You can configure conditions based on device trust status, user group, geographic location (IP geolocation), time-based access windows, and whether the login request is coming from a managed or unmanaged device.