Home

Azure Active Directory and ADFS support for Location based MFA ?

%3CLINGO-SUB%20id%3D%22lingo-sub-195320%22%20slang%3D%22en-US%22%3EAzure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-195320%22%20slang%3D%22en-US%22%3E%3CP%3EAny%20one%20knows%20if%20it%20is%20possible%20to%20kind%20of%20apply%20MFA%20only%20from%20like%20outside%20the%20defined%20trusted%20Networks%20and%20how%20to%20set%20this%20up%20if%20ADFS%203.0%20is%20in%20play%20%3F%26nbsp%3B%20i%20tried%20to%20use%20just%20AAD%20Conditional%20Access%20Policies%20but%26nbsp%3Bi%20figure%20with%20ADFS%20in%20play%20it%20might%20be%20different%20as%20with%20just%20PTA%20and%20Seamless%20SSO.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAnd%20additionally%20would%20this%20be%20possible%20that%20MFA%20just%20applies%20for%20like%20SharePoint%20Teamsite%20access%20but%20not%20to%20the%20OneDrive%20(My%20Site%26nbsp%3BCollection%20Space%20of%20SharePoint)%2C%20Yammer%2C%20Teams%20etc%20%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20Customer%20does%20not%20use%20MFA%20yet%20and%20would%20like%20to%20start%20using%20it%20in%20collaborating%20with%20SharePoint%20Online%20with%20External%20Partners%20and%20Users%20but%20still%20not%20ready%20yet%20to%20globally%20use%20everywhere%20else%20to%20bother%20the%20users.%20Device%20based%20Conditional%20Access%20is%20not%20yet%20a%20Topic%20as%20the%20Environment%20is%20very%20Heterogeneous.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Eregards%3C%2FP%3E%3CP%3EUeli%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-195320%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20AD%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EEMS%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIdentity%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-202701%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-202701%22%20slang%3D%22en-US%22%3E%3CP%3EThat%20was%20just%20a%20comment%20based%20on%20SSPR%20(Self%20Service%20Password%20Reset)%20Feature.%26nbsp%3B%3C%2FP%3E%3CP%3ESo%20far%20this%20does%20not%20allow%20Authenticator%20App.%20At%20least%20it%20was%20when%20i%20checked%20last%20time%20couple%20of%20Days%20ago.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-202590%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-202590%22%20slang%3D%22en-US%22%3E%3CP%3EHey%20Ueli%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%2C%20but%20I%20didn't%20get%20the%20below%20mentioned%20statement.%3C%2FP%3E%3CP%3E%22Still%20regarding%20SSPR%20i%20think%20its%20still%20not%20available%20there.%22%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERegards%2C%3C%2FP%3E%3CP%3ERishabh%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-202580%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-202580%22%20slang%3D%22en-US%22%3E%3CP%3ESorry%20Point%20B%20is%20solved%20i%20must%20got%20carried%20away%20by%20testing%20so%20much%2C%20so%20i%20missed%20the%20option%20is%20actually%20available.%20Still%20regarding%20SSPR%20i%20think%20its%20still%20not%20available%20there.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-202570%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-202570%22%20slang%3D%22en-US%22%3E%3CP%3EI%20also%20found%20out%20two%20more%20things.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EA)%20It%20seems%20that%20a%20lot%20of%20the%20O365%20Apps%20are%20somehow%20integrated%20with%20SharePoint.%3C%2FP%3E%3CP%3EFor%20Example%20if%20i%20just%20activate%20this%20Rule%20for%20SharePoint%20Online%20and%20only%26nbsp%3B%20through%20Browser%2C%20i%20also%20have%20to%20authenticate%20if%20i%20want%20to%20open%20Word%2C%20Excel%2C%20PowerPoint%2C%20Teams%2C%20Planner%20etc%20etc.%20Only%20Yammer%20and%20some%20other%20Apps%20are%20not%20related%20to%20SharePoint%20as%20it%20seems.%20If%20i%20connect%20to%20Teams%20via%20Fat-Client%20it%20works%20without%20MFA%20as%20intended.%26nbsp%3B%20Strange%20though%20that%20most%20of%20these%20Apps%20are%20SharePoint%20related.%20It%20also%20does%20not%20help%20if%20you%20make%20exclusions%20for%20let%20say%20Teams%20etc.