{"id":49576,"date":"2022-10-04T09:41:14","date_gmt":"2022-10-04T13:41:14","guid":{"rendered":"https:\/\/live-jc-marketing-site.pantheonsite.io\/?p=49576"},"modified":"2025-07-07T18:11:01","modified_gmt":"2025-07-07T22:11:01","slug":"conditional-access-policies-to-manage-remote-workers","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers","title":{"rendered":"Conditional Access Policies to Manage Remote Workers"},"content":{"rendered":"\n<p><em>October is Cybersecurity Awareness Month, and this year\u2019s theme is See Yourself in Cyber, which focuses on the individual\u2019s role in cybersecurity. While cybersecurity can feel complex and inaccessible to the average person, the reality is that everyone has a role to play in security, from executives, to the IT team, to end users. To help you empower everyone in your organization to do their part regarding cybersecurity, we\u2019re resurfacing this article, Conditional Access Policies to Manage Remote Workers. Read on to find out how conditional access provides security for your company, and efficiency for remote employees.<\/em><\/p>\n\n\n<hr>\n\n\n\n<figure class=\"image is-16by9\">\n<iframe class=\"has-ratio\" width=\"300\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/NxCxIy0KZ10?rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe>\n<\/figure>\n\n\n\n<p>Supporting remote work is an integral part of every IT strategy in today&#8217;s distributed workplaces. There is no going back to a world where 100% of end users are in the office full-time. COVID-19 forced IT admins to quickly learn how to support and manage distributed workforces and customer bases &#8211; who were all working from home. In the instability of the pandemic, many IT departments were merely in survival mode, reacting to new challenges without longterm plans in place. Now that remote work is here to stay, however, it\u2019s time to implement policies for a future of no (or, at least, far fewer) physical headquarters, with employees doing work from anywhere.<\/p>\n\n\n\n<p>Building security for a remote workforce requires a very different strategy than designing security for physical office spaces. For example, in physical locations, admins can easily monitor incoming IP addresses as the first step for login credentials. In remote environments, however, that\u2019s not possible unless everyone works from a VPN connection at all times.<\/p>\n\n\n\n<p>So how can IT build a secure foundation for remote workers without impacting productivity? There&#8217;s three key considerations:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Verifying user identities: <\/strong>ensuring everyone who logs in is who they say they are.<\/li>\n\n\n\n<li><strong>Verifying trusted devices<\/strong>: ensuring the laptop, tablet, or phone the user logs in from is secure.<\/li>\n\n\n\n<li><strong>Verifying that users are on an approved network<\/strong>: ensuring the wireless network the device is connected to is secure.&nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>These policies make up what is known as <a href=\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples\">Conditional Access<\/a>. Conditional Access is an additional layer of security on top of your existing environment. It specifies conditions that users, devices, and networks must meet before they gain access to IT resources \u2014 independent of what they are already authorized to access via their credentials.&nbsp;Conditional Access is based on a <a href=\"https:\/\/jumpcloud.com\/use-cases\/zero-trust\">Zero Trust security<\/a> model, which assumes that users, devices, networks, and other resources are all &#8220;untrusted&#8221;. Credentials alone aren&#8217;t enough; users must verify their identities (or conditions indicating they are in a secure situation) to gain access to company resources.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Verifying User Identities<\/strong><\/h2>\n\n\n\n<p>Verifying a user&#8217;s identity is a critical first step in securing the remote employee. It\u2019s not enough just to use a strong password, though. With Conditional Access, you can use all forms of credential control, including multi-factor authentication.\u00a0<\/p>\n\n\n\n<p><a href=\"https:\/\/jumpcloud.com\/platform\/multi-factor-authentication-mfa\">Multi-factor authentication<\/a> (MFA) provides a potent weapon against phishing attacks. Instead of just requiring a user ID and password, MFA <em>also<\/em> requires an additional verification step &#8211; like a one-time code or <a href=\"https:\/\/jumpcloud.com\/blog\/push-notification-mfa\">push notification<\/a> to a secondary device &#8211; to verify a user&#8217;s identity. A malicious actor may obtain a user&#8217;s password, but without the secondary verification, they&#8217;ll be unable to access the account, practically eliminating the potential for compromised credentials.