Skip to content

Commit 8a3ea15

Browse files
authored
Update for data language change
"PII removed" cannot be edited - this is what the product literally uses.
1 parent ddc71a8 commit 8a3ea15

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory/manage-apps/tenant-restrictions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -110,14 +110,14 @@ The report may contain limited information, such as target directory ID, when a
110110

111111
Like other reports in the Azure portal, you can use filters to specify the scope of your report. You can filter on a specific time interval, user, application, client, or status. If you select the **Columns** button, you can choose to display data with any combination of the following fields:
112112

113-
- **User** - this field can have personally identifiable information removed, where it will be set to `00000000-0000-0000-0000-000000000000`.
113+
- **User** - this field can have personal data removed, where it will be set to `00000000-0000-0000-0000-000000000000`.
114114
- **Application**
115115
- **Status**
116116
- **Date**
117117
- **Date (UTC)** - where UTC is Coordinated Universal Time
118118
- **IP Address**
119119
- **Client**
120-
- **Username** - this field can have personally identifiable information removed, where it will be set to `{PII Removed}@domain.com`
120+
- **Username** - this field can have personal data removed, where it will be set to `{PII Removed}@domain.com`
121121
- **Location**
122122
- **Target tenant ID**
123123

@@ -204,7 +204,7 @@ Some organizations attempt to fix this by blocking `login.live.com` in order to
204204

205205
### Configuration for consumer apps
206206

207-
While the `Restrict-Access-To-Tenants` header functions as an allow-list, the Microsoft account (MSA) block works as a deny signal, telling the Microsoft account platform to not allow users to sign in to consumer applications. To send this signal, the `sec-Restrict-Tenant-Access-Policy` header is injected to traffic visiting `login.live.com` using the same corporate proxy or firewall as [above](#proxy-configuration-and-requirements). The value of the header must be `restrict-msa`. When the header is present and a consumer app is attempting to sign in a user directly, that sign in will be blocked.
207+
While the `Restrict-Access-To-Tenants` header functions as an allowlist, the Microsoft account (MSA) block works as a deny signal, telling the Microsoft account platform to not allow users to sign in to consumer applications. To send this signal, the `sec-Restrict-Tenant-Access-Policy` header is injected to traffic visiting `login.live.com` using the same corporate proxy or firewall as [above](#proxy-configuration-and-requirements). The value of the header must be `restrict-msa`. When the header is present and a consumer app is attempting to sign in a user directly, that sign in will be blocked.
208208

209209
At this time, authentication to consumer applications does not appear in the [admin logs](#admin-experience), as login.live.com is hosted separately from Azure AD.
210210

0 commit comments

Comments
 (0)