| title | Migrate approved client app to application protection policy in Conditional Access |
|---|---|
| description | The approved client app control is going away. Migrate to App protection policies. |
| ms.topic | how-to |
| ms.date | 03/24/2026 |
| ms.reviewer | jogro |
In this article, you learn how to migrate from the "Require approved client app" Conditional Access grant control to the "Require app protection policy" grant control. App protection policies provide the same data loss and protection as approved client app policies, but with other benefits. For more information about the benefits of using app protection policies, see the article App protection policies overview.
The "Require approved client app" grant retirement date has been extended from March 2026 to June 30th, 2026. Organizations must transition all current Conditional Access policies that use only the "Require approved client app" grant to "Require approved client app" or "Require app protection policy" by June 2026. Additionally, for any new Conditional Access policy, only apply the "Require app protection policy" grant.
After June 30th 2026, Microsoft will stop enforcing the "Require approved client app" grant control, and it will be as if this grant isn't selected. Use the following steps before June 2026 to protect your organization’s data.
Require approved client apps or app protection policy with mobile devices
The following steps make an existing Conditional Access policy require an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an app protection policy created in Microsoft Intune.
Organizations can choose to update their policies using the following steps.
- Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.
- Browse to Entra ID > Conditional Access > Policies.
- Select a policy that uses the approved client app grant.
- Under Access controls > Grant, select Grant access.
- Select Require approved client app and Require app protection policy
- For multiple controls select Require one of the selected controls
- Confirm your settings and set Enable policy to Report-only.
- Select Create to enable your policy.
[!INCLUDE conditional-access-report-only-mode]
Repeat the previous steps on all of your policies that use the approved client app grant.
Warning
Not all applications that are supported as approved applications support application protection policies. For a list of some common client apps, see App protection policy requirement. If your application isn't listed there, contact the application developer.
Require app protection policy with mobile devices
The following steps help create a Conditional Access policy requiring an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an app protection policy created in Microsoft Intune.
Organizations can choose to deploy this policy using the following steps.
- Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.
- Browse to Entra ID > Conditional Access > Policies.
- Select New policy.
- Give your policy a name. Create a meaningful standard for the names of your policies.
- Under Assignments, select Users or workload identities.
- Under Include, select All users.
- Under Exclude, select Users and groups and exclude at least one account to prevent yourself from being locked out. If you don't exclude any accounts, you can't create the policy.
- Under Target resources > Resources (formerly cloud apps) > Include, select All resources (formerly 'All cloud apps')
- Under Conditions > Device platforms, set Configure to Yes.
- Under Include, Select device platforms.
- Choose Android and iOS
- Select Done.
- Under Access controls > Grant, select Grant access.
- Select Require approved client app and Require app protection policy
- For multiple controls select Require one of the selected controls
- Confirm your settings and set Enable policy to Report-only.
- Select Create to enable your policy.
[!INCLUDE conditional-access-report-only-mode]
Note
If an app doesn't support Require app protection policy, end users trying to access resources from that app are blocked.
For more information on application protection policies, see: