(Updated) IPv6 coming to Azure AD

  • Home |
  • (Updated) IPv6 coming to Azure AD
Microsoft Identity Service Curtain Reveal Tech Bulletin Header

MC498471 – Identity Service, SharePoint Development Services

From Microsoft Corporation
Technical Bulletin MC498471 · Published Jan 17, 2023 · Last updated Feb 9, 2023

ACTION REQUIRED BY MAR 30, 2023

Message Summary

Updated February 9, 2023: We have updated the content below for clarity. Thank you for your patience.

With the growing adoption and support of IPv6 across enterprise networks, service providers, and devices, many customers are wondering if their users can continue to access their services and applications from IPv6 clients and IPv6 networks.

Today, we’re excited to announce our plan to bring IPv6 support to Microsoft Azure Active Directory (Azure AD). This will allow customers to reach the Azure AD services over both IPv4 and IPv6 network protocols (dual stack).

For most customers, IPv4 won’t completely disappear from their digital landscape, so we aren’t planning to require IPv6 or to de-prioritize IPv4 in any Azure Active Directory features or services.

When this will happen:

We’ve been gradually rolling out IPv6 for some of our services for a while. Starting in late March 2023 we’ll begin enabling IPv6 for Azure AD authentication. We will introduce IPv6 support into Azure AD authentication in a phased approach, beginning late March 2023.

What you can do to prepare:

We have guidance below which is specifically for Azure AD customers, who use IPv6 addresses and also use Named Locations in their Conditional Access policies. 

If you have public IPv6 addresses representing your network, take the actions that are described in the following sections as soon as possible.

Customers who use named locations to identify specific network boundaries in their organization, need to:

  1. Conduct an audit of existing named locations to anticipate potential impact;
  2. Work with your network partner to identify egress IPv6 addresses in use in your environment.;
  3. Review and update existing named locations to include the identified IPv6 ranges.

Customers who use Conditional Access location based policies, to restrict and secure access to their apps from specific networks, need to:

  1. Conduct an audit of existing Conditional Access policies to identify use of named locations as a condition to anticipate potential impact;
  2. Review and update existing Conditional Access location based policies to ensure they continue to meet your organization’s security requirements.

Failing to follow these steps might result in the following impact:

  1. Users of IPv6 addresses may be blocked, depending on your organization’s Conditional Access policies and Identity Protection configurations.
  2. False positive detections due to ‘Mark as trust location’ not being checked for your internal networks and VPN’s can result in users being marked as risky.

 We will continue to share additional guidance on IPv6 enablement in Azure AD here: IPv6 Support in Azure Active Directory

Learn more about Microsoft identity:

Recent Comments

No comments to show.

Recent Posts

Microsoft 365 Curtain Reveal Tech Bulletin Header
New Outlook for Windows: Auto-reading emails with Microsoft Windows Narrator
October 14, 2024
Microsoft 365 Curtain Reveal Tech Bulletin Header
(Updated) Microsoft Purview: Minor encrypted message portal design updates, URL to remain the same
October 14, 2024
Microsoft Exchange Curtain Reveal Tech Bulletin Header
(Updated) Microsoft Defender for Office 365: Tenant Allow/Block List will support IPv6 allow and block entries
October 14, 2024