Skip to content

Commit ae0e9ae

Browse files
authored
Merge pull request #192488 from MicrosoftGuyJFlo/WorkloadIdentityReportOn
[Azure AD] Conditional Access - Workload Identity update from PG
2 parents 491557a + c87c702 commit ae0e9ae

File tree

2 files changed

+7
-3
lines changed

2 files changed

+7
-3
lines changed
Loading

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 03/04/2022
9+
ms.date: 03/22/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -51,7 +51,7 @@ Create a location based Conditional Access policy that applies to service princi
5151
1. Under **Cloud apps or actions**, select **All cloud apps**. The policy will apply only when a service principal requests a token.
5252
1. Under **Conditions** > **Locations**, include **Any location** and exclude **Selected locations** where you want to allow access.
5353
1. Under **Grant**, **Block access** is the only available option. Access is blocked when a token request is made from outside the allowed range.
54-
1. Your policy can be saved in **Report-only** mode, allowing administrators to estimate the effects, or policy is enforced by turning policy **On**.
54+
1. Set **Enable policy** to **On**.
5555
1. Select **Create** to complete your policy.
5656

5757
### Create a risk-based Conditional Access policy
@@ -73,9 +73,13 @@ Create a location based Conditional Access policy that applies to service princi
7373
1. Select the levels of risk where you want this policy to trigger.
7474
1. Select **Done**.
7575
1. Under **Grant**, **Block access** is the only available option. Access is blocked when a token request is made from outside the allowed range.
76-
1. Your policy can be saved in **Report-only** mode, allowing administrators to estimate the effects, or policy is enforced by turning policy **On**.
76+
1. Set **Enable policy** to **On**.
7777
1. Select **Create** to complete your policy.
7878

79+
#### Report-only mode
80+
81+
Saving your policy in Report-only mode won't allow administrators to estimate the effects because we don't currently log this risk information in sign-in logs.
82+
7983
## Roll back
8084

8185
If you wish to roll back this feature, you can delete or disable any created policies.

0 commit comments

Comments
 (0)