Restrict access to Portal by IP address
I have heard that many customers want to configure so that administrators can access to Azure management portal from defined IP address ranges.
I saw the following feedback, but it's actually ip address restriction for "MFA".
I want simple restriction capability for management portal access by IP address.
Thanks for the idea
Courtenay Davison commented
I really would like to restrict access to my Portal to certain static IP Address for anyone attempting to access the root account. I would allow power users to access from a broad range of one countries IP Address. Thus if hackers get to power admin account, you can delete their access from a root account
2fa goes a long way but restricting portal access by IP or limiting it to VPN access is ideal.
Can now be achieved via AAD Conditional Access :)
I wonder why this is not on top. If a hacker is able to log in to my account, they can delete everything, including backups that are on Azure Storage. That would likely be the end of my business. 2FA is not enough.
V Mahadev commented
This feature was available in the early release but I am not finding it out any where? Any idea