Skip to content

Commit 9c0d384

Browse files
authored
Merge pull request #184620 from MicrosoftGuyJFlo/Note
[Azure AD] Conditional Access - Workload identity note
2 parents ffa0345 + fcc1ece commit 9c0d384

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 10/25/2021
9+
ms.date: 01/10/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -27,10 +27,11 @@ A workload identity is an identity that allows an application or service princip
2727

2828
These differences make workload identities difficult to manage, puts them at higher risk for leaks, and reduces the potential for securing access.
2929

30+
> [!IMPORTANT]
31+
> In public preview, you can scope Conditional Access policies to service principals in Azure AD with an Azure Active Directory Premium P2 edition active in your tenant. After general availability, additional licenses might be required.
32+
3033
> [!NOTE]
31-
> Policy can be applied to single tenant service principals that have been registered in your tenant.
32-
> Third party SaaS and multi-tenanted apps are out of scope.
33-
> Managed identities are not covered by policy.
34+
> Policy can be applied to single tenant service principals that have been registered in your tenant. Third party SaaS and multi-tenanted apps are out of scope. Managed identities are not covered by policy.
3435
3536
This preview enables blocking service principals from outside of trusted IP ranges, such as a corporate network public IP ranges.
3637

0 commit comments

Comments
 (0)