provides the same data loss and protection with additional benefits.

Change Category:
XXXXXXX ... free basic plan only

Scope:
XXXXXXX ... free basic plan only

Release Phase:

Created:
2023-04-13

updated:
2024-08-10

Task Type

XXXXXXX ... free basic plan only

Docu to Check

XXXXXXX ... free basic plan only

MS How does it affect me

XXXXXXX ... free basic plan only

MS Preperations

XXXXXXX ... free basic plan only

MS Urgency

XXXXXXX ... free basic plan only

MS workload name

XXXXXXX ... free basic plan only

linked item details

XXXXXXX ... free basic plan only

More Info URL

XXXXXXX ... free basic plan only

summary for non-techies**

XXXXXXX ... free basic plan only

Direct effects for Operations**

Loss of Data Protection
Without the 'Require approved client app' control, data protection measures will be weakened, potentially leading to data breaches or loss.
   - roles: IT Security Manager, Compliance Officer
   - references: https://learn.microsoft.com/azure/active-directory/conditional-access/migrate-approved-client-app

Increased User Access Issues
Users may face access issues if their applications are not compliant with the new 'Require application protection policy' control, leading to disruptions in their workflow.
   - roles: End User, Help Desk Support
   - references: https://learn.microsoft.com/azure/active-directory/conditional-access/migrate-approved-client-app

Compliance Risks
Retiring the control without proper transition may lead to non-compliance with data protection regulations, risking legal penalties.
   - roles: Compliance Officer, Data Protection Officer
   - references: https://learn.microsoft.com/azure/active-directory/conditional-access/migrate-approved-client-app

Increased Support Tickets
The transition may result in a surge of support tickets from users experiencing issues with application access, straining IT resources.
   - roles: Help Desk Support, IT Operations Manager
   - references: https://learn.microsoft.com/azure/active-directory/conditional-access/migrate-approved-client-app

User Experience Degradation
Users accustomed to the previous control may find the new requirements confusing, leading to frustration and decreased productivity.
   - roles: End User, IT Trainer
   - references: https://learn.microsoft.com/azure/active-directory/conditional-access/migrate-approved-client-app

Configutation Options**

XXXXXXX ... paid membership only

Potentional Risks**

XXXXXXX ... paid membership only

IT Security**

XXXXXXX ... paid membership only

explanation for non-techies**

In the world of technology, changes often occur to improve systems and enhance security. One such change is happening with Microsoft Entra ID (formerly Azure Active Directory) and Microsoft Intune. By March 2026, a specific security feature called "Require approved client app" will be retired. Think of this feature as a security guard at the entrance of a building, only allowing certain people (or apps) to enter. After March 2026, this particular guard will no longer be on duty.

Instead, Microsoft suggests using a new security measure called "Require application protection policy." This new feature is like hiring a more advanced security system that not only checks who enters but also ensures that they follow specific rules once inside. This system offers the same level of security as the old guard but with additional benefits.

For organizations currently using the "Require approved client app" feature, it's important to transition to the new "Require application protection policy" to maintain security standards. This change is similar to upgrading from a traditional lock to a smart lock that offers more control and flexibility.

To prepare for this transition, organizations should review their current security policies and update them to incorporate the new protection policy. This ensures that when the old feature is retired, there won't be any gaps in security. Microsoft provides resources and guidance to help with this transition, making it as smooth as possible.

In summary, while change can be challenging, it often leads to better security and improved functionality. By adopting the new "Require application protection policy," organizations can ensure their systems remain secure and up-to-date.

** AI generated content. This information must be reviewed before use.

a free basic plan is required to see more details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.



Last updated 4 weeks ago ago

Leave a Reply

Share to MS Teams

Login to your account

Welcome Back, We Missed You!