Blog Post

Microsoft Entra Blog
2 MIN READ

Conditional Access GPS-based named locations now in public preview

Alex Weinert's avatar
Alex Weinert
Former Employee
May 19, 2021

Today, I am excited to share how you can improve your Conditional Access policies and ensure compliance with data regulations thanks to the public preview of GPS-based named locations. This feature helps admins strengthen their security and compliance posture and allows them to restrict access to sensitive apps based on the GPS location of their users.

 

I have asked Olena Huang, a PM on the Identity team, to tell you more. Let us know what you think!

 

Alex Weinert

 

-------------------------------------

 

Hello,

 

With the public preview of GPS-based named locations, admins can refine their Conditional Access policies by determining a user’s location with even more precision.  GPS-based named locations allow you to restrict access to certain resources to the boundaries of a specific country. Due to VPNs and other factors, determining a user’s location from their IP address is not always accurate or reliable. Leveraging GPS signals enables admins to determine a user’s location with higher confidence. This is especially helpful if you have strict compliance regulations that limit where specific data can be accessed.

 

When the feature is enabled, users will be prompted to share their GPS location via the Microsoft Authenticator app during sign-in.

 

 

Create a policy to allow or restrict access based off a user’s GPS location

There are two simple steps:

  1. Create a GPS-based named location.
  2. Create or configure Conditional Access with this named location.

You’ll first need to create a countries named location and select the countries where you want the policy to apply. Configure the named location to determine the location by GPS coordinates instead of by IP address.

 

 

 

Next, create a Conditional Access policy to restrict access to selected applications for sign-ins within the boundaries of the named location.

 

 

 

For more information, check out our https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition  or our https://docs.microsoft.com/en-us/graph/api/resources/namedlocation?view=graph-rest-beta.

 

 

Test out the location-sharing experience

First, make sure you have the Microsoft Authenticator app installed and set up with your test account.

 

Next, try to access the files or data restricted by the Conditional Access policy.  You’ll be prompted to share your geolocation from the Authenticator app.

 

 

The first time you encounter this prompt, you will need to grant location permissions to the Authenticator app.

 

 

iOS

 

Android

 

For the next 24 hours, your location will be shared silently once per hour from that device, so you won’t keep getting notifications.

 

After 24 hours, you will be re-prompted when trying to access the same resource. However, you will not need to grant permissions again (unless you’ve disabled them).

 

 

 

If you have questions, check out our https://docs.microsoft.com/en-us/azure/active-directory/user-help/user-help-auth-app-faq.

 

We’d love to hear from you! Feel free to leave comments below or reach out to us on Twitter.

 

 

 

Learn more about Microsoft identity:

  • Return to the Azure Active Directory Identity blog home
  • Join the conversation on https://twitter.com/azuread/status/1278418103903363074 and https://www.linkedin.com/showcase/microsoft-security/
  • Share product suggestions on the https://feedback.azure.com/forums/169401-azure-active-directory
Updated Aug 19, 2021
Version 2.0

12 Comments

  • ReneV14's avatar
    ReneV14
    Copper Contributor

    Alex Weinert nice to solve the location challenge!

    Can we expect this in the future to be integrated with the Azure AD sign-Ins to also prevent the impossible travel events?

  • Alex WeinertNice additions

    Two remarks

    • You must be sure that all your users have Authenticator
    • Even in report_only it is prompting/querying for location so beware 🙂