Skip to main content

Azure Insights: Multi-factor authentication; Terraform versions; Portal changes; Azure Stack tenant networks; Stack name resolution

by MSDW Reporter
Editorial Team, MSDynamicsWorld.com

This week, Azure pros share their insights on conditional access policies, pinning Terraform version, Azure portal changes and more.

Setting Azure conditional access policies

Cor den Boer writing on 2 Azure looked into enforcing multi-factor authentication policies for Azure. Boer argues that this added security feature should come enabled by default for Azure and Office 365 users. The feature serves to prevent unauthorized access, blocking sign-ins from infected devices or suspicious IP addresses or cases of impossible travel. He showed how to create a new named location within the Azure portal, such as filling in an office IP range.

From Azure Active Directory, users can configure additional cloud-based MFA settings. However, the new policy section of Azure AD is needed to assign users or pick cloud apps that will be subject to enforcement.

Pinning Terraform versions

FREE Membership Required to View Full Content:

Joining MSDynamicsWorld.com gives you free, unlimited access to news, analysis, white papers, case studies, product brochures, and more. You can also receive periodic email newsletters with the latest relevant articles and content updates.
Learn more about us here

About MSDW Reporter
More about MSDW Reporter