all our users have MFA enable. We are considering a new add-on for our on-prem crowd server (which we use for our authentication for the atlassian applications).
The requirement is to make the server public and to add the public ip to the cloud based mfa settings.
"In this scenario, users with Azure AD MFA enabled will authenticate to your Atlassian applications by entering only their Office 365 username and password in the login forms of those applications. Users will not be asked to enter any other authentication factor response. This is made possible by adding your Crowd server's public IP address to the list of trusted ips in Azure AD MFA settings."
Is there an MS ip-range which we can add into our firewall-settings to limit the access?
Thanks and regards,