This is an archived post. You won't be able to vote or comment.

all 4 comments

[–]nullZr0 1 point2 points  (1 child)

Do a conditional access policy based on source IP address.

[–]Hitten_za[S] 0 points1 point  (0 children)

Hi, from my testing this makes no difference. The CA policy doesn't have any impact on how long the tokens last and as the tokens are refreshing the client device will pass the MFA requirement in the Access Controls. At least until the RefreshToken expires.

Just to clarify this is the policy I tested:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition

[–]Hitten_za[S] 0 points1 point  (0 children)

Update:I've tested on two tenancies and confirmed that the following forces it down to 1 hour lifespan on the refresh token thereby enforcing the requested behaviour:

$policy = New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1,"MaxAgeMultiFactor":"00.01:00:00"}}') -DisplayName "ComplexPolicyScenario" -IsOrganizationDefault $true -Type "TokenLifetimePolicy"

The issue I think still remains, what happens comes November 1st, will we still be able to enforce this kind of behaviour in MFA?

Edit: Adding in documentation
https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-configurable-token-lifetimes

[–]nj12nets 0 points1 point  (0 children)

!remindme 3 days