Cloudflare Access can integrate with Azure AD's Conditional Access feature to require that users connect to certain applications from managed devices. To enable, you must integrate Azure AD with Cloudflare Access as a cloud app that requires managed device connections. You can use Cloudflare Access' to segment which Access applications require Azure AD with managed devices and which only require Azure AD.
Azure AD Configuration
When you , Azure AD treats Cloudflare as a single cloud application, even if you have multiple applications secured with Cloudflare Access. To introduce device posture requirements, Cloudflare Access can reuse that same integration.
If you want to allow users to reach certain applications with only Azure AD logins, and no device requirement, you will need to maintain two distinct integrations. One integration with Cloudflare will require device management and the other will only require Azure AD logins.
You can configure which applications secured by Cloudflare Access use which integration in the steps below.
Repeat this step a second time if you want to maintain an integration that does not require Azure AD device management. We recommend giving each a distinct name that will be used in the steps below.
Next, Conditional Access policy in Azure AD. In that policy, you can require that users connect from Managed, Hybrid, or compliant devices. Apply that policy to the integration with Cloudflare Access.
Apply that policy to the integration with Cloudflare Access.
Cloudflare Access Configuration
In the Cloudflare for Teams dashboard, you can configure which applications require connections from a managed device and which do not.
Navigate to an application that requires managed device connections.
Open the Authentication tab.
Toggle the Azure AD integration that requires managed device usage.