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EB)%20If%20enforcing%20MFA%20through%20Conditional%20Access%20the%20User%20does%20not%20get%20the%20Benefit%20of%20registering%20and%20using%20the%20Authenticator%20App%20on%20the%20Mobile%20Phone.%20It%20only%20reveals%20the%20Option%20for%20Phone%20Call%20and%20SMS%20even%20though%20if%20you%20would%20fully%20Deploy%20MFA%20for%20the%20User%20the%20Authenticator%20Method%20is%20configurable%20and%20activated%20on%20our%20Tenant%E2%80%A6%20Seems%20the%20registration%20Process%20for%20Conditional%20Access%20based%20Auth%20is%20different%20(like%20Self%20Service%20Password%20Reset)%20%26nbsp%3B%20This%20is%20very%20sad%20%3A(%3C%2Fimg%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-202554%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-202554%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Rishabh%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAfter%20a%20while%20of%20troubleshooting%20i%20finally%20found%20the%20Issue.%3C%2FP%3E%3CP%3EIf%20i%20choose%20Exclude%20%22All%20trusted%20locations%22%20the%20Rule%20seems%20not%20to%20work.%3C%2FP%3E%3CP%3EIf%20i%20choose%20Exclude%20%22Selected%20locations%22%20and%20use%20MFA%20Trusted%20IPs%20for%20example%2C%20the%20Conditional%20Access%20Rule%20will%20work%20without%20further%20need%20to%20configure%20anything%20on%20ADFS%20like%20you%20said.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EDid%20anybody%20has%20the%20same%20Situation%20%2F%20Issue%20%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECheers%3C%2FP%3E%3CP%3EUeli%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-200886%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-200886%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20Rishabh%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20verified%20this%20Options%20as%20well%20within%20Conditional%20Access.%20I%20will%20check%20further%20if%20there%20was%20still%20a%20configuration%20issue%20on%20my%20end%20or%20if%20this%20is%20correct%20and%20somewhere%20else%20is%20the%20mistake.%3C%2FP%3E%3CP%3EI%20did%20configure%20this%20exactly%20the%20Way%20you%20mentioned%20but%20somehow%20it%20seems%20to%20be%20not%20apply.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAnyway%20i%20feel%20confident%20now%20that%20i%20understood%20the%20Process%20and%20how%20it%20should%20work%20so%20the%20issue%20must%20be%20somewhere%20around%20in%20my%20environment%20%3A)%3C%2Fimg%3E%20will%20find%20it.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%20again%20and%20regards%3C%2FP%3E%3CP%3EUeli%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-198940%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-198940%22%20slang%3D%22en-US%22%3E%20%20%26nbsp%3Bwrote%3A%3CBR%20%2F%3E%3CP%3EThanks%20Rishabh%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESo%20basically%20what%20would%20you%20recommend%20me%20if%20i%20actually%20don't%20want%20depend%20to%20much%20on%20ADFS%20and%20ADFS%20Claim%20Rules%20but%20would%20rather%20like%20to%20use%20native%20Conditional%20Access%20with%20Azure%20MFA%20%3F%20still%20have%20ADFS%20in%20place%20as%20we%20are%20not%20able%20to%20remove%20it%20right%20away%20(maybe%20in%20the%20future%20i%20would%20like%20to%20go%20PTA%20and%20Seamless%20SSO)%20but%20that%20can%20go%20a%20while.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20still%20need%20the%20following%20covered%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E1.%20Only%20use%20MFA%20if%20it%20is%20outside%20of%20Corpnet%3C%2FP%3E%3CP%3E2.%20Only%20use%20MFA%20for%20SharePoint%20Online%20SaaS%20and%20for%20nothing%20else%3C%2FP%3E%3CP%3E3.%20Only%20use%20if%20connected%20via%20Browser%20(not%20for%20OneDrive%20fat%20client%20or%20so%20ever)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBTW%3A%20This%20is%20basically%20because%20we%20want%20to%20rollout%20this%20package%20just%20for%20SharePoint%20Collab%20right%20now%20and%20not%20for%20anything%20else.