Restrict CyberDrain Improved Partner Portal (CIPP) Access to a Specific IP Address Using Conditional Access

7 min. readlast update: 04.20.2026

Overview

CIPP (CyberDrain Improved Partner Portal) is a self-hosted or CIPP-as-a-Service multi
tenant Microsoft 365 management platform. Unlike other applications in this KB series, 
CIPP is not a third-party SaaS app that Entra ID federates with. It is deployed inside the 
MSP's own Azure tenant and its access is controlled entirely by the MSP's own Entra ID 
Conditional Access policies. 


Because CIPP has no external SAML trust relationship to configure, restricting access by IP 
is done by creating a Named Location and Conditional Access policy in the MSP's Entra ID 
tenant — the same tenant where CIPP is deployed. There is no SAML enterprise application 
to target in a client tenant. 


CIPP has three distinct access layers, each requiring a different configuration approach:

 

Access Layer How it is Secured Where to Configure
CIPP UI (technician access)  Secured by Entra ID CA policies in the MSP's own tenant. Restrict by IP using 
a Named Location policy targeting All cloud apps or specific Azure app registrations.
Part A of this article.
CIPP Service Account  A dedicated Entra ID account used by 
CIPP to call the Microsoft Graph API. CIPP documentation requires its own CA policy enforcing MFA on every sign in, with no trusted location exclusions. 
Part B of this article. 
CIPP-API (programmatic 
access)
CIPP's built-in API for RMM/PSA integrations. Has a native IP  allowlist configured within CIPP Application Settings, independent of Entra ID CA.  Part C of this article.

Important: CIPP accesses client tenants via GDAP (Granular Delegated Admin 
Privileges). Client tenants may have their own Conditional Access 
policies that can block the CIPP service account from accessing client 
resources. This is addressed separately in Part D of this article.

 

Prerequisites

Before proceeding, confirm the following are in place:

  • Microsoft Entra ID P1 or P2 license in the MSP's tenant — required for 
    Conditional Access. 
  • Conditional Access Administrator role or higher in the MSP's Entra ID tenant.
  • Security Defaults Disabled in the MSP's tenant
  • Known static IP address -  the public IP address or CIDR range of each approved location.
  • Break-glass admin account in the MSP's tenant - must be excluded from IP restriction policies.

Step 1: Create a Named Location for Your Trusted IP(s)

A Named Location defines the trusted IP addresses that Entra ID will reference as a condition in the policy.

  1. Sign in to the Microsoft Entra admin center at entra.microsoft.com using the MSP's 
    tenant credentials.
  2. Navigate to Protection > Conditional Access > Named locations.
  3. Select + IP ranges locations.
  4. Name the location. For example: Trusted - MSP Office
  5. Check the Mark as trusted location checkbox.
  6. Enter your approved IP address or CIDR range and click Create.
Field/Setting Value/Notes
Single IP address 203.0.113.10/32
IP range (CIDR) 203.0.113.0/24

 

Part A: Restrict CIPP Technician Access by IP 

CIPP technicians sign in to the CIPP UI using their Entra ID accounts in the MSP's tenant. 
Because the CIPP frontend is an Azure Static Web App registered in the MSP's tenant, a 
Conditional Access policy targeting All cloud apps will cover CIPP UI access alongside all 
other cloud resources in the tenant.

Please Note: If your organization already has a broad IP restriction policy covering all cloud apps in the MSP's tenant, CIPP UI access is already restricted by that 
policy. Confirm your existing policies before creating a new one to avoid conflicts.

. In the Entra admin center, navigate to Protection > Conditional Access > Policies and 
select + New policy. 
2. Name the policy — for example: Block CIPP Access - Outside Trusted IPs 
3. Under Assignments > Users, select the group or users who have CIPP access. Exclude 
your break-glass admin account. 
4. Under Target Resources, select All cloud apps, or select the specific CIPP Azure 
Static Web App registration if you prefer a narrower scope. 
5. Under Conditions > Locations, set Configure to Yes. Set Include to Any location and 
Exclude to your Named Location from Step 1. 
6. Under Access Controls > Grant, select Block access. 
7. Set Enable policy to Report-only, validate in sign-in logs, then switch to On.

