Significantly increase the number of Banned IPs that can be stored in ADFS.
ADFS 2019 allows for 300 IPs to be added to the "Banned IP list"
As there are nearly four billion public IPs on the internet, 300 is woefully inadequate.
Small customers that are only trying to block a few users aren't likely using ADFS anyway. Large organizations that rely on ADFS will hit the 300 limit almost immediately.
I'd like to see this number raised to 65538 (/16) or something similar.
FYI, this is now possible in ADFS 2019, using a IP list file of any length, if you don't mind building an extension in Visual Studio. There is an overview and a sample project file here:https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/development/ad-fs-risk-assessment-model
Dan Park commented
Both the ADFS bannedIpList count limit of 300 and the Office 365 Set-OrganizationConfig -IPListBlocked limit of~1173 need to be increased. Tried to add a geofence to ADFS, but we would need to write some C# code for that. We're ingesting our ADFS audit data with Elasticsearch and we're seeing access attempts from around the world to our employee Office 365 accounts. Office 365 is probably one of the biggest target on the Internet. Microsoft, please make ADFS more secure!
Agreed. Also, O365 takes 4 hours to propagate, and ~1173 is also too small a number.
The "set-orgconfig" to block iP's from being routed to on-prem ADFS is good to protect for that kind of attach, but a target attack against your public ADFS is still a huge problem and should definitely have more than 300 addresses in the block list! //K
Not to take wind out of my own sail here, but FYI:
If you are attempting to block IPs for use with Office 365 federation, you can do this directly in the tenant via Set-OrganizationConfig -IPListBlocked. In my testing, I was able to add ~1173 entries. Listed IP addresses will not be proxied to AD FS for authentication.