简体   繁体   中英

Restrict Azure Active Directory Application Access based on IP addresses

I need to restrict access to Azure Active Directory Application. Just allowed sub-nets can access Active Directory Application. Where can I configure that IP range in AD application that will restrict access for other sub-nets to that application? Any help will be appreciated.

AFAIK , Azure AD can't config your app access rule base on the sub-net address range currently. If the server which app published and your sub-net are in same local network ,in the application , you could check visitor's private ip address( Internal ip address) to meet the requirement, you could try retrieving a visitor's IP address from the Request Headers by using the UserHostAddress property of the HttpRequest object : Request.UserHostAddress .

The technical post webpages of this site follow the CC BY-SA 4.0 protocol. If you need to reprint, please indicate the site URL or the original address.Any question please contact:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM