You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/location-condition.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ Named locations defined by IPv4/IPv6 address ranges are subject to the following
44
44
- Configure up to 195 named locations
45
45
- Configure up to 2000 IP ranges per named location
46
46
- Both IPv4 and IPv6 ranges are supported
47
-
- Private IP ranges connot be configured
47
+
- Private IP ranges cannot be configured
48
48
- The number of IP addresses contained in a range is limited. Only CIDR masks greater than /8 are allowed when defining an IP range.
49
49
50
50
### Trusted locations
@@ -53,7 +53,7 @@ Administrators can designate named locations defined by IP address ranges to be
53
53
54
54

55
55
56
-
Sign-ins from trusted named locations improve the accuracy of Azure AD Identity Protection's risk calculation, lowering a users' sign-in risk when they authenticate from a location marked as trusted. Additionally, trusted named locations can be targeted in Conditional Access policies. For example, you may require restrict multi-factor authentication registration to trusted named locations only.
56
+
Sign-ins from trusted named locations improve the accuracy of Azure AD Identity Protection's risk calculation, lowering a user's sign-in risk when they authenticate from a location marked as trusted. Additionally, trusted named locations can be targeted in Conditional Access policies. For example, you may require restrict multi-factor authentication registration to trusted named locations only.
57
57
58
58
### Countries and regions
59
59
@@ -72,13 +72,13 @@ Some IP addresses are not mapped to a specific country or region, including all
72
72
73
73
You can also configure IP address ranges representing your organization's local intranet in the [multi-factor authentication service settings](https://account.activedirectory.windowsazure.com/usermanagement/mfasettings.aspx). This feature enables you to configure up to 50 IP address ranges. The IP address ranges are in CIDR format. For more information, see [Trusted IPs](../authentication/howto-mfa-mfasettings.md#trusted-ips).
74
74
75
-
If you have Trusted IPs configured, they show up as **MFA Trusted IPS** in the list of locations for the location condition.
75
+
If you have Trusted IPs configured, they show up as **MFA Trusted IPs** in the list of locations for the location condition.
76
76
77
77
### Skipping multi-factor authentication
78
78
79
79
On the multi-factor authentication service settings page, you can identify corporate intranet users by selecting **Skip multi-factor authentication for requests from federated users on my intranet**. This setting indicates that the inside corporate network claim, which is issued by AD FS, should be trusted and used to identify the user as being on the corporate network. For more information, see [Enable the Trusted IPs feature by using Conditional Access](../authentication/howto-mfa-mfasettings.md#enable-the-trusted-ips-feature-by-using-conditional-access).
80
80
81
-
After checking this option, including the named location **MFA Trusted IPS** will apply to any policies with this option selected.
81
+
After checking this option, including the named location **MFA Trusted IPs** will apply to any policies with this option selected.
82
82
83
83
For mobile and desktop applications, which have long lived session lifetimes, Conditional Access is periodically reevaluated. The default is once an hour. When the inside corporate network claim is only issued at the time of the initial authentication, Azure AD may not have a list of trusted IP ranges. In this case, it is more difficult to determine if the user is still on the corporate network:
84
84
@@ -104,7 +104,7 @@ By default, selecting **Any location** causes a policy to be applied to all IP a
104
104
This option applies to:
105
105
106
106
- All locations that have been marked as trusted location
107
-
-**MFA Trusted IPS** (if configured)
107
+
-**MFA Trusted IPs** (if configured)
108
108
109
109
### Selected locations
110
110
@@ -126,7 +126,7 @@ Most of the IPv6 traffic that gets proxied to Azure AD comes from Microsoft Exch
126
126
These are the most common reasons you may need to configure IPv6 ranges in your named locations. In addition, if you are using Azure VNets, you will have traffic coming from an IPv6 address. If you have VNet traffic blocked by a Conditional Access policy, check your Azure AD sign-in log. Once you’ve identified the traffic, you can get the IPv6 address being used and exclude it from your policy.
127
127
128
128
> [!NOTE]
129
-
> If you want to specify an IP CIDR range for a single address, apply the /128 bit mask. If you say the IPv6 address 2607:fb90:b27a:6f69:f8d5:dea0:fb39:74a and wanted to exclude that single address as a range, you would use 2607:fb90:b27a:6f69:f8d5:dea0:fb39:74a/128.
129
+
> If you want to specify an IP CIDR range for a single address, apply the /128 bit mask. If you see the IPv6 address 2607:fb90:b27a:6f69:f8d5:dea0:fb39:74a and wanted to exclude that single address as a range, you would use 2607:fb90:b27a:6f69:f8d5:dea0:fb39:74a/128.
130
130
131
131
### Identifying IPv6 traffic in the Azure AD Sign-in activity reports
132
132
@@ -143,7 +143,7 @@ Conditional Access policies are evaluated when:
143
143
- A user initially signs in to a web app, mobile or desktop application.
144
144
- A mobile or desktop application that uses modern authentication, uses a refresh token to acquire a new access token. By default this check is once an hour.
145
145
146
-
This check means for mobile and desktop applications using modern authentication, a change in location would be detected within an hour of changing the network location. For mobile and desktop applications that don’t use modern authentication, the policy is applied on each token request. The frequency of the request can vary based on the application. Similarly, for web applications, the policy is applied at initial sign-in and is good for the lifetime of the session at the web application. Due to differences in session lifetimes across applications, the time between policy evaluation will also vary. Each time the application requests a new sign-in token, the policy is applied.
146
+
This check means for mobile and desktop applications using modern authentication, a change in location would be detected within an hour of changing the network location. For mobile and desktop applications that don’t use modern authentication, the policy is applied on each token request. The frequency of the request can vary based on the application. Similarly, for web applications, the policy is applied at initial sign-in and is good for the lifetime of the session at the web application. Due to differences in session lifetimes across applications, the time between policy evaluation will also vary. Each time the application requests a new sign-in token, the policy is applied.
147
147
148
148
By default, Azure AD issues a token on an hourly basis. After moving off the corporate network, within an hour the policy is enforced for applications using modern authentication.
0 commit comments