Skip to content

Commit fcc1ece

Browse files
[Azure AD] Conditional Access - Workload identity note
1 parent 52b3cd2 commit fcc1ece

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 10/25/2021
9+
ms.date: 01/10/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -27,10 +27,11 @@ A workload identity is an identity that allows an application or service princip
2727

2828
These differences make workload identities difficult to manage, puts them at higher risk for leaks, and reduces the potential for securing access.
2929

30+
> [!IMPORTANT]
31+
> In public preview, you can scope Conditional Access policies to service principals in Azure AD with an Azure Active Directory Premium P2 edition active in your tenant. After general availability, additional licenses might be required.
32+
3033
> [!NOTE]
31-
> Policy can be applied to single tenant service principals that have been registered in your tenant.
32-
> Third party SaaS and multi-tenanted apps are out of scope.
33-
> Managed identities are not covered by policy.
34+
> Policy can be applied to single tenant service principals that have been registered in your tenant. Third party SaaS and multi-tenanted apps are out of scope. Managed identities are not covered by policy.
3435
3536
This preview enables blocking service principals from outside of trusted IP ranges, such as a corporate network public IP ranges.
3637

0 commit comments

Comments
 (0)