%20Later%20we%20probably%20will%20go%20with%20Hybrid%20AD%20Join%20and%20Intune%20and%20for%20this%20step%20im%20than%20able%20to%20use%20Device%20Based%20Conditional%20Access%20which%20makes%20it%20even%20more%20easier.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBut%20again%20regarding%20the%20above%203%20Requirements%20what%20would%20you%20suggest%20%3F%20is%20this%20possible%20without%20ADFS%20Claims%20or%20do%20we%20need%20still%20the%20ADFS%20Claims%20%3F%20and%20do%20i%20need%20than%20ADFS%20to%20connect%20to%20MFA%20Provider%20like%20AzureMFA%20or%20can%20i%20use%20the%20claim%20rules%20without%20using%20ADFS%20driven%20MFA%20and%20just%20use%20again%20Azure%20MFA%20without%20configuration%20inside%20ADFS%20%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHope%20is%20stated%20clear%20for%20you%20otherwise%20ask%20me%20anytime.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECheers%3C%2FP%3E%3CP%3EUeli%3C%2FP%3E%20%3CP%3E%3CBR%20%2F%3EHello%20Ueli%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAs%20per%20your%20requirement%20%3A-%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E1.%20Only%20use%20MFA%20if%20it%20is%20outside%20of%20Corpnet%3C%2FP%3E%3CP%3E-%20For%20this%20feature%20you%20have%20to%20add%20the%20IP%20address%20range%20of%20your%20enterprise%20in%20the%20MFA%20trusted%20IP's%20range%20option%20%3A-%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E2.%20Only%20use%20MFA%20for%20SharePoint%20Online%20SaaS%20and%20for%20nothing%20else.%3C%2FP%3E%3CP%3E-%20I%20am%20not%20sure%20if%20there%20is%20a%20way%20where%20in%20we%20have%20implemented%20a%20policy%20for%20sharepoint%20and%20it%20doesn't%20impact%20onedrive.%20This%20is%20something%20which%20you%20can%20check%20by%20creating%20a%20test%20policy.%3C%2FP%3E%3CP%3EFor%20saas%20applications%20added%20to%20your%20tenant%2C%20yes%20you%20can%20implement%20MFA%20and%20that%20too%20application%20specific.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E3.%20Only%20use%20if%20connected%20via%20Browser%20(not%20for%20OneDrive%20fat%20client%20or%20so%20ever)%3C%2FP%3E%3CP%3EWhile%20creating%20conditional%20access%20policy%20you%20get%20an%20option%20where%20in%20you%20can%20use%20the%20application%20type.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERegards%2C%3C%2FP%3E%3CP%3ERishabh%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-198939%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-198939%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20Ueli%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAs%20per%20your%20requirement%20%3A-%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E1.%20Only%20use%20MFA%20if%20it%20is%20outside%20of%20Corpnet%3C%2FP%3E%3CP%3E-%20For%20this%20feature%20you%20have%20to%20add%20the%20IP%20address%20range%20of%20your%20enterprise%20in%20the%20MFA%20trusted%20IP's%20range%20option%20%3A-%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E2.%20Only%20use%20MFA%20for%20SharePoint%20Online%20SaaS%20and%20for%20nothing%20else.%3C%2FP%3E%3CP%3E-%20I%20am%20not%20sure%20if%20there%20is%20a%20way%20where%20in%20we%20have%20implemented%20a%20policy%20for%20sharepoint%20and%20it%20doesn't%20impact%20onedrive.%20This%20is%20something%20which%20you%20can%20check%20by%20creating%20a%20test%20policy.%3C%2FP%3E%3CP%3EFor%20saas%20applications%20added%20to%20your%20tenant%2C%20yes%20you%20can%20implement%20MFA%20and%20that%20too%20application%20specific.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E3.%20Only%20use%20if%20connected%20via%20Browser%20(not%20for%20OneDrive%20fat%20client%20or%20so%20ever)%3C%2FP%3E%3CP%3EWhile%20creating%20conditional%20access%20policy%20you%20get%20an%20option%20where%20in%20you%20can%20use%20the%20application%20type.