Skip to content

Commit 1074c17

Browse files
[Azure AD] IPv6 Updates March
1 parent a3b8983 commit 1074c17

File tree

1 file changed

+28
-13
lines changed

1 file changed

+28
-13
lines changed

articles/active-directory/conditional-access/location-condition.md

Lines changed: 28 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Location condition in Azure Active Directory Conditional Access
3-
description: Learn about creating location-based Conditional Access policies using Azure AD.
2+
title: Using networks and countries in Azure Active Directory
3+
description: Use GPS locations and public IPv4 and IPv6 networks in Conditional Access policy to make access decisions.
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/23/2023
9+
ms.date: 03/17/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -27,13 +27,16 @@ Conditional Access policies are at their most basic an if-then statement combini
2727
Organizations can use this location for common tasks like:
2828

2929
- Requiring multifactor authentication for users accessing a service when they're off the corporate network.
30-
- Blocking access for users accessing a service from specific countries or regions.
30+
- Blocking access for users accessing a service from specific countries or regions your organization never operates from.
3131

3232
The location found using the public IP address a client provides to Azure Active Directory or GPS coordinates provided by the Microsoft Authenticator app. Conditional Access policies by default apply to all IPv4 and IPv6 addresses. For more information about IPv6 support, see the article [IPv6 support in Azure Active Directory](/troubleshoot/azure/active-directory/azure-ad-ipv6-support).
3333

34+
> [!TIP]
35+
> Conditional Access policies are enforced after first-factor authentication is completed. Conditional Access isn't intended to be an organization's first line of defense for scenarios like denial-of-service (DoS) attacks, but it can use signals from these events to determine access.
36+
3437
## Named locations
3538

36-
Locations exist in the Azure portal under **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**. These named network locations may include locations like an organization's headquarters network ranges, VPN network ranges, or ranges that you wish to block. Named locations are defined by IPv4 and IPv6 address ranges or by countries.
39+
Locations exist in the Azure portal under **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**. These named network locations may include locations like an organization's headquarters network ranges, VPN network ranges, or ranges that you wish to block. Named locations contain IPv4 and IPv6 address ranges or countries.
3740

3841
![Named locations in the Azure portal](./media/location-condition/new-named-location.png)
3942

@@ -82,9 +85,7 @@ If you select **Determine location by IP address**, the system collects the IP a
8285

8386
If you select **Determine location by GPS coordinates**, the user needs to have the Microsoft Authenticator app installed on their mobile device. Every hour, the system contacts the user’s Microsoft Authenticator app to collect the GPS location of the user’s mobile device.
8487

85-
The first time the user must share their location from the Microsoft Authenticator app, the user receives a notification in the app. The user needs to open the app and grant location permissions.
86-
87-
Every hour the user is accessing resources covered by the policy they need to approve a push notification from the app.
88+
The first time the user must share their location from the Microsoft Authenticator app, the user receives a notification in the app. The user needs to open the app and grant location permissions. Every hour the user is accessing resources covered by the policy they need to approve a push notification from the app.
8889

8990
Every time the user shares their GPS location, the app does jailbreak detection (Using the same logic as the Intune MAM SDK). If the device is jailbroken, the location isn't considered valid, and the user isn't granted access.
9091

@@ -145,6 +146,12 @@ You can also find the client IP by clicking a row in the report, and then going
145146

146147
## What you should know
147148

149+
### Cloud proxies and VPNs
150+
151+
When you use a cloud hosted proxy or VPN solution, the IP address Azure AD uses while evaluating a policy is the IP address of the proxy. The X-Forwarded-For (XFF) header that contains the user’s public IP address isn't used because there's no validation that it comes from a trusted source, so would present a method for faking an IP address.
152+
153+
When a cloud proxy is in place, a policy that requires a [hybrid Azure AD joined or complaint device](howto-conditional-access-policy-compliant-device.md#create-a-conditional-access-policy) can be easier to manage. Keeping a list of IP addresses used by your cloud hosted proxy or VPN solution up to date can be nearly impossible.
154+
148155
### When is a location evaluated?
149156

150157
Conditional Access policies are evaluated when:
@@ -160,15 +167,23 @@ By default, Azure AD issues a token on an hourly basis. After users move off the
160167

161168
The IP address used in policy evaluation is the public IPv4 or IPv6 address of the user. For devices on a private network, this IP address isn't the client IP of the user’s device on the intranet, it's the address used by the network to connect to the public internet.
162169

163-
### Bulk uploading and downloading of named locations
170+
### When you might block locations?
164171

165-
When you create or update named locations, for bulk updates, you can upload or download a CSV file with the IP ranges. An upload replaces the IP ranges in the list with those ranges from the file. Each row of the file contains one IP Address range in CIDR format.
172+
A policy that uses the location condition to block access is considered restrictive, and should be done with care after thorough testing. Some instances of using the location condition to block authentication may include:
166173

167-
### Cloud proxies and VPNs
174+
- Blocking countries where your organization never does business.
175+
- Blocking specific IP ranges like:
176+
- Known malicious IPs before a firewall policy can be changed.
177+
- For highly sensitive or privileged actions and cloud applications.
178+
- Based on user specific IP range like access to accounting or payroll applications.
168179

169-
When you use a cloud hosted proxy or VPN solution, the IP address Azure AD uses while evaluating a policy is the IP address of the proxy. The X-Forwarded-For (XFF) header that contains the user’s public IP address isn't used because there's no validation that it comes from a trusted source, so would present a method for faking an IP address.
180+
### User exclusions
181+
182+
[!INCLUDE [active-directory-policy-exclusions](../../../includes/active-directory-policy-exclude-user.md)]
170183

171-
When a cloud proxy is in place, a policy that requires a hybrid Azure AD joined device can be used, or the inside corpnet claim from AD FS.
184+
### Bulk uploading and downloading of named locations
185+
186+
When you create or update named locations, for bulk updates, you can upload or download a CSV file with the IP ranges. An upload replaces the IP ranges in the list with those ranges from the file. Each row of the file contains one IP Address range in CIDR format.
172187

173188
### API support and PowerShell
174189

0 commit comments

Comments
 (0)