Skip to content

Commit bcf3d25

Browse files
Merge pull request #254013 from MicrosoftGuyJFlo/patch-74
[Microsoft Entra] Admin portals remove preview
2 parents ac35fe3 + 6f5ba11 commit bcf3d25

File tree

3 files changed

+4
-10
lines changed

3 files changed

+4
-10
lines changed

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ For more information on how to set up a sample policy for Microsoft Azure Manage
118118
> [!TIP]
119119
> For Azure Government, you should target the Azure Government Cloud Management API application.
120120
121-
### Microsoft Admin Portals (preview)
121+
### Microsoft Admin Portals
122122

123123
When a Conditional Access policy targets the Microsoft Admin Portals cloud app, the policy is enforced for tokens issued to application IDs of the following Microsoft administrative portals:
124124

@@ -132,9 +132,6 @@ When a Conditional Access policy targets the Microsoft Admin Portals cloud app,
132132

133133
We're continually adding more administrative portals to the list.
134134

135-
> [!IMPORTANT]
136-
> Microsoft Admin Portals (preview) is not currently supported in Government clouds.
137-
138135
> [!NOTE]
139136
> The Microsoft Admin Portals app applies to interactive sign-ins to the listed admin portals only. Sign-ins to the underlying resources or services like Microsoft Graph or Azure Resource Manager APIs are not covered by this application. Those resources are protected by the [Microsoft Azure Management](#microsoft-azure-management) app. This enables customers to move along the MFA adoption journey for admins without impacting automation that relies on APIs and PowerShell. When you are ready, Microsoft recommends using a [policy requiring administrators perform MFA always](howto-conditional-access-policy-admin-mfa.md) for comprehensive protection.
140137

articles/active-directory/conditional-access/how-to-policy-mfa-admin-portals.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Common Conditional Access policy: Require multifactor authentication for admins accessing Microsoft admin portals
1919

20-
Microsoft recommends securing access to any Microsoft admin portals like Microsoft Entra, Microsoft 365, Exchange, and Azure. Using the [Microsoft Admin Portals (Preview)](concept-conditional-access-cloud-apps.md#microsoft-admin-portals-preview) app organizations can control interactive access to Microsoft admin portals.
21-
22-
> [!IMPORTANT]
23-
> Microsoft Admin Poratls (preview) is not currently supported in Government clouds.
20+
Microsoft recommends securing access to any Microsoft admin portals like Microsoft Entra, Microsoft 365, Exchange, and Azure. Using the [Microsoft Admin Portals](concept-conditional-access-cloud-apps.md#microsoft-admin-portals) app organizations can control interactive access to Microsoft admin portals.
2421

2522
## User exclusions
2623
[!INCLUDE [active-directory-policy-exclusions](../../../includes/active-directory-policy-exclude-user.md)]
@@ -53,7 +50,7 @@ Microsoft recommends securing access to any Microsoft admin portals like Microso
5350
> Conditional Access policies support built-in roles. Conditional Access policies are not enforced for other role types including [administrative unit-scoped](../roles/admin-units-assign-roles.md) or [custom roles](../roles/custom-create.md).
5451
5552
1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
56-
1. Under **Target resources** > **Cloud apps** > **Include**, **Select apps**, select **Microsoft Admin Portals (Preview)**.
53+
1. Under **Target resources** > **Cloud apps** > **Include**, **Select apps**, select **Microsoft Admin Portals**.
5754
1. Under **Access controls** > **Grant**, select **Grant access**, **Require authentication strength**, select **Multifactor authentication**, then select **Select**.
5855
1. Confirm your settings and set **Enable policy** to **Report-only**.
5956
1. Select **Create** to create to enable your policy.

articles/active-directory/fundamentals/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ When a Conditional Access policy targets the Microsoft Admin Portals cloud app,
112112
- Microsoft Intune admin center
113113
- Microsoft Purview compliance portal
114114

115-
For more information, see: [Microsoft Admin Portals (preview)](../conditional-access/concept-conditional-access-cloud-apps.md#microsoft-admin-portals-preview).
115+
For more information, see: [Microsoft Admin Portals](../conditional-access/concept-conditional-access-cloud-apps.md#microsoft-admin-portals).
116116

117117
---
118118

0 commit comments

Comments
 (0)