<\/p>\n\n\n\n<p>MFA is always a good idea. But in certain circumstances &#8211; like when an employee is working from the company office space and is securely connected to your internet &#8211; you may not feel the need for this extra layer of security. Conditional Access is all about creating policies based on the circumstances, so you can require remote employees to use MFA, but allow in-office employees to bypass this extra verification step.<\/p>\n\n\n\n<p>You can also require multi-factor authentication for specific groups accessing organizational resources, but not others. For example, you might let the customer service team bypass MFA prompts for accessing their devices since they just use them to email and respond to customers, but everyone else in the organization must use MFA at the device level to protect potential exposure to software or systems that are critical to the business.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Verifying the Device<\/strong><\/h2>\n\n\n\n<p>The <a href=\"https:\/\/jumpcloud.com\/simulations\/conditional-access-device-trust\" target=\"_blank\" rel=\"noreferrer noopener\">device trust<\/a> certificate ensures that employees only access company resources from company-owned or verified personal devices (<a href=\"https:\/\/jumpcloud.com\/blog\/what-is-byod\">BYOD<\/a>). When employees are using personal devices, Conditional Access policies are triggered, because they are considered &#8220;untrusted&#8221; devices. When they&#8217;re using trusted devices, however, policies can be implemented to allow for fewer MFA requirements.<\/p>\n\n\n\n<p>Conditional Access can also prevent<em> <\/em>employees from having access to company resources from untrusted devices all together. Let\u2019s say that you only want employees to access corporate documents on a trusted device and not their personal iPhone or iPad. Conditional Access can give IT control over which devices can access which company resources. These policies can be application specific, too. You could also allow employees to check email on an untrusted device but not access any other company resources, for example.In a world where almost every device can access email and the web, Conditional Access lets an IT department control <em>which<\/em> devices have access to <em>which <\/em>resources.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Verifying the Network<\/strong><\/h2>\n\n\n\n<p>The final piece of a Conditional Access policy for remote work is a <a href=\"https:\/\/jumpcloud.com\/simulations\/conditional-access-network-trust\">network trust policy<\/a>. Now that organizations are implementing hybrid and remote working options permanently, ensuring employees are on a secure network is imperative.<\/p>\n\n\n\n<p>In theory, the safest way to ensure network trust is with a list of known IP addresses that allows employees to access corporate resources while on their home network or using a corporate VPN. Using a network trust policy prevents employees from accessing sensitive corporate resources on insecure networks, like at coffee shops or hotels, but gives them full access when on their home network that has been secured with the help of their company admins.<\/p>\n\n\n\n<p>In practice, however, this approach can quickly become a management nightmare &#8211; especially if you have a large remote user base, or your workforce is apt to frequently move locations. Instead, network trust can be used to relax certain policies when workers are connecting via a secure, IT-managed network. For example, you can use network trust to work with your MFA policy, where MFA prompts are limited when on a whitelisted IP range, but required for less verifiable IP addresses.&nbsp;If managing an IP whitelist isn&#8217;t practical for your business, <a href=\"https:\/\/jumpcloud.com\/simulations\/conditional-access-geolocation\" target=\"_blank\" rel=\"noreferrer noopener\">geolocation<\/a> can help you ensure employees are where they say they are. You can set parameters by state, by country, or any other location requirements. For example, suppose an employee lives in Arkansas but is trying to access corporate resources from Europe. You&#8217;ve set up geolocation that only allows user logins from the United States, so the Conditional Access policy will automatically deny them access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conditional Access Policies for Remote Employees<\/strong><\/h2>\n\n\n\n<p>By leveraging Conditional Access policies inside JumpCloud\u2019s open directory platform\u2122, an IT team can better control employee access while still providing a great end-user experience. The fundamental tenets of Conditional Access \u2014 grounded in Zero Trust principles \u2014 ensure that trusted devices are only accessing your company\u2019s resources in authorized locations, and by authorized personnel. When they aren\u2019t, employees can access resources after verifying their identity with MFA.