{"id":16333,"date":"2026-05-08T08:01:43","date_gmt":"2026-05-07T23:01:43","guid":{"rendered":"https:\/\/m365jp.net\/?p=16333"},"modified":"2026-05-08T08:07:39","modified_gmt":"2026-05-07T23:07:39","slug":"mc1303719-microsoft-entra-upcoming-changes-to-federatedtokenvalidationpolicy-default-settings","status":"publish","type":"post","link":"https:\/\/m365jp.net\/index.php\/2026-05-08-mc1303719-microsoft-entra-upcoming-changes-to-federatedtokenvalidationpolicy-default-settings","title":{"rendered":"MC1303719 | Microsoft Entra: Upcoming changes to federatedTokenValidationPolicy default settings"},"content":{"rendered":"<div class=\"postie-post\">\n<div>\n<hr>\n<table id=\"section\">\n<tbody>\n<tr>\n<th width=\"95%\">MC1303719 | Microsoft Entra: Upcoming changes to federatedTokenValidationPolicy default settings<\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr>\n<table id=\"data\">\n<tbody>\n<tr>\n<th>Classification<\/th>\n<td>planForChange<\/td>\n<\/tr>\n<tr>\n<th>Last Updated<\/th>\n<td>05\/07\/2026 22:39:10<\/td>\n<\/tr>\n<tr>\n<th>Start Time<\/th>\n<td>05\/07\/2026 22:39:04<\/td>\n<\/tr>\n<tr>\n<th>End Time<\/th>\n<td>09\/12\/2026 07:00:00<\/td>\n<\/tr>\n<tr>\n<th>Action Required By Date<\/th>\n<td>2026-08-11T07:00:00Z<\/td>\n<\/tr>\n<tr>\n<th>Message Content<\/th>\n<td>\n<p><b>[Introduction]<\/b><\/p>\n<p>To strengthen security for federated authentication, Microsoft Entra will update the default behavior of<b> federatedTokenValidationPolicy<\/b>. This policy governs how Microsoft Entra validates federated authentication tokens and determines whether sign-ins   are allowed when the <b>internalDomainFederation<\/b> does not match the user\u2019s UPN domain. Previously, enforcing this behavior required explicit tenant configuration, but it will now be applied by default to reduce the risk of unintended cross-domain sign-ins   caused by misconfigured or overly permissive federation trust relationships.<\/p>\n<p><b>[When this will happen]<\/b><\/p>\n<p><b>General Availability (Worldwide, GCC, GCCH, and DoD): <\/b>We will begin rolling out in  <b>mid-August 2026<\/b> and expect to complete by <b>mid-August 2026<\/b>.<\/p>\n<p><b>[How this affects your organization]<\/b><\/p>\n<p><i>Who is affected<\/i><\/p>\n<ul>\n<li>Microsoft 365 tenants using <b>federated authentication<\/b> in <i>Microsoft Entra<\/i><\/li>\n<li>Admins managing federated domains that were configured <b>before December 2025<\/b><\/li>\n<li>Applies only to federated domains that have an<b> internalDomainFederation<\/b> object<\/li>\n<\/ul>\n<p><i>What will happen<\/i><\/p>\n<ul>\n<li>By default, federated sign-ins will be <b>blocked <\/b>when the<b>&nbsp;internalDomainFederation<\/b> does not match the user\u2019s UPN domain.<\/li>\n<li>The<b> internalDomainFederation <\/b>object is typically created automatically during federation setup with Active Directory Federation Services (AD FS) or other identity providers (IdPs).