This guide explains how to use Named Locations and Conditional Access policies in Entra ID to require that end users have Service Tunnel for authenticating to specific SaaS application(s). In the steps below, we use Office 365 as the example application.
1.1 Register a Service Tunnel for Public Domains.
1.2 Configure the Service Tunnel to include the Azure portal domains used for authentication:
login.microsoftonline.com
aadcdn.msftauth.net
aadcdn.msftauthimages.net
aadcdn.msauthimages.net
logincdn.msftauth.net
login.live.com
msauth.net
aadcdn.microsoftonline-p.com
microsoftonline-p.com
AND/OR
The public IPv4 ranges listed in ID 56 for Microsoft 365 Common and Office Online:
20.20.32.0/19, 20.190.128.0/18, 20.231.128.0/19, 40.126.0.0/18
The above portal domains and public IPv4 addresses are subject to change; for the latest, always consult the latest list in Microsoft 365 Common and Office Online documentation).
2.1 In the Microsoft Entra admin center, navigate from Protection > Conditional Access > Named locations, and select + IP ranges location.
2.2 Enter a name (e.g., Service Tunnel) and the IP address(es) of the relevant Access Tiers.
3.1 Navigate from Entra admin center > Protection > Conditional Access > Policies, and select Create new policy.
3.2 Enter a name for the policy and include the following configurations:
Assignments:
Conditions:
Access Controls:
3.3 Enable the policy, and Save.
If the user DOES NOT have the Service Tunnel connection established, the user will receive an error message indicating that they cannot access the resource (see below). The user(s) must have the relevant Service Tunnel connection established in order to access the resource (e.g., Office 365).