You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Some applications utilize non-interactive access tokens to facilitate seamless redirection between apps within the same suite or realm. When one application is onboarded to Conditional Access App Control and the other is not, session controls may not be enforced as expected. For example, if the Teams client retrieves a non-interactive token for SharePoint Online (SPO), it can initiate an active session in SPO without prompting the user for reauthentication. As a result, the session control mechanism cannot intercept or enforce policies on these sessions. To ensure consistent enforcement, it's recommended to onboard all relevant applications, such as Teams, alongside SPO.
56
56
57
+
## IPv6 limitations
58
+
Access and session policies support IPv4 only. If a request is made over IPv6, IP-based policy rules are not applied. This limitation applies when using both reverse proxy and Edge in-browser protection.
59
+
57
60
## Limitations for sessions that the reverse proxy serves
58
61
59
62
The following limitations apply only on sessions that the reverse proxy serves. Users of Microsoft Edge can benefit from in-browser protection instead of using the reverse proxy, so these limitations don't affect them.
@@ -98,6 +101,7 @@ The following table lists example results when you define the **Block upload of
98
101
99
102
The following limitations apply only on sessions that are served with Edge in-browser protection.
100
103
104
+
101
105
### Deep link is lost when user switches to Edge by clicking 'Continue in Edge'
102
106
103
107
A user who starts a session in a browser other than Edge, is prompted to switch to Edge by clicking the ‘Continue in Edge’ button.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/troubleshooting-proxy-url.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ For example, Contoso protects its environment using conditional access app contr
20
20
So even though Fabrikam doesn't actually use Defender for Cloud Apps, they see the DNS entry or certificate because Contoso does.
21
21
22
22
> [!NOTE]
23
-
> You may also see the following domains in the transparency logs:
23
+
> You might also see the following domains in the transparency logs:
24
24
>
25
25
> -`*.admin-rs-mcas.ms`
26
26
> -`*.rs-mcas.ms`
@@ -39,11 +39,12 @@ So even though Fabrikam doesn't actually use Defender for Cloud Apps, they see t
39
39
> -`*.admin-mcas-gov-df.ms`
40
40
> -`*.mcas-gov-df.ms`
41
41
42
+
42
43
## Here's why you see `*.mcas.ms`, `*.mcas-gov.us`, or `*.mcas-gov.ms` in your URL
43
44
44
45
This kind of URL is expected and indicates that your organization applies extra security controls to protect business-critical data.
45
46
46
-
They do this by using Defender for Cloud Apps, a solution for protecting your organization's cloud environment, to replace all relevant URLs and cookies relating to cloud apps that you use.
47
+
They do this by using Defender for Cloud Apps, a solution for protecting your organization's cloud environment, to replace all relevant URLs, and cookies relating to cloud apps that you use.
47
48
48
49
So when you try accessing a cloud app such as Salesforce, SharePoint Online, or AWS, you notice that its URL is suffixed with `.mcas.ms`, `.mcas-gov.us`, or `.mcas-gov.ms`. For example, when using the XYZ app, the URL you're used to seeing changes from `XYZ.com` to `XYZ.com.mcas.ms`.
49
50
@@ -52,10 +53,11 @@ If the URL doesn't exactly match one of the replacement patterns, such as `<app_
52
53
If you don't recognize the remaining portion of the URL, such as **myurl.com**.mcas.ms, as associated with any of your business apps, we recommend that you investigate the issue further and consider blocking the URL to avoid any potential security risks.
53
54
54
55
> [!NOTE]
55
-
> Microsoft Edge users benefit from in-browser protection, and are not redirected to a reverse proxy. Your URLs retain their original syntax in Microsoft Edge, even when access and sessions are protected by Defender for Cloud Apps. For more information, see [In-browser protection with Microsoft Edge for Business (Preview)](in-browser-protection.md).
56
+
> Microsoft Edge users benefit from in-browser protection, and aren't redirected to a reverse proxy. Your URLs retain their original syntax in Microsoft Edge, even when access and sessions are protected by Defender for Cloud Apps. For more information, see [In-browser protection with Microsoft Edge for Business (Preview)](in-browser-protection.md).
56
57
57
58
## Related content
58
59
60
+
-[Known limitations in Conditional Access app control](caac-known-issues.md)
59
61
-[Protect apps with Microsoft Defender for Cloud Apps Conditional Access app control](proxy-intro-aad.md)
60
62
-[Troubleshooting access and session controls for admin users](troubleshooting-proxy.md)
61
-
-[Troubleshooting access and session controls for end-users](troubleshooting-proxy-end-users.md)
63
+
-[Troubleshooting access and session controls for end-users](troubleshooting-proxy-end-users.md)
0 commit comments