Part B: Conditional Access Policy for the CIPP 
Service Account 

The CIPP service account is a dedicated Entra ID account that CIPP uses to call the 
Microsoft Graph API across client tenants. CIPP's own documentation specifies a distinct CA policy for this account, and the requirements differ importantly from the technician access 
policy.

Important: CIPP's documentation explicitly states that the service account CA 
policy must enforce MFA on every single sign-in and must NOT include any trusted location exclusions. Do not add your Named Location as an exclusion to this policy. The reasoning is that the CIPP service account should always complete MFA regardless of source IP — relaxing this for trusted IPs weakens the security posture of access to all managed client tenants.

1. In the Entra admin center, navigate to Protection > Conditional Access > Policies and 
select + New policy. 
2. Name the policy: CIPP Service Account Conditional Access Policy 
3. Under Assignments > Users, include only the CIPP service account user. 
4. Under Target Resources, select All cloud apps. 
5. Under Access Controls > Grant, select Grant access and require Azure Multi-Factor 
Authentication. 
6. Under Session, set Sign-in frequency to Every time to require MFA on every sign-in. 
7. Do not add any location conditions or trusted location exclusions. 
8. Set Enable policy to On.

Part C: Restrict CIPP-API Access by IP (Programmatic Access) 

If your organization uses the CIPP-API for integration with RMM tools, PSA platforms, or 
automation workflows, access can be restricted by IP directly within CIPP's Application 
Settings — independently of Entra ID Conditional Access.

1. In the CIPP portal, navigate to CIPP > Integrations > CIPP-API. 
2. Locate the API client you wish to restrict in the table. 
3. Select the Actions menu (three dots) and choose Edit. 
4. In the Allowed IP Ranges field, enter the approved IP addresses or CIDR ranges that 
are permitted to use this API client. Supports both IPv4 and IPv6 in CIDR notation. 
5. Click Save, then select Actions > Save Azure Configuration to apply the changes to 
the Function App authentication settings.

Please Note: The CIPP-API IP allowlist is per API client. If you have multiple API clients configured, each one must be restricted individually. Clients with no IP 
ranges specified are accessible from any IP.

Part D: Exclude the MSP from Client Tenant Conditional Access Policies 

When CIPP accesses client tenants via GDAP, client Conditional Access policies are 
evaluated for the CIPP service account. If a client tenant has IP-based or other Conditional 
Access policies without an exclusion for the MSP tenant, CIPP will be blocked from 
managing that client. 


To prevent this, each client tenant's Conditional Access policies should include an exclusion 
for the MSP's tenant ID.

1. In the Microsoft Entra admin center, navigate to the client tenant (or use CIPP to 
access the client tenant's CA policies). 
2. For each Conditional Access policy in the client tenant, open the policy and navigate 
to Assignments > Users. 
3. Under Exclude, select Guest or external users, then choose Service Provider Users. 
4. Enter the MSP's tenant ID in the field provided. 
5. Save the policy. Repeat for all active policies in the client tenant.

 

Please Note:  If you are running CIPP in Direct Tenant mode rather than GDAP mode, exclude the specific CIPP service account user for that tenant instead of using the tenant-wide exclusion.

 

Summary

The following table summarizes the full configuration process.

Step Action
Step 1 Create a Named Location with trusted MSP IP addresses in the 
MSP's Entra ID tenant
Part A Create a CA policy restricting CIPP technician sign-ins by IP using 
the Named Location — targeting All cloud apps or the specific 
CIPP app registration
Part B Create the CIPP Service Account CA policy enforcing MFA on every 
sign-in — no location exclusions
Part C Restrict CIPP-API clients by IP using the native Allowed IP Ranges 
setting in CIPP Application Settings
Part D Add MSP tenant ID exclusions to each client tenant's CA policies to 
ensure GDAP-based access is not blocked
Was this article helpful?