<\/li>\n<li>This <b>stricter default behavior <\/b>of the <b>federatedTokenValidationPolicy is already enforced<\/b> for federated domains added  <b>since December 2025<\/b>.<\/li>\n<li>After this change, the same behavior will apply to <b>all existing federated domains<\/b> with an  <b><a href=\"https:\/\/learn.microsoft.com\/graph\/api\/internaldomainfederation-get?view=graph-rest-1.0&amp;tabs=http\" target=\"_blank\">internalDomainFederation<\/a><\/b> object.<\/li>\n<li>Impacted sign-ins will fail with the error:<\/li>\n<\/ul>\n<p style=\"margin-left: 75px\"><b>AADSTS5000820: Sign-in blocked by Federated Token Validation policy. Contact your administrator for details.<\/b><\/p>\n<ul>\n<li>There is <b>no change to the user experience <\/b>unless cross-domain federated sign-ins are currently occurring.<\/li>\n<\/ul>\n<p><b>[What you can do to prepare]<\/b><\/p>\n<ul>\n<li>No action is required for most organizations.<\/li>\n<li>Cross-domain federated sign-ins will be blocked automatically as part of this security improvement.<\/li>\n<li>Organizations that rely on cross-domain federated sign-ins should review their existing federation configurations before rollout.<\/li>\n<li>(<b>Strongly discouraged<\/b>) If required for business continuity, Security Administrators, Hybrid Identity Administrators, or External Identity Provider Administrators can use  <b>Microsoft Graph<\/b> to create a custom <b><a href=\"https:\/\/learn.microsoft.com\/graph\/api\/federatedtokenvalidationpolicy-get?view=graph-rest-beta&amp;tabs=http\" target=\"_blank\">federatedTokenValidationPolicy<\/a><\/b> with  <b><a href=\"https:\/\/learn.microsoft.com\/graph\/api\/resources\/validatingdomains?view=graph-rest-beta\" target=\"_blank\">rootDomains<\/a> = none<\/b> to allow cross-domain sign-ins.<\/li>\n<li>Communicate this change to identity and helpdesk teams to reduce support escalations.<\/li>\n<\/ul>\n<p><b>Learn more:<\/b><\/p>\n<ul>\n<li><a href=\"https:\/\/learn.microsoft.com\/graph\/api\/federatedtokenvalidationpolicy-get?view=graph-rest-beta&amp;tabs=http\" target=\"_blank\">Get federatedTokenValidationPolicy | Microsoft Graph | Microsoft Learn<\/a><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/graph\/api\/internaldomainfederation-get?view=graph-rest-1.0&amp;tabs=http\" target=\"_blank\">Get internalDomainFederation | Microsoft Graph | Microsoft Learn<\/a><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/graph\/graph-explorer\/graph-explorer-overview\" target=\"_blank\">Use Graph Explorer to try Microsoft Graph APIs | Microsoft Graph | Microsoft Learn<\/a><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/graph\/api\/resources\/validatingdomains?view=graph-rest-beta\" target=\"_blank\">validatingDomains resource type | Microsoft Graph | Microsoft Learn<\/a><\/li>\n<\/ul>\n<p><b>[Compliance considerations]<\/b><\/p>\n<table class=\"table table-bordered\">\n<tbody>\n<tr>\n<td><b>Question<\/b><\/td>\n<td><b>Answer<\/b><\/td>\n<\/tr>\n<tr>\n<td>Does the change include an admin control, and can it be controlled through Microsoft Entra ID group membership?