This guide explains how to add your proxy or outbound firewall IP address to an Azure Conditional Access policy in Microsoft Entra ID (formerly Azure AD).
This helps you:
- Restrict access to corporate network locations
- Bypass MFA for trusted IPs (such as proxy or VPN egress points)
- Enforce stricter policies for external or untrusted sources
Prerequisites
- Global Administrator or Security Administrator role in Azure AD
- Knowledge of your proxy/firewall's external (egress) IP address
- Azure AD Premium P1 or P2 license (Conditional Access requires this)
Step 1 - Sign in to the Azure Portal
- Navigate to https://portal.azure.com
- Launch the Microsoft Entra ID blade (formerly Azure Active Directory)
Step 2 - Navigate to Conditional Access
- From the side menu:
- Click Protection โ Conditional Access.
- Click an existing policy or click + New policy to create one.
Step 3 - Configure Conditions Based on Locations
- Under your policy:
- Click Conditions โ Locations.
- Set the toggle to Yes.
Step 4 - Define Named Locations
- Click Select locations โ then + Named location.
- Provide a meaningful name, e.g.,
Trusted Proxy IP
. - Under IP ranges, add your proxy or firewallโs public IP(s).
- Check the box if this IP should be marked as trusted (for MFA or device compliance rules).
Step 5 - Apply the Named Location
- Once the named location is saved:
- Navigate back to the Select locations screen.
- Select either:
- Include โ to apply the policy only when users are coming from that proxy IP
- Exclude โ to bypass the policy for that IP (e.g., exclude from MFA)
Step 6 - Complete the Policy
-
Under Assignments, choose users/groups to apply the policy to.
-
Under Access controls, choose:
- Grant โ Block or allow access
- Session โ Optional controls like sign-in frequency
-
Set Enable Policy to On.
-
Click Create or Save.
Example Use Cases
Scenario | Action in Conditional Access Policy |
---|---|
Bypass MFA for users behind proxy | Exclude proxy IP under "Locations" condition |
Require MFA unless on proxy | Include All IPs, then Exclude proxy IP |
Allow access only from proxy | Include only the proxy IP as named location |
Testing and Logs
- Use Sign-in logs in Microsoft Entra ID to verify:
- The IP seen by Azure matches your proxy/firewall's egress IP
- The Conditional Access policy result (
Success
,Failure
,Not Applied
, etc.)
Tips
- If you're behind multiple proxies or regional egress IPs, add them all to the named location.
- Azure reads the client public IP, so NAT or forward proxies must expose the correct external address.
- Be cautious when blocking access based on IP โ always test with a break-glass account excluded from the policy.