Skip to content

Commit b7ce8e1

Browse files
Merge pull request #210894 from Justinha/hw-oath
update note
2 parents 89b5543 + ab6a7a9 commit b7ce8e1

File tree

2 files changed

+6
-5
lines changed

2 files changed

+6
-5
lines changed

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/07/2022
9+
ms.date: 09/12/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -59,7 +59,7 @@ Once any errors have been addressed, the administrator then can activate each ke
5959
Users may have a combination of up to five OATH hardware tokens or authenticator applications, such as the Microsoft Authenticator app, configured for use at any time. Hardware OATH tokens cannot be assigned to guest users in the resource tenant.
6060

6161
>[!IMPORTANT]
62-
>The preview is not supported in Azure Government or sovereign clouds.
62+
>The preview is only supported in Azure Global and Azure Government clouds.
6363
6464
## Next steps
6565

articles/active-directory/authentication/feature-availability.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 03/22/2022
9+
ms.date: 09/15/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -28,7 +28,7 @@ This following tables list Azure AD feature availability in Azure Government.
2828
|**Authentication, single sign-on, and MFA**|Cloud authentication (Pass-through authentication, password hash synchronization) | ✅ |
2929
|| Federated authentication (Active Directory Federation Services or federation with other identity providers) | ✅ |
3030
|| Single sign-on (SSO) unlimited | ✅ |
31-
|| Multifactor authentication (MFA) | Hardware OATH tokens are not available. Instead, use Conditional Access policies with named locations to establish when multifactor authentication should and should not be required based off the user's current IP address. Microsoft Authenticator only shows GUID and not UPN for compliance reasons. |
31+
|| Multifactor authentication (MFA) <sup>1</sup>| &#x2705; |
3232
|| Passwordless (Windows Hello for Business, Microsoft Authenticator, FIDO2 security key integrations) | &#x2705; |
3333
|| Service-level agreement | &#x2705; |
3434
|**Applications access**|SaaS apps with modern authentication (Azure AD application gallery apps, SAML, and OAUTH 2.0) | &#x2705; |
@@ -70,9 +70,10 @@ This following tables list Azure AD feature availability in Azure Government.
7070
|| Identity Protection: vulnerabilities and risky accounts | &#x2705; |
7171
|| Identity Protection: risk events investigation, SIEM connectivity | &#x2705; |
7272
|**Frontline workers**|SMS sign-in | Feature not available. |
73-
|| Shared device sign-out | Enterprise state roaming for Windows 10 devices is not available. |
73+
|| Shared device sign-out | Enterprise state roaming for Windows 10 devices isn't available. |
7474
|| Delegated user management portal (My Staff) | Feature not available. |
7575

76+
<sup>1</sup>Microsoft Authenticator only shows GUID and not UPN for compliance reasons.
7677

7778
## Identity protection
7879

0 commit comments

Comments
 (0)