<\/td>\n<td>Yes. Administrators can configure a custom <b>federatedTokenValidationPolicy<\/b> using Microsoft Graph to override the default behavior, although this is strongly discouraged due to security risks.<\/td>\n<\/tr>\n<tr>\n<td>Does the change modify, interrupt, or disable Purview capabilities such as Data Loss Prevention, Information Protection, Conditional Access, audit logging, eDiscovery, encryption, or retention policies?<\/td>\n<td>Yes. This change affects authentication enforcement behavior in Microsoft Entra, which may indirectly influence how Conditional Access policies evaluate federated sign-ins.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b><\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<th>Machine Translation<\/th>\n<td>\n<p><b>[\u306f\u3058\u3081\u306b]<\/b><\/p>\n<p>\u30d5\u30a7\u30c7\u30ec\u30fc\u30c6\u30c3\u30c9\u8a8d\u8a3c\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f37\u5316\u3059\u308b\u305f\u3081\u3001Microsoft Entra\u306f<b> federatedTokenValidationPolicy<\/b>\u306e\u30c7\u30d5\u30a9\u30eb\u30c8\u52d5\u4f5c\u3092\u66f4\u65b0\u3057\u307e\u3059\u3002\u3053\u306e\u30dd\u30ea\u30b7\u30fc\u306f\u3001Microsoft Entra\u304c\u30d5\u30a7\u30c7\u30ec\u30fc\u30c6\u30c3\u30c9\u8a8d\u8a3c\u30c8\u30fc\u30af\u30f3\u3092\u3069\u306e\u3088\u3046\u306b\u691c\u8a3c\u3059\u308b\u304b\u3092\u898f\u5b9a\u3057\u3001  <b>InternalDomainFederation<\/b> \u304c\u30e6\u30fc\u30b6\u30fc\u306eUPN\u30c9\u30e1\u30a4\u30f3\u3068\u4e00\u81f4\u3057\u306a\u3044\u5834\u5408\u306b\u30b5\u30a4\u30f3\u30a4\u30f3\u304c\u8a31\u53ef\u3055\u308c\u308b\u304b\u3069\u3046\u304b\u3092\u6c7a\u5b9a\u3057\u307e\u3059\u3002\u4ee5\u524d\u306f\u3053\u306e\u52d5\u4f5c\u3092\u5f37\u5236\u3059\u308b\u306b\u306f\u660e\u793a\u7684\u306a\u30c6\u30ca\u30f3\u30c8\u8a2d\u5b9a\u304c\u5fc5\u8981\u3067\u3057\u305f\u304c\u3001\u73fe\u5728\u306f\u30c7\u30d5\u30a9\u30eb\u30c8\u3067\u9069\u7528\u3055\u308c\u3001\u8aa4\u8a2d\u5b9a\u3084\u904e\u5ea6\u306b\u5bdb\u5bb9\u306a\u30d5\u30a7\u30c7\u30ec\u30fc\u30b7\u30e7\u30f3\u4fe1\u983c\u95a2\u4fc2\u306b\u3088\u308b\u610f\u56f3\u3057\u306a\u3044\u30c9\u30e1\u30a4\u30f3\u9593\u30b5\u30a4\u30f3\u30a4\u30f3\u306e\u30ea\u30b9\u30af\u3092\u6e1b\u3089\u3059\u3088\u3046\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<p><b>[\u3044\u3064\u8d77\u3053\u308b\u304b]<\/b><\/p>\n<p><b>\u4e00\u822c\u7a3c\u50cd\u72b6\u6cc1(\u4e16\u754c\u3001GCC\u3001GCCH\u3001\u56fd\u9632\u7dcf\u7701): <\/b><b>2026\u5e748\u6708\u4e2d\u65ec<\/b>\u304b\u3089\u5c55\u958b\u3092\u958b\u59cb\u3057\u30018<b>\u6708\u4e2d\u65ec<\/b>\u307e\u3067\u306b\u5b8c\u4e86\u3059\u308b\u4e88\u5b9a\u3067\u3059\u3002<\/p>\n<p><b>[\u3053\u308c\u304c\u3042\u306a\u305f\u306e\u7d44\u7e54\u306b\u4e0e\u3048\u308b\u5f71\u97ff]<\/b><\/p>\n<p><i>\u5f71\u97ff\u3092\u53d7\u3051\u308b\u4eba\u7269<\/i><\/p>\n<ul>\n<li><i>Microsoft Entra<\/i>\u3067<b>\u30d5\u30a7\u30c7\u30ec\u30fc\u30c6\u30c3\u30c9\u8a8d\u8a3c<\/b>\u3092\u4f7f\u7528\u3059\u308bMicrosoft 