Skip to content

Commit 848fbad

Browse files
Merge pull request #12187 from MicrosoftDocs/main
Auto Publish – main to live - 2026-03-24 22:10 UTC
2 parents e6a11f6 + a74cbe4 commit 848fbad

13 files changed

+42
-31
lines changed

docs/external-id/tenant-restrictions-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -682,7 +682,7 @@ Use Microsoft Graph to get policy information.
682682

683683
- TRv2 does not enforce restrictions on cross-cloud requests at the authentication plane, so access is permitted during authentication. However, TRv2 does block cross-cloud requests at the data plane. As a result, when using Windows Group Policy (GPO), users will be unable to access TRv2-enlightened resources across cloud boundaries.
684684

685-
- Tenant restrictions v2 doesn't work with the [macOS Platform SSO](~/identity/devices/troubleshoot-macos-platform-single-sign-on-extension.md) feature with client signaling via corporate proxy. Customers who use tenant restrictions v2 and Platform SSO should use universal tenant restrictions v2 with Global Secure Access client signaling. This is an Apple limitation in which Platform SSO is not compatible with tenant restrictions when an intermediary network solution injects headers. An example of such a solution is a proxy that uses a certificate trust chain outside Apple system root certificates.
685+
- Tenant restrictions v2 doesn't work with the [macOS Platform SSO](~/identity/devices/troubleshoot-macos-platform-single-sign-on-extension.md) feature with client signaling via corporate proxy if the corporate proxy uses a certificate trust chain outside Apple system root certificates. This is an Apple limitation in which Platform SSO is not compatible with tenant restrictions when an intermediary network solution injects headers using untrusted certificates. Apple does not support customers adding their own PKI certificates to the Apple system trusted root certificates store. Customers who use tenant restrictions v2 and Platform SSO should use universal tenant restrictions v2 with Global Secure Access client signaling which uses a certificate trusted by Apple systems.
686686

687687
- When TRv2 is enabled, accessing the Microsoft Entra admin center may result in an "Access denied" error. To resolve this issue, append the following feature flags to the Microsoft Entra admin center URL: `?feature.msaljs=true&exp.msaljsexp=true`. If you're accessing the admin center for a partner tenant (e.g., Fabrikam) and encounter the error at `https://entra.microsoft.com/`, update the URL as follows: `https://entra.microsoft.com/?feature.msaljs=true&exp.msaljsexp=true#home`. This will enable the necessary flags and restore access.
688688

docs/global-secure-access/concept-transport-layer-security.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ description: "This article provides an overview of the Transport Layer Security
44
author: HULKsmashGithub
55
ms.author: jayrusso
66
ms.topic: concept-article
7-
ms.date: 05/28/2025
7+
ms.date: 03/23/2026
8+
ms.reviewer: teresayao
89

910
#customer intent: As a Global Secure Access administrator, I want to learn about the Transport Layer Security (TLS) protocol to support the creation of TLS inspection policies.
1011

@@ -37,7 +38,7 @@ Traffic logs include four TLS-related metadata fields that help you understand h
3738
To get started with TLS inspection, see [Configure Transport Layer Security Policies](how-to-transport-layer-security.md).
3839

3940
## Supported ciphers
40-
| List of supported ciphers |
41+
|List of supported ciphers |
4142
|-------------------|
4243
|ECDHE-ECDSA-AES128-GCM-SHA256|
4344
|ECDHE-ECDSA-CHACHA20-POLY1305|

docs/global-secure-access/how-to-ai-prompt-injection-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Protect enterprise generative AI apps with prompt injection protection (preview)
33
description: "Protect your enterprise generative AI apps from prompt injection attacks with Microsoft's AI Gateway prompt injection protection."
44
ms.topic: how-to
5-
ms.date: 03/18/2026
5+
ms.date: 03/24/2026
66
ms.author: jayrusso
77
author: HULKsmashGithub
88
ms.reviewer: KaTabish
@@ -113,7 +113,7 @@ You can protect any custom JSON-based LLM or GenAI app by configuring a custom t
113113
## Known limitations
114114

115115
- Prompt Injection Protection currently supports only text prompts. It doesn't support files.
116-
- Prompt Injection Protection supports only JSON-based generative AI apps. It doesn't support apps that use URL-based encoding, like Gemini.
116+
- Prompt Injection Protection supports only JSON-based generative AI apps.
117117
- Prompt Injection Protection supports prompts up to 10,000 characters. Anything longer is truncated.
118118

119119
## Related content

docs/global-secure-access/how-to-create-remote-network-custom-ike-policy.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to set up the bidirectional communication tunnel between
44
ms.author: jayrusso
55
author: HULKsmashGithub
66
ms.topic: how-to
7-
ms.date: 02/25/2025
7+
ms.date: 03/23/2026
88
ms.reviewer: absinh
99
ms.custom: sfi-image-nochange
1010
# Customer intent: As an IT admin, I need to be able to create a custom Internet Key Exchange (IKE) policy to set up the communication tunnel with Global Secure Access.
@@ -29,7 +29,7 @@ If you prefer to add custom IKE policy details to your remote network, you can d
2929

3030
To create a remote network with a custom IKE policy in the Microsoft Entra admin center:
3131

32-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator).
32+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/entra/identity/role-based-access-control/permissions-reference#global-secure-access-administrator).
3333

3434
1. Browse to **Global Secure Access** > **Connect** > **Remote networks**.
3535

@@ -63,7 +63,7 @@ There are several details to enter on the General tab. Pay close attention to th
6363
- This address is entered as the *peer* BGP​​ IP address on your CPE.
6464
- Refer to the [valid BGP addresses](reference-remote-network-configurations.md#valid-bgp-addresses) list for reserved values that can't be used.
6565

66-
1. Select the **Next**.
66+
1. Select **Next**.
6767

6868
### Add a link - Details tab
6969

@@ -97,13 +97,16 @@ There are several details to enter on the General tab. Pay close attention to th
9797

9898
Remote networks with a custom IKE policy can be created using Microsoft Graph on the `/beta` endpoint.
9999

100+
> [!IMPORTANT]
101+
> APIs under the `/beta` version in Microsoft Graph are subject to change. Use of these APIs in production applications is not supported. For details, see [Microsoft Graph versioning and support](/graph/versioning-and-support).
102+
100103
1. Sign in to [Graph Explorer](https://aka.ms/ge).
101104
1. Select **POST** as the HTTP method from the dropdown.
102105
1. Set the API version to **beta**.
103106
1. Add the following query, then select **Run query**.
104107

105108
```http
106-
POST https://graph.microsoft.com/beta/networkAccess/connectivity/remoteNetworks/dc6a7efd-6b2b-4c6a-84e7-5dcf97e62e04/deviceLinks
109+
POST https://graph.microsoft.com/beta/networkAccess/connectivity/remoteNetworks/{remoteNetworkId}/deviceLinks
107110
Content-Type: application/json
108111
109112
{

docs/global-secure-access/how-to-create-remote-network-vwan.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Simulate remote network connectivity using Azure vWAN
33
description: Use Global Secure Access to configure Azure and Microsoft Entra resources to create a virtual wide area network to connect to your resources in Azure.
44
ms.topic: how-to
5-
ms.date: 02/25/2025
5+
ms.date: 03/23/2026
66
ms.author: jayrusso
77
author: HULKsmashGithub
88
ms.reviewer: absinh
@@ -19,7 +19,7 @@ To complete the steps in this process, you must have the following prerequisites
1919
- An Azure subscription and permission to create resources in the [Azure portal](https://portal.azure.com).
2020
- A basic understanding of virtual wide area networks (vWAN).
2121
- A basic understanding of [site-to-site VPN connections](/azure/vpn-gateway/tutorial-site-to-site-portal).
22-
- A Microsoft Entra tenant with the [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator) role assigned.
22+
- A Microsoft Entra tenant with the [Global Secure Access Administrator](/entra/identity/role-based-access-control/permissions-reference#global-secure-access-administrator) role assigned.
2323
- A basic understanding of Azure virtual desktops or Azure virtual machines.
2424

2525
This document uses the following example values, along with the values in the images and steps. Feel free to configure these settings according to your own requirements.

docs/global-secure-access/how-to-manage-remote-network-device-links.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to add and delete customer premises equipment device link
44
ms.author: jayrusso
55
author: HULKsmashGithub
66
ms.topic: how-to
7-
ms.date: 02/25/2025
7+
ms.date: 03/23/2026
88
ms.reviewer: absinh
99
ms.custom: sfi-image-nochange
1010
# Customer intent: As an IT admin, I need to manage the router devices that connect to the Global Secure Access service so my customers can connect to the service.
@@ -83,6 +83,9 @@ The **Details** tab is where you establish the bidirectional communication chann
8383

8484
Remote networks with a custom IKE policy can be created using Microsoft Graph on the `/beta` endpoint.
8585

86+
> [!IMPORTANT]
87+
> APIs under the `/beta` version in Microsoft Graph are subject to change. Use of these APIs in production applications is not supported. For details, see [Microsoft Graph versioning and support](/graph/versioning-and-support).
88+
8689
1. Sign in to [Graph Explorer](https://aka.ms/ge).
8790
1. Select `POST` as the HTTP method from the dropdown.
8891
1. Set the API version to beta.
@@ -117,7 +120,7 @@ Sample response:
117120
},
118121
"tunnelConfiguration": {
119122
"@odata.type": "#microsoft.graph.networkaccess.tunnelConfigurationIKEv2Default",
120-
"preSharedKey": "test123"
123+
"preSharedKey": "<your-preshared-key>"
121124
}
122125
}
123126
```
@@ -130,7 +133,7 @@ You can delete device links through the Microsoft Entra admin center and using t
130133

