Microsoft Entra Blog
Microsoft Entra ID: Browser Support for Device-Based Conditional Access
Overview
Device-based Conditional Access failures are often reported as inconsistent browser behavior. The same user signs in successfully in one browser, fails in another, or fails only in private mode. That inconsistency can look random until you read Microsoft's browser support guidance the way the Conditional Access engine actually uses it.
Microsoft's primary references are Use conditions in Conditional Access policies, Configure grant controls in Microsoft Entra Conditional Access, Troubleshoot sign-in problems with Conditional Access, and Microsoft Edge and Conditional Access.
The key concept is that browser support for device-based access is not about whether a browser can render a sign-in page. It is about whether that browser, on that operating system, in that session state, can provide the device evidence Microsoft Entra requires in order to evaluate device-based policy correctly.
Why browser support is a policy dependency, not just a user experience detail
For user-only web authentication, the browser's job is relatively straightforward: move the user through the sign-in transaction and carry the resulting session state. For device-based Conditional Access, the browser has an additional responsibility. It must participate in the device-identification path that lets Microsoft Entra tie the request to a known device object.
This changes the support model completely. A browser can be perfectly capable of authenticating the user and still be incapable of satisfying the device-based policy requirement. That is why administrators see scenarios such as:
- the user enters credentials successfully
- the application redirects back normally
- Conditional Access still blocks the token issuance because device evidence was insufficient
The browser did not "fail login." It failed the device-evidence portion of policy evaluation.
How to read Microsoft's support matrix correctly
The browser matrix in Use conditions in Conditional Access policies should be read as a technical contract. Microsoft is effectively documenting which combinations of browser, operating system, and scenario can carry the device proof needed by Conditional Access.
That means the real question is not "is Chrome supported?" or "does Safari work?" The useful question is:
Can this exact browser and operating system combination, in this exact sign-in scenario, present the device identity evidence required for the policy?
Without that framing, browser troubleshooting becomes anecdotal. Teams rely on isolated success cases and then assume the same result applies everywhere.
Why Edge is often the best baseline for validation
Microsoft documents Edge more explicitly than most other browsers because it is tightly integrated with Microsoft's enterprise sign-in stack. The Microsoft Edge and Conditional Access guidance and the Conditional Access support matrix together make Edge the most useful baseline for controlled testing.
This does not mean every failure outside Edge is automatically a browser problem. It means that a healthy, supported Edge path is often the fastest way to prove whether the tenant policy and device identity path are functioning correctly at all.
If the sign-in succeeds in a properly supported Edge session, the Conditional Access policy is usually behaving as designed and the remaining question becomes why another browser path cannot provide equivalent evidence. If it fails even in the supported Edge baseline, the investigation should move down into device identity, registration state, and policy configuration.
Why browser brand alone is meaningless
One of the biggest operational mistakes in Conditional Access troubleshooting is to categorize incidents only by browser brand. Microsoft does not publish support in that simplified form, and you should not troubleshoot in that simplified form either.
The real support axis is always:
- browser
- operating system
- client state
- grant control being enforced
- whether the scenario is app-specific or browser-based
That is why "Chrome works" or "Safari is broken" are usually low-value statements. They omit the variables Microsoft actually uses in the support contract.
Private browsing and disabled cookies are not small caveats
Microsoft states in Use conditions in Conditional Access policies that device checks fail when the browser is in private mode or when cookies are disabled. This is one of the most important implementation details in the entire browser-support topic.
Many escalations can be explained by this one fact. A user may say:
- the site works in a normal tab
- it fails in Incognito
- nothing changed in Intune or Conditional Access
All three statements can be true. The browser session itself changed from a supported state to an unsupported state for device identification. That is not inconsistent policy evaluation. It is consistent enforcement against a different runtime input.
The client certificate and device-identification path
Microsoft explains in Configure grant controls in Microsoft Entra Conditional Access that device identification for supported browser paths relies on a client certificate path in several scenarios.
This is the backend reason browser support matters so much. The browser is not only carrying a cookie and a username. It is participating in a technical exchange that gives Microsoft Entra confidence about the device behind the request.
Once you understand that, several confusing outcomes become easier to explain:
- user authentication can succeed while policy still fails
- supported and unsupported browser sessions can produce different results on the same physical device
- device-based Conditional Access can appear flaky when the real issue is that different sessions are providing different levels of device evidence
How browser support intersects with sign-in logs
When Microsoft recommends using sign-in logs and the sign-in diagnostic in Troubleshoot sign-in problems with Conditional Access, the reason is not only to show which policy applied. The logs also help you correlate the failure to the actual client context:
- which browser was used
- which operating system was used
- whether the policy expected device evidence
- whether the device was recognized as managed or compliant
That is how you turn a browser complaint into a real technical diagnosis. Without those sign-in details, support teams tend to drift into general browser superstition instead of evidence-driven analysis.
A practical validation sequence
The shortest path to root cause is to validate the browser path in the same way Microsoft Entra evaluates it.
1. Capture the exact client context
Start with the sign-in logs and record the exact browser, operating system, and app path. Do not rely on the user's memory alone when the logs can tell you precisely what the service saw.
2. Compare the exact combination to Microsoft's matrix
Use Use conditions in Conditional Access policies as the authoritative matrix. Compare the exact browser-plus-OS pair, not a simplified approximation.
3. Validate browser session state
Confirm whether the session was private, had cookies disabled, or was otherwise operating outside the browser state Microsoft requires for device checks.
4. Use a known-good Edge baseline where appropriate
If the tenant standard allows it, test the same scenario in a fully supported Edge path. This helps distinguish "policy is broken" from "this browser path does not carry device proof correctly."
5. Only then escalate into device identity or policy design
If the same failure occurs in a supported baseline browser, move down into device registration and policy evaluation. If it only occurs in an unsupported client path, the browser path itself is the root cause.
Rollout and support design guidance
If your tenant relies on device-based Conditional Access, browser support should be documented as an identity-control requirement, not as a casual end-user preference.
The cleanest rollout model is:
- choose and publish supported browser baselines per operating system
- document that private browsing is unsupported for device-based access
- validate critical apps in report-only mode before enforcement
- teach support teams to troubleshoot browser-plus-platform, not browser name alone
This aligns much better with Microsoft's support model than "we support whatever browser the user prefers."
Key implementation points
- Browser support for device-based Conditional Access is really a device-evidence support matrix.
- User authentication and device authentication are separate capabilities of the client path.
- Private mode and disabled cookies can convert a supported browser into an unsupported device-check session.
- Sign-in logs are the primary evidence source for turning browser complaints into technical diagnoses.