Entra ID Conditional Access

Handian Sudianto 6,561 Reputation points
2025-12-12T00:09:03.64+00:00

I have some web application and this application will generete some notificatiin thru email.

Now i want to limit the sender only can be accessed from internal network and from azure app service.

I can make Entra conditional access by puting our public ip to teh condition, but how if the sender authenticate from azure web apps?

Azure App Service
Azure App Service
Azure App Service is a service used to create and deploy scalable, mission-critical web apps.
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2025-12-12T00:09:12.2933333+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    To limit access to your web application so that notifications can only be sent from your internal network and Azure App Service, you can utilize Conditional Access policies in Microsoft Entra ID. Here are some steps to consider:

    1. Public IP Address: As you mentioned, you can create a Conditional Access policy that includes your organization's public IP address. This will restrict access to users connecting from that IP range.
    2. Azure App Service: For Azure App Service, you can implement location-based Conditional Access policies. This allows you to define named locations that include the IP ranges used by Azure services. You can mark these locations as trusted, which can help in managing access from Azure App Service.
    3. Authentication Context: If your application is using the on-behalf-of flow or accessing multiple services, ensure that you implement the necessary code to support Conditional Access policies. This may involve using the Microsoft Authentication Library (MSAL) to handle token requests appropriately.
    4. Testing Policies: After setting up your Conditional Access policies, test them to ensure that they are functioning as expected. You can adjust conditions or settings based on the results of your testing.

    By combining these strategies, you can effectively limit access to your application based on the source of the request, ensuring that only authenticated users from your internal network and Azure App Service can send notifications.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.