365\u30c6\u30ca\u30f3\u30c8<\/li>\n<li><b>2025\u5e7412\u6708\u4ee5\u524d<\/b>\u306b\u8a2d\u5b9a\u3055\u308c\u305f\u30d5\u30a7\u30c7\u30ec\u30fc\u30c6\u30c3\u30c9\u30c9\u30e1\u30a4\u30f3\u3092\u7ba1\u7406\u3059\u308b\u7ba1\u7406\u8005<\/li>\n<li><b>\u5185\u90e8DomainFederation<\/b>\u30aa\u30d6\u30b8\u30a7\u30af\u30c8\u3092\u6301\u3064\u30d5\u30a7\u30c7\u30ec\u30fc\u30c6\u30c3\u30c9\u30c9\u30e1\u30a4\u30f3\u306b\u306e\u307f\u9069\u7528\u3055\u308c\u307e\u3059<\/li>\n<\/ul>\n<p><i>\u4f55\u304c\u8d77\u3053\u308b\u306e\u304b<\/i><\/p>\n<ul>\n<li>\u30c7\u30d5\u30a9\u30eb\u30c8\u3067\u306f\u3001<b>internalDomainFederation\u304c&nbsp;<\/b>\u30e6\u30fc\u30b6\u30fc\u306eUPN\u30c9\u30e1\u30a4\u30f3\u3068\u4e00\u81f4\u3057\u306a\u3044\u5834\u5408\u3001\u30d5\u30a7\u30c7\u30ec\u30fc\u30c6\u30c3\u30c9\u30b5\u30a4\u30f3\u30a4\u30f3\u306f<b>\u30d6\u30ed\u30c3\u30af<\/b>\u3055\u308c\u307e\u3059\u3002<\/li>\n<li><b>internalDomainFederation<\/b>\u30aa\u30d6\u30b8\u30a7\u30af\u30c8\u306f\u901a\u5e38\u3001Active Directory Federation Services(AD FS)\u3084\u305d\u306e\u4ed6\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u30d7\u30ed\u30d0\u30a4\u30c0\u30fc(IdP)\u3068\u306e\u30d5\u30a7\u30c7\u30ec\u30fc\u30b7\u30e7\u30f3\u8a2d\u5b9a\u6642\u306b\u81ea\u52d5\u7684\u306b\u4f5c\u6210\u3055\u308c\u307e\u3059\u3002<\/li>\n<li>\u3053\u306e<b>federatedTokenValidationPolicy<\/b>\u306e<b>\u3088\u308a\u53b3\u683c\u306a\u30c7\u30d5\u30a9\u30eb\u30c8\u52d5\u4f5c<\/b>\u306f<b>\u30012025\u5e7412\u6708\u4ee5\u964d<\/b>\u306b\u8ffd\u52a0\u3055\u308c\u305f\u30d5\u30a7\u30c7\u30ec\u30fc\u30c6\u30c3\u30c9\u30c9\u30e1\u30a4\u30f3\u306b\u5bfe\u3057\u3066\u3059\u3067\u306b\u9069\u7528\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/li>\n<li>\u3053\u306e\u5909\u66f4\u5f8c\u306f\u3001<b><a href=\"https:\/\/learn.microsoft.com\/graph\/api\/internaldomainfederation-get?view=graph-rest-1.0&amp;tabs=http\" target=\"_blank\">\u5185\u90e8DomainFederation<\/a><\/b>\u30aa\u30d6\u30b8\u30a7\u30af\u30c8\u3092\u6301\u3064<b>\u3059\u3079\u3066\u306e\u65e2\u5b58\u306e\u30d5\u30a7\u30c7\u30ec\u30fc\u30c6\u30c3\u30c9\u30c9\u30e1\u30a4\u30f3<\/b>\u306b\u540c\u3058\u52d5\u4f5c\u304c\u9069\u7528\u3055\u308c\u307e\u3059\u3002<\/li>\n<li>\u5f71\u97ff\u3092\u53d7\u3051\u305f\u30b5\u30a4\u30f3\u30a4\u30f3\u306f\u4ee5\u4e0b\u306e\u30a8\u30e9\u30fc\u3067\u5931\u6557\u3057\u307e\u3059:<\/li>\n<\/ul>\n<p style=\"margin-left: 75px\"><b>AADSTS5000820:Federated Token Validation\u30dd\u30ea\u30b7\u30fc\u306b\u3088\u3063\u3066\u30b5\u30a4\u30f3\u30a4\u30f3\u304c\u30d6\u30ed\u30c3\u30af\u3055\u308c\u307e\u3057\u305f\u3002\u8a73\u7d30\u306f\u7ba1\u7406\u8005\u306b\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<\/b><\/p>\n<ul>\n<li>\u73fe\u5728\u3001\u30af\u30ed\u30b9\u30c9\u30e1\u30a4\u30f3\u306e\u30d5\u30a7\u30c7\u30ec\u30fc\u30c6\u30c3\u30c9\u30b5\u30a4\u30f3\u30a4\u30f3\u304c\u884c\u308f\u308c\u3066\u3044\u306a\u3044\u9650\u308a\u3001 <b>\u30e6\u30fc\u30b6\u30fc\u4f53\u9a13\u306b\u5909\u5316 <\/b>\u306f\u3042\u308a\u307e\u305b\u3093\u3002<\/li>\n<\/ul>\n<p><b>\u3010\u6e96\u5099\u306e\u305f\u3081\u306b\u3067\u304d\u308b\u3053\u3068\u3011<\/b><\/p>\n<ul>\n<li>\u307b\u3068\u3093\u3069\u306e\u7d44\u7e54\u3067\u306f\u3001\u4f55\u3089\u304b\u306e\u884c\u52d5\u306f\u5fc5\u8981\u3042\u308a\u307e\u305b\u3093\u3002<\/li>\n<li>\u3053\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6539\u5584\u306e\u4e00\u74b0\u3068\u3057\u3066\u3001\u30c9\u30e1\u30a4\u30f3\u9593\u306e\u30d5\u30a7\u30c7\u30ec\u30fc\u30c6\u30c3\u30c9\u30b5\u30a4\u30f3\u30a4\u30f3\u306f\u81ea\u52d5\u7684\u306b\u30d6\u30ed\u30c3\u30af\u3055\u308c\u307e\u3059\u3002<\/li>\n<li>\u30af\u30ed\u30b9\u30c9\u30e1\u30a4\u30f3\u306e\u30d5\u30a7\u30c7\u30ec\u30fc\u30c6\u30c3\u30c9\u30b5\u30a4\u30f3\u30a4\u30f3\u306b\u4f9d\u5b58\u3059\u308b\u7d44\u7e54\u306f\u3001\u5c55\u958b\u524d\u306b\u65e2\u5b58\u306e\u30d5\u30a7\u30c7\u30ec\u30fc\u30b7\u30e7\u30f3\u69cb\u6210\u3092\u898b\u76f4\u3059\u3079\u304d\u3067\u3059\u3002<\/li>\n<li>(<b>\u5f37\u304f\u53cd\u5bfe)<\/b>\u696d\u52d9\u7d99\u7d9a\u306e\u305f\u3081\u306b\u5fc5\u8981\u306a\u5834\u5408\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\u8005\u3001\u30cf\u30a4\u30d6\u30ea\u30c3\u30c9\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u7ba1\u7406\u8005\u3001\u307e\u305f\u306f\u5916\u90e8\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u30d7\u30ed\u30d0\u30a4\u30c0\u30fc\u7ba1\u7406\u8005\u306f\u3001<b>Microsoft Graph<\/b>\u3092\u4f7f\u3063\u3066<b><a href=\"https:\/\/learn.microsoft.com\/graph\/api\/resources\/validatingdomains?view=graph-rest-beta\" target=\"_blank\">rootDomains<\/a> = none<\/b>\u306e\u30ab\u30b9\u30bf\u30e0<b><a href=\"https:\/\/learn.microsoft.com\/graph\/api\/federatedtokenvalidationpolicy-get?view=graph-rest-beta&amp;tabs=http\" target=\"_blank\">federatedTokenValidationPolicy<\/a><\/b>\u3092\u4f5c\u6210\u3057\u3001\u30af\u30ed\u30b9\u30c9\u30e1\u30a4\u30f3\u30b5\u30a4\u30f3\u30a4\u30f3\u3092\u53ef\u80fd\u306b\u3057\u307e\u3059\u3002<\/li>\n<li>\u3053\u306e\u5909\u66f4\u3092\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u304a\u3088\u3073\u30d8\u30eb\u30d7\u30c7\u30b9\u30af\u30c1\u30fc\u30e0\u306b\u4f1d\u3048\u3001\u30b5\u30dd\u30fc\u30c8\u306e\u30a8\u30b9\u30ab\u30ec\u30fc\u30b7\u30e7\u30f3\u3092\u6e1b\u3089\u3057\u307e\u3057\u3087\u3046\u3002<\/li>\n<\/ul>\n<p><b>\u8a73\u3057\u304f\u306f\u3053\u3061\u3089:<\/b><\/p>\n<ul>\n<li><a href=\"https:\/\/learn.microsoft.com\/graph\/api\/federatedtokenvalidationpolicy-get?view=graph-rest-beta&amp;tabs=http\" target=\"_blank\">federatedTokenValidationPolicy \u53d6\u5f97 |Microsoft Graph |Microsoft Learn<\/a><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/graph\/api\/internaldomainfederation-get?view=graph-rest-1.0&amp;tabs=http\" target=\"_blank\">internalDomainFederation |Microsoft Graph |Microsoft Learn<\/a><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/graph\/graph-explorer\/graph-explorer-overview\" target=\"_blank\">\u30b0\u30e9\u30d5\u30a8\u30af\u30b9\u30d7\u30ed\u30fc\u30e9\u30fc\u3092\u4f7f\u3063\u3066Microsoft