CA policy requires corporate network. VPN requires CA to pass. How is anyone solving this
Genuinely losing my mind here
entra conditional access is set to require trusted location (corporate network) for anything sensitive. fine. but the VPN client authenticates through entra before the tunnel is up so CA fires before the user is on the corporate network. CA fails. VPN won't connect. user can't get on the corporate network. CA can't be satisfied.
we inherited this setup. previous admin apparently just excluded VPN auth from CA entirely which is... not great. i put that exclusion back because security team flagged it in a review and now i have 40 tickets.
i've been reading about always-on VPN with device compliance as the signal instead of network location but that's a full MDM project and i don't have 3 months for that right now.
is there a middle ground here that doesn't require either gutting CA or a 3 month rollout. running GlobalProtect + entra ID, about 200 users, hybrid joined devices mostly win11 but a handful of older stuff