Hello @Ros Gray
Unfortunately, there isn’t a native Conditional Access configuration that forces an MFA prompt solely on an IP address change for an existing session.
That's why your MFA configuration items are just;
1- Named Locations
2- Risk-Based Conditional Access (Azure AD Identity Protection): Incorporate risk evaluation into your Conditional Access policies.
Here are some details and workarounds that might help clarify the situation:
Why It Doesn’t Work Out-of-the-Box
- Token Lifetimes & Session Management: Once a user successfully signs in and receives access/refresh tokens, those tokens are valid for a duration defined by your token lifetime policy and your session controls. Even if the IP address later changes, the session continues to remain authenticated until the token expires or an event forces a new authentication request. This is why reducing the session sign-in frequency to “every time” triggers MFA every time (which is often more than you’d like) while a longer period (e.g., 8 hours) carries over even after an IP change.
- Conditional Access Limitations: The Conditional Access engine currently evaluates conditions during the sign-in event. If the sign-in occurs from a new or untrusted location, you can require MFA. However, once the session is established, it isn’t re-evaluated continuously based on changes in the client’s IP address.
If you found it helpful, could you kindly click the “Accept Answer and upvote” on the post.
If you have any further queries, please let us know we are glad to help you.