Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update how-to-compliant-network.md #1204

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

sergiopozoh
Copy link

hi Ken. We need to make an adjustment here. We have this text reviewed by CELA that may require still normalization (like capitalization, use of quotes, etc.).

The changes in the product are in deployment and will be available in the next 2-3 weeks. I can tell you the exact date maybe next week. But wanted to open this ticket now so you have time.

hi Ken. We need to make an adjustment here. We have this text reviewed by CELA that may require still normalization (like capitalization, use of quotes, etc.).

The changes in the product are in deployment and will be available in the next 2-3 weeks. I can tell you the exact date maybe next week. But wanted to open this ticket now so you have time.
Copy link
Contributor

@sergiopozoh : Thanks for your contribution! The author(s) have been notified to review your proposed change.

Copy link
Contributor

Learn Build status updates of commit b7bed64:

✅ Validation status: passed

File Status Preview URL Details
docs/global-secure-access/how-to-compliant-network.md ✅Succeeded

For more details, please refer to the build report.

For any questions, please:

@Jak-MS
Copy link
Contributor

Jak-MS commented Oct 18, 2024

@kenwith
Can you review the proposed changes?

Important: When the changes are ready for publication, adding a #sign-off comment is the best way to signal that the PR is ready for the review team to merge.

#label:"aq-pr-triaged"
@MicrosoftDocs/public-repo-pr-review-team

> You can use Global Secure Access traffic profiles along with a Conditional Access policy requiring a compliant network for **All cloud apps**. There's no exclusion required when setting up a policy using the **All Compliant Network locations** location and **All cloud apps**.
>
> Authentication to Global Secure Access traffic profiles are automatically excluded from Conditional Access enforcement when a compliant network is required. This exclusion enables the Global Secure Access client to access required resources to start and authenticate the user.
> You can use Global Secure Access along with a Conditional Access policies requiring a Compliant Network for All Resources.
Copy link
Member

@kenwith kenwith Oct 18, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
> You can use Global Secure Access along with a Conditional Access policies requiring a Compliant Network for All Resources.
> Use Global Secure Access along with Conditional Access policies that require a Compliant Network for *All Resources*.

>
> Authentication to Global Secure Access traffic profiles are automatically excluded from Conditional Access enforcement when a compliant network is required. This exclusion enables the Global Secure Access client to access required resources to start and authenticate the user.
> You can use Global Secure Access along with a Conditional Access policies requiring a Compliant Network for All Resources.
> Global Secure Access resources are automatically excluded from the Conditional Access policy when Compliant Network is enabled in the policy. There's no explicit resource exclusion required. These automatic exclusions are needed to ensure that the Global Secure Access client is not blocked from accessing the required resources Global Secure Access needs:
Copy link
Member

@kenwith kenwith Oct 18, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
> Global Secure Access resources are automatically excluded from the Conditional Access policy when Compliant Network is enabled in the policy. There's no explicit resource exclusion required. These automatic exclusions are needed to ensure that the Global Secure Access client is not blocked from accessing the required resources Global Secure Access needs:
> Global Secure Access resources are automatically excluded from the Conditional Access policy when *Compliant Network* is enabled in the policy. There's no explicit resource exclusion required. These automatic exclusions are required to ensure the Global Secure Access client is not blocked from accessing the resources it needs. The resources Global Secure Access needs are:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants