Skip to content

Commit

Permalink
Clarify that Copilot access is not limited by IP allow lists (#51350)
Browse files Browse the repository at this point in the history
Co-authored-by: Jules Porter <[email protected]>
Co-authored-by: Sophie <[email protected]>
  • Loading branch information
3 people authored Jun 27, 2024
1 parent ef4c468 commit bd656ce
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,8 @@ By default, authorized users can access your enterprise's resources from any IP

{% ifversion ghec %}

{% data reusables.identity-and-permissions.ip-allow-list-copilot-exception %}

If your enterprise uses {% data variables.product.prodname_emus %} with Microsoft Entra ID (previously known as Azure AD) and OIDC, you can choose whether to use {% data variables.product.company_short %}'s IP allow list feature or to use the allow list restrictions for your identity provider (IdP). If your enterprise does not use {% data variables.product.prodname_emus %} with Azure and OIDC, you can use {% data variables.product.company_short %}'s allow list feature.

{% endif %}
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
{% data variables.product.prodname_copilot %} features that do not require directly fetching private or organizational data from {% data variables.product.prodname_dotcom %} are not restricted by IP allow lists, as the only risk from incorrect use is to {% data variables.product.prodname_dotcom %}'s own compute resources.

0 comments on commit bd656ce

Please sign in to comment.