Share via

Entra Enterprise app unable to include/exclude public clients

Eunice 41 Reputation points
2026-05-04T00:50:37.4766667+00:00

I have a enterprise app that is a public client (for mobile app). there doesn't seem to be a way to exclude or include the app in the conditional access policies. So can i check if we want to enforce MFA for the enterprise app, or exclude the app from requiring app protection, how can we do so?

Microsoft Security | Microsoft Entra | Microsoft Entra ID

Answer accepted by question author

  1. Alex Burlachenko 20,665 Reputation points MVP Volunteer Moderator
    2026-05-04T07:31:15.9566667+00:00

    hi Gents, so Eunice hi, as correct said Rukmini yeah this is expected.

    Conditional Access targets the resource/API being accessed, not really the public client/mobile app itself. A public client often wont show as something u can include/exclude in “Cloud apps”, because it is the app requesting the token, not the protected resource. To enforce MFA, create a CA policy targeting the backend/API enterprise app or “All cloud apps”, then scope users/groups and client app = mobile apps and desktop clients. To exclude it from app protection requirement, exclude the resource app/API that receives the token, not the mobile client. If this is a custom mobile app, make sure the backend API has an enterprise application/service principal in the tenant, then target that. For Intune app protection, the app itself must support MAM/APP; if it doesnt, CA “Require app protection policy” will block it and u cant fix that with Azure AI style permissions. Other words client is not the thing CA protects, target the API/resource behind it

    rgds, Alex

    &

    if my answer helps pls accept it.
    
    1 person found this answer helpful.
    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.