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERegards%2C%3C%2FP%3E%3CP%3ERishabh%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-198857%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-198857%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20Rishabh%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESo%20basically%20what%20would%20you%20recommend%20me%20if%20i%20actually%20don't%20want%20depend%20to%20much%20on%20ADFS%20and%20ADFS%20Claim%20Rules%20but%20would%20rather%20like%20to%20use%20native%20Conditional%20Access%20with%20Azure%20MFA%20%3F%20still%20have%20ADFS%20in%20place%20as%20we%20are%20not%20able%20to%20remove%20it%20right%20away%20(maybe%20in%20the%20future%20i%20would%20like%20to%20go%20PTA%20and%20Seamless%20SSO)%20but%20that%20can%20go%20a%20while.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20still%20need%20the%20following%20covered%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E1.%20Only%20use%20MFA%20if%20it%20is%20outside%20of%20Corpnet%3C%2FP%3E%3CP%3E2.%20Only%20use%20MFA%20for%20SharePoint%20Online%20SaaS%20and%20for%20nothing%20else%3C%2FP%3E%3CP%3E3.%20Only%20use%20if%20connected%20via%20Browser%20(not%20for%20OneDrive%20fat%20client%20or%20so%20ever)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBTW%3A%20This%20is%20basically%20because%20we%20want%20to%20rollout%20this%20package%20just%20for%20SharePoint%20Collab%20right%20now%20and%20not%20for%20anything%20else.%20Later%20we%20probably%20will%20go%20with%20Hybrid%20AD%20Join%20and%20Intune%20and%20for%20this%20step%20im%20than%20able%20to%20use%20Device%20Based%20Conditional%20Access%20which%20makes%20it%20even%20more%20easier.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBut%20again%20regarding%20the%20above%203%20Requirements%20what%20would%20you%20suggest%20%3F%20is%20this%20possible%20without%20ADFS%20Claims%20or%20do%20we%20need%20still%20the%20ADFS%20Claims%20%3F%20and%20do%20i%20need%20than%20ADFS%20to%20connect%20to%20MFA%20Provider%20like%20AzureMFA%20or%20can%20i%20use%20the%20claim%20rules%20without%20using%20ADFS%20driven%20MFA%20and%20just%20use%20again%20Azure%20MFA%20without%20configuration%20inside%20ADFS%20%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHope%20is%20stated%20clear%20for%20you%20otherwise%20ask%20me%20anytime.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECheers%3C%2FP%3E%3CP%3EUeli%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-198651%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-198651%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20Ueli%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAs%20per%20your%20enterprise%20setup.%20I%20will%20try%20to%20explain%20what%20will%20happen%20under%20the%20hood%20when%20you%20have%20MFA%20configured%20in%20cloud%20for%20federated%20identities.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EYour%20user%20will%20go%20to%20%3CA%20href%3D%22https%3A%2F%2Fportal.office.com%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Fportal.office.com%3C%2FA%3E%20--%26gt%3B%20and%20will%20be%20redirected%20to%20%3CA%20href%3D%22https%3A%2F%2Flogin.microsoftonline.com%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Flogin.microsoftonline.com%3C%2FA%3E%20--%26gt%3B%20Since%20the%20domain%20is%20federated%2C%20the%20ADFS%20will%20complete%20the%20authentication%20and%20the%20provide%20a%20token%20to%20%3CA%20href%3D%22https%3A%2F%2Flogin.microsoftonline.com%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Flogin.microsoftonline.com%3C%2FA%3E%20and%20now%20the%20conditional%20access%20policies%20will%20be%20triggered.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EConditional%20access%20policy%20will%20be%20triggered%20irrespective%20of%20the%20authentication%20method%20you%20are%20using%2C%20as%20this%20is%20configured%20in%20azure.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E2nd%26nbsp%3B%20scenario%20-%20where%20you%20have%20a%20MFA%20provider%20added%20in%20ADFS%20as%20well%2C%3C%2FP%3E%3CP%3E-%20The%20MFA%20will%20be%20triggered%20by%20ADFS%20using%20MFA%20adapter%3C%2FP%3E%3CP%3E-%20In%20this%20case%20azure%20mfa%20will%20not%20be%20triggered%20because%20the%20token%20provided%20to%20azure%20AD%2C%20will%20have%20a%20multipleauthn%20claim%20in%20the%20token.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ENow%20since%20this%20is%20a%20starting%20phase%20where%20you%20are%20testing%2C%20I%20would%20recommend%20to%20start%20either%20with%20exchange%20and%20not%20with%20sharepoint%20or%20onedrive.