131134
### [Microsoft Entra admin center](#tab/microsoft-entra-admin-center)
132135

133-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator).
136+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/entra/identity/role-based-access-control/permissions-reference#global-secure-access-administrator).
134137

135138
1. Browse to **Global Secure Access** > **Connect** > **Remote networks**. Device links appear in the **Links** column on the list of remote networks.
136139

docs/global-secure-access/reference-china-user-support.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
11
---
2-
title: Global Secure Access Support in China (Preview)
2+
title: Global Secure Access support in China
33
description: Learn about how Microsoft is dedicated to supporting Global Secure Access capabilities in China.
44
ms.author: jayrusso
55
author: HULKsmashGithub
66
ms.topic: reference
7-
ms.date: 05/20/2025
7+
ms.service: global-secure-access
8+
ms.date: 03/09/2026
89
ms.reviewer: sumeetmittal
910

1011
# Customer intent: As an IT admin, I want to evaluate the regulatory constraints of using Global Secure Access in China so that I can ensure compliance and plan connectivity strategies effectively.

docs/global-secure-access/reference-ciphers.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ description: Learn about the supported cryptographic algorithms, or ciphers, use
44
ms.author: jayrusso
55
author: HULKsmashGithub
66
ms.topic: reference
7-
ms.date: 02/18/2025
7+
ms.service: global-secure-access
8+
ms.date: 03/09/2026
89
ms.reviewer: sumeetmittal
910

1011

docs/global-secure-access/reference-global-secure-access-certifications.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ description: Global Secure Access maintains a compliance portfolio. This article
44
ms.author: jayrusso
55
author: HULKsmashGithub
66
ms.topic: reference
7-
ms.date: 05/29/2025
7+
ms.service: global-secure-access
8+
ms.date: 03/24/2026
89
ms.reviewer: abhijeetsinha
910

1011
#customer intent: As an IT admin, I want to know which certifications Global Secure Access supports so that I can ensure compliance with industry standards.
@@ -28,8 +29,8 @@ Global Secure Access is included in several Azure compliance audits. The support
2829
| GxP (FDA 21 CFR Part 11) | Azure can help customers meet their requirements under Good Clinical, Laboratory, and Manufacturing Practices (GxP), as well as regulations enforced by the US Food and Drug Administration (FDA) under 21 CFR Part 11. For more information, see [GxP (FDA 21 CFR Part 11)](/azure/compliance/offerings/offering-gxp). | ISO 27001:2013 |
2930
| HDS (France) | Microsoft Azure has the Health Data Hosting (Hébergeurs de Données de Santé, HDS) certification, which is required for all entities that host personal health data governed by French law. Microsoft is the first major cloud service provider to meet the strict French standards for storing and processing health data. For more information, see [Health Data Hosting (HDS) France](/compliance/regulatory/offering-hds-france). | ISO 27001:2013 |
3031
| HIPAA BAA (US) | The Health Insurance Portability and Accountability Act (HIPAA) is a US law that establishes requirements for the use, disclosure, and safeguarding of protected health information (PHI). It applies to covered entities—doctors' offices, hospitals, health insurers, and other healthcare companies—with access to PHI, and to business associates, such as cloud service providers, that process PHI on their behalf. For more information, see [HIPAA (US)](/azure/compliance/offerings/offering-hipaa-us). | NA |
31-
| ISO 20000-1:2011 | ISO 20000-1:2011 is an international standard for IT service management that defines requirements for the development, implementation, monitoring, maintenance, and improvement of an IT service management system. For more information, see [ISO/IEC 20000-1:2018](/azure/compliance/offerings/offering-iso-20000-1). | ISO 27001:2013 |
32-
| ISO 22301:2012 | ISO 22301:2012 is the premium international standard for business continuity management that provides for a formal certification. For more information, see [ISO 22301:2019](/azure/compliance/offerings/offering-iso-22301). | ISO 27001:2013 |
32+
| ISO 20000-1:2018 | ISO 20000-1:2018 is an international standard for IT service management that defines requirements for the development, implementation, monitoring, maintenance, and improvement of an IT service management system. For more information, see [ISO/IEC 20000-1:2018](/azure/compliance/offerings/offering-iso-20000-1). | ISO 27001:2013 |
33+
| ISO 22301:2019 | ISO 22301:2019 is the premium international standard for business continuity management that provides for a formal certification. For more information, see [ISO 22301:2019](/azure/compliance/offerings/offering-iso-22301). | ISO 27001:2013 |
3334
| ISO 27001:2013 | The ISO 27000 family of standards gives a framework for policies and procedures that include all legal, physical, and technical controls in Microsoft Azure Compliance Offerings for an organization's information risk management. ISO 27001 lists the requirements for implementing, maintaining, monitoring, and improving an information security management system (ISMS). For more information, see [ISO 27001:2013](/azure/compliance/offerings/offering-iso-27001). | NA |
3435
| ISO 27017:2015 | The ISO 27017 code of practice is designed for organizations to use as a reference for selecting cloud services information security controls when implementing a cloud computing information security management system based on ISO 27002. Cloud service providers can also use ISO 27017 as a guidance document for implementing commonly accepted protection controls. For more information, see [ISO/IEC 27017:2015](/azure/compliance/offerings/offering-iso-27017). | ISO 27001:2013 |
3536
| ISO 27018:2019 | ISO 27018 is the first international code of practice for cloud privacy that provides guidelines based on ISO 27002 guidelines and best practices for information security management. Based on EU data-protection laws, it gives specific guidance to cloud service providers acting as processors of personally identifiable information (PII) on assessing risks and implementing state-of-the-art controls for protecting PII. ISO 27018 establishes cloud-specific control objectives and guidelines for PII in accordance with the privacy principles in ISO 29100. For more information, see [ISO/IEC 27018:2019](/azure/compliance/offerings/offering-iso-27018). | ISO 27001:2013 |
@@ -45,7 +46,7 @@ Global Secure Access is included in several Azure compliance audits. The support
4546
| SOC 3 | A SOC 3 report is a short, public version of the SOC 2 Type 2 attestation report. The SOC 3 report is for users who want assurance about the cloud service provider's controls but don't need a full SOC 2 report. For more information, see [System and Organization Controls (SOC) 3](/azure/compliance/offerings/offering-soc-3). | NA |
4647
| UK Cyber Essentials Plus | Cyber Essentials is a UK government-backed scheme that helps organizations check and reduce risks from common cybersecurity threats to their IT systems. Cyber Essentials is required for all UK government suppliers that handle personal data. For more information, see [UK Cyber Essentials Plus](/azure/compliance/offerings/offering-uk-cyber-essentials-plus). | ISO 27001:2013 |
4748
| UK G-Cloud | Government Cloud (G-Cloud) is a UK government initiative to ease procurement of cloud services by government departments and promote government-wide adoption of cloud computing. G-Cloud comprises a series of framework agreements with cloud services suppliers (such as Microsoft), and a listing of their services in an online store—the Digital Marketplace. This approach enables public-sector organizations to compare and procure cloud services without having to do their own full review process. For more information, see [UK G-Cloud](/azure/compliance/offerings/offering-uk-g-cloud). | ISO 27001:2013 |
48-
| WCAG 2.0 | The Web Content Accessibility Guidelines 2.0 (WCAG 2.0) provide a framework for developing web content that improves accessibility for people with disabilities, and users of devices with limited graphical abilities. For more information, see [Web Content Accessibility Guidelines](/compliance/regulatory/offering-wcag-2-1). | ISO 27001:2013 |
49+
| WCAG | The Web Content Accessibility Guidelines (WCAG) provide a framework for developing web content that improves accessibility for people with disabilities, and users of devices with limited graphical abilities. For more information, see [Web Content Accessibility Guidelines](/compliance/regulatory/offering-wcag-2-1). | ISO 27001:2013 |
4950

5051
## Related content
5152
[Service Trust Portal](https://servicetrust.microsoft.com/)

0 commit comments

Comments
 (0)