You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Visual Studio subscriptions administrator portal
115
+
When Conditional Access policy is targeted to the Microsoft Azure Management application, within the Conditional Access policy app picker, policy will be enforced for tokens issued to application IDs of a set of services closely bound to the portal.
116
+
117
+
- Azure Resource Manager (ARM API)
118
+
- Azure Portal, which also covers the Microsoft Entra admin center
119
+
- Azure Data Lake
120
+
- Application Insights API
121
+
- Log Analytics API
122
+
123
+
Because the policy is applied to the Azure management portal and API, services, or clients with an Azure API service dependency, can indirectly be impacted. For example:
- Visual Studio subscriptions administrator portal
131
136
132
137
> [!NOTE]
133
138
> The Microsoft Azure Management application applies to [Azure PowerShell](/powershell/azure/what-is-azure-powershell), which calls the [Azure Resource Manager API](../../azure-resource-manager/management/overview.md). It does not apply to [Azure AD PowerShell](/powershell/azure/active-directory/overview), which calls the [Microsoft Graph API](/graph/overview).
134
139
135
140
For more information on how to set up a sample policy for Microsoft Azure Management, see [Conditional Access: Require MFA for Azure management](howto-conditional-access-policy-azure-management.md).
136
141
137
-
>[!NOTE]
138
-
>For Azure Government, you should target the Azure Government Cloud Management API application.
142
+
>[!TIP]
143
+
>For Azure Government, you should target the Azure Government Cloud Management API application.
0 commit comments