&nbsp;<\/p>\n\n\n\n<p>Conditional Access in a Zero-Trust environment isn\u2019t just about creating a yes\/no policy for access. It\u2019s about having a holistic view of security and recognizing that organizations have to be vigilant in a remote-first world, but can relax policies when specific parameters are met. Conditional Access allows IT organizations to limit access from <a href=\"https:\/\/jumpcloud.com\/blog\/byod-zero-trust-security-strategy\">unmanaged BYOD devices<\/a> and unsecured networks, while still enabling the right employees with full access once verified.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Evaluate JumpCloud Free Today<\/strong><\/h3>\n\n\n\n<p>If you\u2019re interested in learning more about how to achieve stronger security practices, <a href=\"https:\/\/console.jumpcloud.com\/signup\" target=\"_blank\" rel=\"noreferrer noopener\">evaluate JumpCloud today<\/a>! JumpCloud is free for 10 devices and 10 users. Once you\u2019ve created your JumpCloud account, you\u2019re also given 10 days of Premium 24&#215;7 in-app chat support to help you with any questions or issues that arise.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to use JumpCloud\u2019s Conditional Access policies to prepare for the future of remote and hybrid work.<\/p>\n","protected":false},"author":158,"featured_media":49208,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23,2337],"tags":[],"collection":[],"platform":[],"funnel_stage":[3015],"coauthors":[2514],"class_list":["post-49576","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices","category-remote-work","funnel_stage-mid-funnel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Conditional Access Policies to Manage Remote Employees - JumpCloud<\/title>\n<meta name=\"description\" content=\"Learn how to use JumpCloud\u2019s Conditional Access policies to prepare for the future of remote and hybrid work.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Conditional Access Policies to Manage Remote Workers\" \/>\n<meta property=\"og:description\" content=\"Learn how to use JumpCloud\u2019s Conditional Access policies to prepare for the future of remote and hybrid work.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-04T13:41:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-07T22:11:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/06\/Manage-EDU-Identities-in-a-Remote-Learning-Environment-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3800\" \/>\n\t<meta property=\"og:image:height\" content=\"2280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Molly Murphy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Molly Murphy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers\"},\"author\":{\"name\":\"Molly Murphy\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/848d5076d1ee31d44f3e931246a2e6e4\"},\"headline\":\"Conditional Access Policies to Manage Remote Workers\",\"datePublished\":\"2022-10-04T13:41:14+00:00\",\"dateModified\":\"2025-07-07T22:11:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers\"},\"wordCount\":1346,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/06\/Manage-EDU-Identities-in-a-Remote-Learning-Environment-1.png\",\"articleSection\":[\"Best Practices\",\"Remote Work\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers\",\"url\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers\",\"name\":\"Conditional Access Policies to Manage Remote Employees - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/06\/Manage-EDU-Identities-in-a-Remote-Learning-Environment-1.png\",\"datePublished\":\"2022-10-04T13:41:14+00:00\",\"dateModified\":\"2025-07-07T22:11:01+00:00\",\"description\":\"Learn how to use JumpCloud\u2019s Conditional Access policies to prepare for the future of remote and hybrid work.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/06\/Manage-EDU-Identities-in-a-Remote-Learning-Environment-1.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/06\/Manage-EDU-Identities-in-a-Remote-Learning-Environment-1.png\",\"width\":3800,\"height\":2280,\"caption\":\"Manage EDU Identities in a Remote Learning Environment\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Conditional Access Policies to Manage Remote Workers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/848d5076d1ee31d44f3e931246a2e6e4\",\"name\":\"Molly Murphy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/8f47d137f180346650b37413f72e3cd1\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/03cbe929374b32bf56059073b0aeacd01929a666dacc379b0de0ffc0abaf9349?