Skip to content

Commit 0da821f

Browse files
[Microsoft Entra] Admin portals remove preview
Per GK
1 parent 592be47 commit 0da821f

File tree

1 file changed

+1
-4
lines changed

1 file changed

+1
-4
lines changed

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ For more information on how to set up a sample policy for Microsoft Azure Manage
118118
> [!TIP]
119119
> For Azure Government, you should target the Azure Government Cloud Management API application.
120120
121-
### Microsoft Admin Portals (preview)
121+
### Microsoft Admin Portals
122122

123123
When a Conditional Access policy targets the Microsoft Admin Portals cloud app, the policy is enforced for tokens issued to application IDs of the following Microsoft administrative portals:
124124

@@ -132,9 +132,6 @@ When a Conditional Access policy targets the Microsoft Admin Portals cloud app,
132132

133133
We're continually adding more administrative portals to the list.
134134

135-
> [!IMPORTANT]
136-
> Microsoft Admin Portals (preview) is not currently supported in Government clouds.
137-
138135
> [!NOTE]
139136
> The Microsoft Admin Portals app applies to interactive sign-ins to the listed admin portals only. Sign-ins to the underlying resources or services like Microsoft Graph or Azure Resource Manager APIs are not covered by this application. Those resources are protected by the [Microsoft Azure Management](#microsoft-azure-management) app. This enables customers to move along the MFA adoption journey for admins without impacting automation that relies on APIs and PowerShell. When you are ready, Microsoft recommends using a [policy requiring administrators perform MFA always](howto-conditional-access-policy-admin-mfa.md) for comprehensive protection.
140137

0 commit comments

Comments
 (0)