Graph API\u3092\u8a66\u3059 |Microsoft Graph |Microsoft Learn<\/a><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/graph\/api\/resources\/validatingdomains?view=graph-rest-beta\" target=\"_blank\">validatingDomains \u30ea\u30bd\u30fc\u30b9\u30bf\u30a4\u30d7 |Microsoft Graph |Microsoft Learn<\/a><\/li>\n<\/ul>\n<p><b>[\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u306e\u8003\u616e\u4e8b\u9805]<\/b><\/p>\n<table class=\"table table-bordered\">\n<tbody>\n<tr>\n<td><b>\u8cea\u554f<\/b><\/td>\n<td><b>\u56de\u7b54<\/b><\/td>\n<\/tr>\n<tr>\n<td>\u5909\u66f4\u306b\u306f\u7ba1\u7406\u8005\u6a29\u9650\u3082\u542b\u307e\u308c\u307e\u3059\u304b?\u307e\u305f\u3001Microsoft Entra ID\u306e\u30b0\u30eb\u30fc\u30d7\u30e1\u30f3\u30d0\u30fc\u30b7\u30c3\u30d7\u3092\u901a\u3058\u3066\u7ba1\u7406\u3067\u304d\u307e\u3059\u304b?<\/td>\n<td>\u306f\u3044\u3002\u7ba1\u7406\u8005\u306fMicrosoft Graph\u3092\u4f7f\u3063\u3066\u30ab\u30b9\u30bf\u30e0 <b>FederatedTokenValidationPolicy<\/b> \u3092\u8a2d\u5b9a\u3057\u3001\u30c7\u30d5\u30a9\u30eb\u30c8\u306e\u52d5\u4f5c\u3092\u4e0a\u66f8\u304d\u3067\u304d\u307e\u3059\u304c\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306e\u305f\u3081\u5f37\u304f\u63a8\u5968\u3055\u308c\u307e\u305b\u3093\u3002<\/td>\n<\/tr>\n<tr>\n<td>\u3053\u306e\u5909\u66f4\u306b\u3088\u308a\u3001\u30c7\u30fc\u30bf\u640d\u5931\u9632\u6b62\u3001\u60c5\u5831\u4fdd\u8b77\u3001\u6761\u4ef6\u4ed8\u304d\u30a2\u30af\u30bb\u30b9\u3001\u76e3\u67fb\u30ed\u30b0\u3001e\u30c7\u30a3\u30b9\u30ab\u30d0\u30ea\u30fc\u3001\u6697\u53f7\u5316\u3001\u4fdd\u6301\u30dd\u30ea\u30b7\u30fc\u306a\u3069\u306ePurview\u6a5f\u80fd\u304c\u5909\u66f4\u3001\u4e2d\u65ad\u3001\u7121\u52b9\u5316\u3055\u308c\u307e\u3059\u304b?<\/td>\n<td>\u306f\u3044\u3002\u3053\u306e\u5909\u66f4\u306fMicrosoft Entra\u306b\u304a\u3051\u308b\u8a8d\u8a3c\u5f37\u5236\u306e\u52d5\u4f5c\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u3001\u9593\u63a5\u7684\u306b\u6761\u4ef6\u4ed8\u304d\u30a2\u30af\u30bb\u30b9\u30dd\u30ea\u30b7\u30fc\u304c\u30d5\u30a7\u30c7\u30ec\u30fc\u30c6\u30c3\u30c9\u30b5\u30a4\u30f3\u30a4\u30f3\u3092\u8a55\u4fa1\u3059\u308b\u65b9\u6cd5\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b><\/b><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>MC1303719 | Microsoft Entra: Upcoming changes to federatedTokenValidationPolicy default settings Classificatio [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16333","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/16333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/comments?post=16333"}],"version-history":[{"count":0,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/16333\/revisions"}],"wp:attachment":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/media?parent=16333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/categories?post=16333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/tags?post=16333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}