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/03cbe929374b32bf56059073b0aeacd01929a666dacc379b0de0ffc0abaf9349?s=96&d=mm&r=g\",\"caption\":\"Molly Murphy\"},\"description\":\"Molly Murphy is a Senior Content Writer at JumpCloud. A self-professed nerd, she loves working on the cutting edge of the latest IT tech. When she's not in the [remote] office, Molly loves traveling, rescuing animals, and growing her all together unhealthy obsession with Harry Potter.\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Conditional Access Policies to Manage Remote Employees - JumpCloud","description":"Learn how to use JumpCloud\u2019s Conditional Access policies to prepare for the future of remote and hybrid work.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers","og_locale":"en_US","og_type":"article","og_title":"Conditional Access Policies to Manage Remote Workers","og_description":"Learn how to use JumpCloud\u2019s Conditional Access policies to prepare for the future of remote and hybrid work.","og_url":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers","og_site_name":"JumpCloud","article_published_time":"2022-10-04T13:41:14+00:00","article_modified_time":"2025-07-07T22:11:01+00:00","og_image":[{"width":3800,"height":2280,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/06\/Manage-EDU-Identities-in-a-Remote-Learning-Environment-1.png","type":"image\/png"}],"author":"Molly Murphy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Molly Murphy","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers"},"author":{"name":"Molly Murphy","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/848d5076d1ee31d44f3e931246a2e6e4"},"headline":"Conditional Access Policies to Manage Remote Workers","datePublished":"2022-10-04T13:41:14+00:00","dateModified":"2025-07-07T22:11:01+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers"},"wordCount":1346,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/06\/Manage-EDU-Identities-in-a-Remote-Learning-Environment-1.png","articleSection":["Best Practices","Remote Work"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers","url":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers","name":"Conditional Access Policies to Manage Remote Employees - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/06\/Manage-EDU-Identities-in-a-Remote-Learning-Environment-1.png","datePublished":"2022-10-04T13:41:14+00:00","dateModified":"2025-07-07T22:11:01+00:00","description":"Learn how to use JumpCloud\u2019s Conditional Access policies to prepare for the future of remote and hybrid work.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/06\/Manage-EDU-Identities-in-a-Remote-Learning-Environment-1.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/06\/Manage-EDU-Identities-in-a-Remote-Learning-Environment-1.png","width":3800,"height":2280,"caption":"Manage EDU Identities in a Remote Learning Environment"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-to-manage-remote-workers#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Conditional Access Policies to Manage Remote Workers"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/848d5076d1ee31d44f3e931246a2e6e4","name":"Molly Murphy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/8f47d137f180346650b37413f72e3cd1","url":"https:\/\/secure.gravatar.com\/avatar\/03cbe929374b32bf56059073b0aeacd01929a666dacc379b0de0ffc0abaf9349?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/03cbe929374b32bf56059073b0aeacd01929a666dacc379b0de0ffc0abaf9349?s=96&d=mm&r=g","caption":"Molly Murphy"},"description":"Molly Murphy is a Senior Content Writer at JumpCloud. A self-professed nerd, she loves working on the cutting edge of the latest IT tech. When she's not in the [remote] office, Molly loves traveling, rescuing animals, and growing her all together unhealthy obsession with Harry Potter.","sameAs":["https:\/\/jumpcloud.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/49576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/158"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=49576"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/49576\/revisions"}],"predecessor-version":[{"id":127021,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/49576\/revisions\/127021"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/49208"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=49576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=49576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=49576"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=49576"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=49576"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=49576"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=49576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}