@Rob Thanks for reaching out.
The continuous access evaluation checks for the allowed IP range under trusted location, any changes to that IP triggers the block.
So if the user authenticates with the approved network and then switches to a unapproved IP range, this will block it. This will work if you have blocked any access to outside corporate network under conditional access policy.
This is how a general client will face this :
- A CAE-capable client presents credentials or a refresh token to Azure AD asking for an access token for some resource.
- Azure AD evaluates all Conditional Access policies to see whether the user and client meet the conditions.
- An access token is returned along with other artifacts to the client.
- User moves out of an allowed IP range
- The client presents an access token to the resource provider from outside of an allowed IP range.
- The resource provider evaluates the validity of the token and checks the location policy synced from Azure AD.
- In this case, the resource provider denies access, and sends a 401+ claim challenge back to the client because it is not coming from allowed IP range.
- The CAE-capable client understands the 401+ claim challenge. It bypasses the caches and goes back to step 1, sending its refresh token along with the claim challenge back to Azure AD. Azure AD reevaluates all the conditions and will deny access in this case.
-----------------------------------------------------------------------------------------------------------------
If the suggested response helped you resolve your issue, please do not forget to accept the response as Answer and "Up-Vote" for the answer that helped you for benefit of the community