%3C%2FP%3E%3CP%3EYou%20can%20simple%20apply%20conditional%20access%20to%20either%20groups%20or%20set%20of%20users%20as%20well.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%23%23%20Note%20-%20Conditional%20access%20is%20triggered%20when%20the%20primary%20authentication%20is%20completed%2C%20it%20is%20more%20over%20an%20authorization%20which%20is%20based%20on%20certain%20conditions%2C%20once%20validated%20the%20user%20will%20have%20access%20to%20the%20respective%20resource.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERegards%2C%3C%2FP%3E%3CP%3ERishabh%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-198299%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-198299%22%20slang%3D%22en-US%22%3E%3CP%3EConditional%20access%20will%20work%20for%20federated%20scenarios%2C%20but%20it%20only%20applies%20to%20legacy%20auth.%20They%20just%20started%20previewing%20CA%20support%20for%20blocking%20legacy%20auth%2C%20so%20you%20can%20use%20the%20relevant%20controls%20as%20needed.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIt's%20still%20much%20easier%20to%20distinguish%20between%20external%2Finternal%20access%20via%20AD%20FS%20claims%20rules%2C%20provided%20you%20use%20the%20recommended%20setup%20of%20AD%20FS%20servers%20%2B%20proxies.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-197783%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-197783%22%20slang%3D%22en-US%22%3E%3CP%3EFound%20this%20one%2C%20does%20someone%20know%20if%20this%20is%20the%20Best%20way%20to%20go%20if%20you%20have%20federated%20IDs%26nbsp%3B%20and%20still%20want%20to%20use%20Conditional%20Access%20and%20Azure%20MFA%20%3F%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fblog.kloud.com.au%2F2017%2F07%2F01%2Fusing-adfs-on-premises-mfa-with-azure-ad-conditional-access%2F%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Fblog.kloud.com.au%2F2017%2F07%2F01%2Fusing-adfs-on-premises-mfa-with-azure-ad-conditional-access%2F%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECheers%3C%2FP%3E%3CP%3EUeli%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-197772%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-197772%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%2C%20i%20figured%20that%20as%20well%20regarding%20claim%20rules.%3C%2FP%3E%3CP%3EI%20have%20another%20question%20in%20the%20meantime%20though%20regarding%20the%20Conditional%20Access.%3C%2FP%3E%3CP%3EDoes%20this%20should%20work%20as%20well%20with%20Federated%20IDs%20or%20just%20with%20Cloud%20only%20an%20PTA%20and%20SSO%20Synced%20AD%20Accounts%3F%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20justed%20created%20a%20Conditional%20Access%20Rules%20which%20should%20require%20me%20to%20use%20MFA%20if%20im%20not%20coming%20from%20a%20Trusted%20IP%20Range%20and%20if%20accessing%20SharePoint%20Online%20from%20Browser%20but%20no%20other%26nbsp%3Btarget%20in%20Browser%20and%20no%20Modern%20Authentication%20App%20and%20it%20seems%20not%20to%20work%20for%20federated%20IDs.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESo%20for%20them%20i%20always%20have%20to%20use%20ADFS%20Claim%20Rules%20or%20is%20there%20something%20wrong%20with%20my%20Rule%20%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBest%20regards%3C%2FP%3E%3CP%3EUeli%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-195522%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Active%20Directory%20and%20ADFS%20support%20for%20Location%20based%20MFA%20%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-195522%22%20slang%3D%22en-US%22%3E%3CP%3EYou%20can%20use%20the%20claims%20rules%20engine%20to%20create%20rules%20that%20will%20apply%20MFA%20only%20on%20external%20logins.%20You%20cannot%20however%20limit%20this%20to%20only%20specific%20workflows%2C%20such%20as%20SPO.%20If%20you%20have%20such%20requirements%2C%20Azure%20AD%20Conditional%20Access%20is%20your%20best%20option.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Ueli Zimmermann
Contributor

Any one knows if it is possible to kind of apply MFA only from like outside the defined trusted Networks and how to set this up if ADFS 3.0 is in play ?  i tried to use just AAD Conditional Access Policies but i figure with ADFS in play it might be different as with just PTA and Seamless SSO.

 

And additionally would this be possible that MFA just applies for like SharePoint Teamsite access but not to the OneDrive (My Site Collection Space of SharePoint), Yammer, Teams etc ?

 

The Customer does not use MFA yet and would like to start using it in collaborating with SharePoint Online with External Partners and Users but still not ready yet to globally use everywhere else to bother the users. Device based Conditional Access is not yet a Topic as the Environment is very Heterogeneous. 

 

regards

Ueli

14 Replies

You can use the claims rules engine to create rules that will apply MFA only on external logins. You cannot however limit this to only specific workflows, such as SPO. If you have such requirements, Azure AD Conditional Access is your best option.

Thank you, i figured that as well regarding claim rules.

I have another question in the meantime though regarding the Conditional Access.

Does this should work as well with Federated IDs or just with Cloud only an PTA and SSO Synced AD Accounts? 

 

I justed created a Conditional Access Rules which should require me to use MFA if im not coming from a Trusted IP Range and if accessing SharePoint Online from Browser but no other target in Browser and no Modern Authentication App and it seems not to work for federated IDs.

 

So for them i always have to use ADFS Claim Rules or is there something wrong with my Rule ?

 

Best regards

Ueli

Found this one, does someone know if this is the Best way to go if you have federated IDs  and still want to use Conditional Access and Azure MFA ? 

 

https://blog.kloud.com.au/2017/07/01/using-adfs-on-premises-mfa-with-azure-ad-conditional-access/

 

Cheers

Ueli

Conditional access will work for federated scenarios, but it only applies to legacy auth. They just started previewing CA support for blocking legacy auth, so you can use the relevant controls as needed.

 

It's still much easier to distinguish between external/internal access via AD FS claims rules, provided you use the recommended setup of AD FS servers + proxies.

Hello Ueli,

 

As per your enterprise setup. I will try to explain what will happen under the hood when you have MFA configured in cloud for federated identities.

 

Your user will go to https://portal.office.com --> and will be redirected to https://login.microsoftonline.com --> Since the domain is federated, the ADFS will complete the authentication and the provide a token to https://login.microsoftonline.com and now the conditional access policies will be triggered.

 

Conditional access policy will be triggered irrespective of the authentication method you are using, as this is configured in azure. 

 

2nd  scenario - where you have a MFA provider added in ADFS as well,

- The MFA will be triggered by ADFS using MFA adapter

- In this case azure mfa will not be triggered because the token provided to azure AD, will have a multipleauthn claim in the token.

 

Now since this is a starting phase where you are testing, I would recommend to start either with exchange and not with sharepoint or onedrive.

You can simple apply conditional access to either groups or set of users as well.

 

## Note - Conditional access is triggered when the primary authentication is completed, it is more over an authorization which is based on certain conditions, once validated the user will have access to the respective resource. 

 

Regards,

Rishabh

Thanks Rishabh,

 

So basically what would you recommend me if i actually don't want depend to much on ADFS and ADFS Claim Rules but would rather like to use native Conditional Access with Azure MFA ? still have ADFS in place as we are not able to remove it right away (maybe in the future i would like to go PTA and Seamless SSO) but that can go a while.

 

I still need the following covered:

 

1. Only use MFA if it is outside of Corpnet

2. Only use MFA for SharePoint Online SaaS and for nothing else

3. Only use if connected via Browser (not for OneDrive fat client or so ever)

 

BTW: This is basically because we want to rollout this package just for SharePoint Collab right now and not for anything else. Later we probably will go with Hybrid AD Join and Intune and for this step im than able to use Device Based Conditional Access which makes it even more easier.

 

But again regarding the above 3 Requirements what would you suggest ? is this possible without ADFS Claims or do we need still the ADFS Claims ? and do i need than ADFS to connect to MFA Provider like AzureMFA or can i use the claim rules without using ADFS driven MFA and just use again Azure MFA without configuration inside ADFS ?

 

Hope is stated clear for you otherwise ask me anytime.

 

Cheers

Ueli

Hello Ueli,

 

As per your requirement :- 

 

1. Only use MFA if it is outside of Corpnet

- For this feature you have to add the IP address range of your enterprise in the MFA trusted IP's range option :-

 

Untitled.png

 

2. Only use MFA for SharePoint Online SaaS and for nothing else.

- I am not sure if there is a way where in we have implemented a policy for sharepoint and it doesn't impact onedrive. This is something which you can check by creating a test policy.

For saas applications added to your tenant, yes you can implement MFA and that too application specific. 

 

3. Only use if connected via Browser (not for OneDrive fat client or so ever)

While creating conditional access policy you get an option where in you can use the application type.

 

Untitled.png

 

Regards,

Rishabh

 


@Ueli Zimmermann wrote:

Thanks Rishabh,

 

So basically what would you recommend me if i actually don't want depend to much on ADFS and ADFS Claim Rules but would rather like to use native Conditional Access with Azure MFA ? still have ADFS in place as we are not able to remove it right away (maybe in the future i would like to go PTA and Seamless SSO) but that can go a while.

 

I still need the following covered:

 

1. Only use MFA if it is outside of Corpnet

2. Only use MFA for SharePoint Online SaaS and for nothing else

3. Only use if connected via Browser (not for OneDrive fat client or so ever)

 

BTW: This is basically because we want to rollout this package just for SharePoint Collab right now and not for anything else. Later we probably will go with Hybrid AD Join and Intune and for this step im than able to use Device Based Conditional Access which makes it even more easier.

 

But again regarding the above 3 Requirements what would you suggest ? is this possible without ADFS Claims or do we need still the ADFS Claims ? and do i need than ADFS to connect to MFA Provider like AzureMFA or can i use the claim rules without using ADFS driven MFA and just use again Azure MFA without configuration inside ADFS ?

 

Hope is stated clear for you otherwise ask me anytime.

 

Cheers

Ueli



Hello Ueli,

 

As per your requirement :- 

 

1. Only use MFA if it is outside of Corpnet

- For this feature you have to add the IP address range of your enterprise in the MFA trusted IP's range option :-

 

Untitled.png

 

2. Only use MFA for SharePoint Online SaaS and for nothing else.

- I am not sure if there is a way where in we have implemented a policy for sharepoint and it doesn't impact onedrive. This is something which you can check by creating a test policy.

For saas applications added to your tenant, yes you can implement MFA and that too application specific. 

 

3. Only use if connected via Browser (not for OneDrive fat client or so ever)

While creating conditional access policy you get an option where in you can use the application type.

 

Untitled.png

 

Regards,

Rishabh

 

Thank you Rishabh,

 

I have verified this Options as well within Conditional Access. I will check further if there was still a configuration issue on my end or if this is correct and somewhere else is the mistake.

I did configure this exactly the Way you mentioned but somehow it seems to be not apply.

 

Anyway i feel confident now that i understood the Process and how it should work so the issue must be somewhere around in my environment :) will find it.

 

Thanks again and regards

Ueli

Hi Rishabh,

 

After a while of troubleshooting i finally found the Issue.

If i choose Exclude "All trusted locations" the Rule seems not to work.

If i choose Exclude "Selected locations" and use MFA Trusted IPs for example, the Conditional Access Rule will work without further need to configure anything on ADFS like you said.

 

Did anybody has the same Situation / Issue ?

 

Cheers

Ueli

I also found out two more things.

 

A) It seems that a lot of the O365 Apps are somehow integrated with SharePoint.

For Example if i just activate this Rule for SharePoint Online and only  through Browser, i also have to authenticate if i want to open Word, Excel, PowerPoint, Teams, Planner etc etc. Only Yammer and some other Apps are not related to SharePoint as it seems. If i connect to Teams via Fat-Client it works without MFA as intended.  Strange though that most of these Apps are SharePoint related. It also does not help if you make exclusions for let say Teams etc. 

 

B) If enforcing MFA through Conditional Access the User does not get the Benefit of registering and using the Authenticator App on the Mobile Phone. It only reveals the Option for Phone Call and SMS even though if you would fully Deploy MFA for the User the Authenticator Method is configurable and activated on our Tenant… Seems the registration Process for Conditional Access based Auth is different (like Self Service Password Reset)   This is very sad :(

 

 

Sorry Point B is solved i must got carried away by testing so much, so i missed the option is actually available. Still regarding SSPR i think its still not available there.

 

Hey Ueli,

 

Thanks, but I didn't get the below mentioned statement.

"Still regarding SSPR i think its still not available there."

 

Regards,

Rishabh

That was just a comment based on SSPR (Self Service Password Reset) Feature. 

So far this does not allow Authenticator App. At least it was when i checked last time couple of Days ago.

 

Related Conversations
Tabs and Dark Mode
cjc2112 in Discussions on
35 Replies
Extentions Synchronization
Deleted in Discussions on
3 Replies
flashing a white screen while open new tab
Deleted in Discussions on
14 Replies
Stable version of Edge insider browser
HotCakeX in Discussions on
35 Replies