Microsoft Azure Active directory has made many setup and administrative actions so much simpler for IT admins. Azure active directory is multi-tenant, Geo located which means highly available.
Some benefits are
Easy integration of single sign on experience with various types of application including SaaS app access management
- SSO is facilitated via SAML, WS-Federation, OpenID Connect
- Improved and easy use of self-access management
- Monitor the usage, audit and protect your business from advanced threats
- Secure mobile access to on premise environments
- Enables cross business integration easier.
- Multi Factor Authentication capability on per user/application based.
Azure Active Directory is available in three editions
- Can manage users, groups, self-service identity management service
- Azure Active Directory Application proxy (for on premise web based applications)
- Company branding
- SLA 99.9% uptime
AAD Premium P1
- Can manage hybrid users to access the applications seamlessly
- It can manage hybrid user, dynamic groups
- Connect Health
- Automatic password rollover for group accounts
- Enables cloud write back for self-service identity management with on premise active directory
AAD Premium P2
- Advanced Identity protection and privileged Identity management
- Risk based conditional access to the company data
- You can discover, restrict and monitor administrators and their resources then provide JIT access when needed.
Different ways you can configure SSO with Azure Active Directory
Azure AD Single-Sign On
- Users will only see the applications have been granted access to
- redirected to that application and automatically signed in
Password Based SSO Without Identity provisioning
- All users in the directory can see all application that have been configured in the mode
- When users click the application tile, prompted to install SSO plugin, provide a username/password then users will be automatically signing in to the applications
- If user details change, then they have to update credential to keep the application access
Password based SSO with identity provisioning
- When user clicks the application tile, it will be prompted to install SSO plugin and after browser restart it will automatically allow users to login.
Existing SSO Solutions
- This will simply create a link in the application access panel to the existing SSO third party applications
- If an application is already configured with ADFS 2.0 or any other SSO solution will simple allow users to use the same model.
Access Panel is a web-based portal that allows user to view all the application they have granted access by the administrator. Access Panel does not require azure subscriptions (both are completely different)
- Can access via http://myapps.microsoft.com
- custom branding can be accessed via http://myapps.microsoft.com/dinventive.com
- To access apps from mobile, users must install My Apps app published by the azure active directory team.
- Update user password, MFA preferences, View account details, launch apps and self-manage groups
Different ways you can start to integrate SaaS applications.
Note: To set up SSO for an existing application, you need to have global administrator rights in both Azure AD and the SaaS application.
- Apps Available from the Gallery – Follow the simple steps presented on screen.
- Custom Apps – Application should support SAML 2.0 or HTML based sign-in page as a password SSO app
Different Types of Authentication of Users
- WS-Federation (signing certificates to establish trust relationships)
- SAML 2.0 (signing certificates to establish trust relationships)
- OpenID Connect Protocols (signing certificates to establish trust relationships)
- Simple Password forms based sign-in (uses ‘password vaulting’ to establish trust relationships)
Authorization will enable users to access the application after the account is provisioned
Multifactor Authentication Server – Two ways, one is to Manage auth providers directly and second via Service Settings
User the Service Settings if you already have an MFA level account like Azure AD Premium. Otherwise you need to use the option 1.
Three States of MFA are Enabled, Enforced and Disabled.
Can be used with Line of Business Application which is single tenant and SaaS applications which are multi-tenant.
Common Operations are
- Creating new users in the Azure Active Directory
- Get detailed user properties
- Update user Properties
- User group membership for RBAC
- Disable users account and delete it
- Rest API Endpoints (Supports XML or JSON Objects)
- Authentication with AAD (JSON web Token in authorization header)
- RBAC (Security Groups are used to perform RBAC)
- Differential Query (Identify changes between certain times)
- Secured by permission scopes
- Directory Extensions
Two Types of Azure Active Directory are
- AAD B2C – Identity and access management solution for consumer facing solutions and applications
- AAD B2B – Enables collaboration capabilities for working closely with any partners in the world. Help in bringing two different organisations closer and work seemingly
Note: Images are source from Microsoft website