You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -118,7 +118,7 @@ For more information on how to set up a sample policy for Microsoft Azure Manage
118
118
> [!TIP]
119
119
> For Azure Government, you should target the Azure Government Cloud Management API application.
120
120
121
-
### Microsoft Admin Portals (preview)
121
+
### Microsoft Admin Portals
122
122
123
123
When a Conditional Access policy targets the Microsoft Admin Portals cloud app, the policy is enforced for tokens issued to application IDs of the following Microsoft administrative portals:
124
124
@@ -132,9 +132,6 @@ When a Conditional Access policy targets the Microsoft Admin Portals cloud app,
132
132
133
133
We're continually adding more administrative portals to the list.
134
134
135
-
> [!IMPORTANT]
136
-
> Microsoft Admin Portals (preview) is not currently supported in Government clouds.
137
-
138
135
> [!NOTE]
139
136
> The Microsoft Admin Portals app applies to interactive sign-ins to the listed admin portals only. Sign-ins to the underlying resources or services like Microsoft Graph or Azure Resource Manager APIs are not covered by this application. Those resources are protected by the [Microsoft Azure Management](#microsoft-azure-management) app. This enables customers to move along the MFA adoption journey for admins without impacting automation that relies on APIs and PowerShell. When you are ready, Microsoft recommends using a [policy requiring administrators perform MFA always](howto-conditional-access-policy-admin-mfa.md) for comprehensive protection.
# Common Conditional Access policy: Require multifactor authentication for admins accessing Microsoft admin portals
19
19
20
-
Microsoft recommends securing access to any Microsoft admin portals like Microsoft Entra, Microsoft 365, Exchange, and Azure. Using the [Microsoft Admin Portals (Preview)](concept-conditional-access-cloud-apps.md#microsoft-admin-portals-preview) app organizations can control interactive access to Microsoft admin portals.
21
-
22
-
> [!IMPORTANT]
23
-
> Microsoft Admin Poratls (preview) is not currently supported in Government clouds.
20
+
Microsoft recommends securing access to any Microsoft admin portals like Microsoft Entra, Microsoft 365, Exchange, and Azure. Using the [Microsoft Admin Portals](concept-conditional-access-cloud-apps.md#microsoft-admin-portals) app organizations can control interactive access to Microsoft admin portals.
@@ -53,7 +50,7 @@ Microsoft recommends securing access to any Microsoft admin portals like Microso
53
50
> Conditional Access policies support built-in roles. Conditional Access policies are not enforced for other role types including [administrative unit-scoped](../roles/admin-units-assign-roles.md) or [custom roles](../roles/custom-create.md).
54
51
55
52
1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -112,7 +112,7 @@ When a Conditional Access policy targets the Microsoft Admin Portals cloud app,
112
112
- Microsoft Intune admin center
113
113
- Microsoft Purview compliance portal
114
114
115
-
For more information, see: [Microsoft Admin Portals (preview)](../conditional-access/concept-conditional-access-cloud-apps.md#microsoft-admin-portals-preview).
115
+
For more information, see: [Microsoft Admin Portals](../conditional-access/concept-conditional-access-cloud-apps.md#microsoft-admin-portals).
0 commit comments