Home > Manage Apps > Manage App Profiles for Microsoft Tenants > Configure Custom Azure App Profiles > Create a Custom Azure App > Configure a Best Practice Conditional Access Policy for Custom Apps in Azure

    Export to PDF

    Configure a Best Practice Conditional Access Policy for Custom Apps in Azure

    To ensure that custom apps in Azure are only accessible by the AvePoint Online Services production environment, follow the steps below to configure a conditional access policy.

    1. Log in to Microsoft Entra admin center (or Microsoft Azure portal) and navigate to Protection (or Microsoft Entra ID > Security) > Conditional Access > Named locations.

    2. Click IP ranges location.

    3. In the New location (IP ranges) right pane, complete the steps below:

      1. Name this location.

      2. Click + to add IP ranges based on the reserved IP addresses downloaded from AvePoint Online Services. For details on the reserved IP addresses, see Download a List of Reserved IP Addresses.

      3. Click Create.

      Configuring a new IP ranges location.

    4. Go to the Overview page and click Create new policy.

      Clicking Create new policy.

    5. Refer to the following instructions to configure a new policy:

      1. Enter a policy name.

      2. Click Users or workload identities, select Workload identities, choose Select service principals, and select your custom apps for AvePoint cloud services.

        *Note: The Workload identities license is required for the Users or workload identities option to appear.

        ![Configuring "Users or workload identities".](/en/configuration-and-deployment/manage-apps/manage-app-profiles-for-microsoft-tenants/images/image26.png "Configuring "Users or workload identities".")

      3. Click Conditions, click Locations, toggle Configure to Yes, choose the Selected locations option under the Exclude tab, and select the location created in the New location (IP ranges) step.

        Configuring Conditions to add the created IP ranges location.

      4. Click Grant and select Block access.

        Setting Grant to Block access.

      5. Toggle the Enable policy option to On.

        Setting the Enable policy option to On.

      6. Click Create.