Oct 09 2020
- last edited on
Jan 14 2022
We have requirement to access an registered application on azure cloud only from certain IP addresses of AWS cloud. What I found on conditional access policy is , we can bloack access from certain IP address ranges and Certain countries. Is it possible to specify requests should be accepted only from certain IP addressses ? Application we are planning to access is Office 365.
Oct 10 2020 11:22 AM
Hi, yes you can allow access to M365 services with CA based on trusted locations and IP address ranges as described here - https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition#locati...
Oct 14 2020 03:35 AM
@PeterRising Application is registered to run as background service or daemon without a signed-in user. The application is accessed from AWS cloud through Oauth2.0 authentication. Can conditional access be still applied?
Oct 14 2020 08:12 AM
I would think probably not in those conditions.
Oct 14 2020 10:43 AM
@PeterRising Just got to know that conditional access is only allowed at user login level , not for application logging level. We are accesing mailboxes through our application , I found way of applying IP address restrction at Exchange level. Just checking if we do have any other possible solution , as we are trying to avoid applying restrictions at Exchange level. We are using MS Graph API calls for accessing mailbox. Please let me know if there is any another way.