Edit

Share via


Source IP restoration

When you use cloud-based network proxy and SSE solutions, they abstract the original source IP of the user from the service that the user connects to. Instead, the service detects the user's IP address as the egress address of the cloud-based network proxy. While this abstraction helps with privacy-related concerns in consumer scenarios, not having the original source IP information makes it difficult to achieve enterprise security goals. For example, without an actual client egress IP address, you can't apply Microsoft Entra ID Conditional Access policies based on your organization's well-known IP addresses, and audit logs don't reflect accurate location information.

Source IP restoration is part of the Adaptive Access feature of Microsoft Entra Internet Access for Microsoft Services. Source IP restoration detects and securely communicates the original egress IP address of the end user to Microsoft Entra ID and Microsoft Graph, bringing the following benefits to your organization:

Note

To achieve source IP restoration for non-Microsoft apps, you must also configure Conditional Access policies and ensure traffic flows through a compliant network. For more information, see Enable compliant network check with Conditional Access.

Prerequisites

Known limitations

For detailed information about known issues and limitations, see Known limitations for Global Secure Access.

Enable Global Secure Access signaling for Conditional Access

Note

Source IP restoration is now enabled by default for new tenants. If you enabled Global Secure Access features in your tenant before June 2025, you might need to explicitly enable source IP restoration.

To enable the required setting to allow source IP restoration, an administrator must take the following steps.

  1. Sign in to the Microsoft Entra admin center as a Global Secure Access Administrator.
  2. Browse to Global Secure Access > Settings > Session management > Adaptive Access.
  3. Select the toggle to Enable Conditional Access Signaling for Microsoft Entra ID.

By using this functionality, Microsoft Entra ID and Microsoft Graph receive the public egress source IP address of the user.

Screenshot showing the toggle to enable Conditional Access Signaling for Microsoft Entra ID.

Caution

If your organization has active Conditional Access policies based on IP location checks, and you disable Global Secure Access signaling in Conditional Access, you might unintentionally block targeted end users from accessing the resources. If you must disable this feature, first delete any corresponding Conditional Access policies.

Sign-in log behavior

To see source IP restoration in action, administrators can take the following steps.

  1. Sign in to the Microsoft Entra admin center as at least a Security Reader.
  2. Browse to Entra ID > Users > select one of your test users > Sign-in logs.
  3. When you enable source IP restoration, you see IP addresses that include the user's actual IP address.
    • When you disable source IP restoration, you can't see the user's actual IP address.

Sign-in log data might take some time to appear. This delay is normal because the data undergoes some processing before it appears.

Screenshot of the sign-in logs showing events with source IP restoration on, then off, then on again.