Hi,
You could set up trusted location(s) for the public IP(s) and set your policy to exclude them from MFA. Please see article below for more information:
Using the location condition in a Conditional Access policy
https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
NOTE: You cannot use mac address since that isn't visible to Azure AD.
If the above was helpful please click Accept Answer and upvote.
Thanks.
-TP
Thanks I may be missing a step
I went to the page, I added
Hi @Boe Dillard , in your Conditional Access (CA) policy where you are requiring MFA, did you you select All trusted locations under Conditions -- Locations -- Exclude? If you make the change and it still doesn't work properly please post specific details of your CA policy. I'm assuming you set your home named location as trusted.
Thanks - I may be doing it all wrong - I go to https://portal.azure.com/#view/Microsoft_AAD_ConditionalAccess/ConditionalAccessBlade/~/NamedLocations
I click on IP ranges Location, Give it a name - mark as trusted and put in my ip/29
And that is all I did.
I see the configure multifactor authentication trusted IPs - that looks like it is across the board but I could be mistaken
@Boe Dillard I'll give you some instructions to guide you through it, probably post it within next 8-12 hours.
Sign in to comment