根据IP地址限制Azure Active Directory应用程序访问 [英] Restrict Azure Active Directory Application Access based on IP addresses

查看:111
本文介绍了根据IP地址限制Azure Active Directory应用程序访问的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我需要限制对Azure Active Directory应用程序的访问.仅允许的子网可以访问Active Directory应用程序.如何在AD应用程序中配置该IP范围,以限制对该应用程序其他子网的访问? 任何帮助将不胜感激.

I need to restrict access to Azure Active Directory Application. Just allowed sub-nets can access Active Directory Application. Where can I configure that IP range in AD application that will restrict access for other sub-nets to that application? Any help will be appreciated.

推荐答案

AFAIK,Azure AD当前无法基于子网地址范围配置应用程序访问规则.如果发布该应用程序的服务器和您的子网位于同一本地网络中,则在该应用程序中,您可以检查访问者的私有IP地址( 内部IP地址)以满足要求,您可以尝试使用HttpRequest对象的UserHostAddress属性从Request Header检索访问者的IP地址:Request.UserHostAddress.

AFAIK , Azure AD can't config your app access rule base on the sub-net address range currently. If the server which app published and your sub-net are in same local network ,in the application , you could check visitor's private ip address( Internal ip address) to meet the requirement, you could try retrieving a visitor's IP address from the Request Headers by using the UserHostAddress property of the HttpRequest object : Request.UserHostAddress .

这篇关于根据IP地址限制Azure Active Directory应用程序访问的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
相关文章
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