Upgrade & Secure Your Future with DevOps, SRE, DevSecOps, MLOps!
We spend hours on Instagram and YouTube and waste money on coffee and fast food, but wonβt spend 30 minutes a day learning skills to boost our careers.
Master in DevOps, SRE, DevSecOps & MLOps!
Learn from Guru Rajesh Kumar and double your salary in just one year.
Source:-redmondmag.com
Microsoft offered an overview of its recent Azure Active Directory release milestones, including free single sign-on access (SSO) for all of its online services subscribers, per a Thursday announcement.
SSO is a facility for end users, allowing them to log in once and have access to various applications without having to go through the same identity verification process each time. If an organization has an Azure AD subscription, even the free version, then they can now use SSO with their applications.
Hereβs Microsoftβs characterization of the new free SSO capability:
Whether you need gallery apps or non-gallery apps, using OIDC, SAML or password SSO, we have removed the limit on the number of apps each user can be assigned for SSO access in Azure AD. This means any Microsoft customer using a subscription of a commercial online service such as Azure, Office 365, Dynamics and Power Platform can enable SSO for all their cloud apps, even with Azure AD Free. This complements our earlier announcement that multi-factor authentication (MFA) along with security defaults is free across all Azure AD pricing tiers, so every one of your apps can also be protected.
New Azure AD Features at General Availability
Microsoftβs announcement also listed the following Azure AD capabilities that have recently reached βgeneral availabilityβ commercial-release status. Access to these features sometimes requires having Azure AD Premium licensing in place to use them.
The βbulk operations for users and groupsβ feature lets IT pros use comma-separated value (CSV) files to import or export users or groups. It can be used to do things like βdelete users, update group memberships as well as download users, groups and group memberships,β the announcement indicated.
IT pros also now have access to the βreport-only mode for Azure AD Conditional Accessβ feature. It lets them see the effects of Conditional Access policy changes before going live with them.
The βContinuous Access Evaluationβ feature, which checks for changed conditions after a user has been granted access, is available for use with Exchange Online and Microsoft Teams applications. Microsoftβs Continuous Access Evaluation solution derives from an OpenID Foundation developing standard, as described last month.
Also last month, Microsoft described a βcombined MFA and password reset registrationβ feature for end users thatβs available. Itβs an easier way for end users with mobile devices to set up multifactor authentication (a secondary ID verification scheme) and self-service password reset capabilities. They can do the setup themselves using the My Profile Website or the Microsoft Authenticator App.
A new βtoken configurationβ capability permits the customization of βaccess tokens, id tokens and SAML tokens to include additional claims.β It can be used by application developers to βspecify which claims they want in tokens sent to their application,β per Microsoftβs documentation.
The ability to configure βSAML token encryptionβ for applications, which is an Azure AD Premium feature, is now commercially available. Encrypting a SAML token is an added assurance, since βAzure AD already sends SAML tokens on an encrypted HTTPS transport channel,β the announcement explained.
Azure AD Features at Preview
A couple of new Azure AD previews were announced.
The βDynamic Groups rule validationβ feature lets IT pros validate the rules that are set for the inclusion of users in Dynamic Groups. The Dynamic Groups capability has been around for over five years, but Microsoft is now previewing the ability of IT pros to validate these rules by βchecking if specific users will be members of a dynamic group or not.β
Microsoft also has an βadministrative unitsβ preview that lets IT pros βlogically group users and devices and then delegate administration of those users and devices.β Microsoft defines an administrative unit as βan Azure AD resource that can be a container for other Azure AD resources.β
Administrative units are conceived as being useful for delegating tasks when organizations have βmultiple independent departmentsβ overseen by different administrators, as might be the case in a large university having multiple schools. A βBusiness Schoolβ administrative unit might be created, for instance.
Azure AD B2B and B2C Additions
Microsoft also described a few improvements for tenancies using its Azure AD Business to Business (B2B) and Azure AD Business to Consumer (B2C) services.
Microsoft has βredesigned B2B collaboration invitation emailsβ used to establish resource sharing with external business partners. The newly designed invitation, now generally available, βprovides external users with more clarity to help make an informed decision for accepting the invitation,β the announcement indicated.
Azure AD B2B tenancies also now have access to a preview that will let them βinvite internal users to B2B collaboration.β This preview is designed for organizations that collaborated with external users but didnβt treat them as guest users. IT pros can use this feature to switch them to guest users and still βretain their user ID, user principal name, group memberships as well as app assignments,β the announcement explained.
Lastly, Azure AD B2C tenancies now have βsecure access to SAML-based applications,β a capability that has reached the general availability stage. It means that βall OIDC, OAUTH, and SAML-based identity providers such as Salesforce, Facebook, Google, and Active Directory Federation Services (ADFS) can be offered to your users,β Microsoft explained.
Azure AD for Zero Trust Security
If all of that info wasnβt enough Azure AD news, Microsoft outlined its vision and technologies that can be used to get to a so-called βzero trustβ security state in this Thursday announcement.
βA Zero Trust strategy requires that we verify explicitly, use least privileged access principles, and assume breach,β explained Tarek Dawoud, a Microsoft principal program manager. βAzure Active Directory can act as the policy decision point to enforce your access policies based on insights on the user, device, target resource, and environment.β
The technologies needed for this zero trust solution involve Azure AD Premium P1 or P2 licensing at minimum, but top-tier Microsoft 365 E5 licensing sometimes got mentioned, as well.