πŸš€ DevOps Certified Professional
πŸ“… Starting: 1st of Every Month 🀝 +91 8409492687 | 🀝 +1 (469) 756-6329 πŸ” Contact@DevOpsSchool.com

Microsoft Adds Single Sign-On Access for All Azure Active Directory Users

Azure

Upgrade & Secure Your Future with DevOps, SRE, DevSecOps, MLOps!

We spend hours on Instagram and YouTube and waste money on coffee and fast food, but won’t spend 30 minutes a day learning skills to boost our careers.
Master in DevOps, SRE, DevSecOps & MLOps!

Learn from Guru Rajesh Kumar and double your salary in just one year.


Get Started Now!

Source:-redmondmag.com

Microsoft offered an overview of its recent Azure Active Directory release milestones, including free single sign-on access (SSO) for all of its online services subscribers, per a Thursday announcement.

SSO is a facility for end users, allowing them to log in once and have access to various applications without having to go through the same identity verification process each time. If an organization has an Azure AD subscription, even the free version, then they can now use SSO with their applications.

Here’s Microsoft’s characterization of the new free SSO capability:

Whether you need gallery apps or non-gallery apps, using OIDC, SAML or password SSO, we have removed the limit on the number of apps each user can be assigned for SSO access in Azure AD. This means any Microsoft customer using a subscription of a commercial online service such as Azure, Office 365, Dynamics and Power Platform can enable SSO for all their cloud apps, even with Azure AD Free. This complements our earlier announcement that multi-factor authentication (MFA) along with security defaults is free across all Azure AD pricing tiers, so every one of your apps can also be protected.

New Azure AD Features at General Availability

Microsoft’s announcement also listed the following Azure AD capabilities that have recently reached β€œgeneral availability” commercial-release status. Access to these features sometimes requires having Azure AD Premium licensing in place to use them.

The β€œbulk operations for users and groups” feature lets IT pros use comma-separated value (CSV) files to import or export users or groups. It can be used to do things like β€œdelete users, update group memberships as well as download users, groups and group memberships,” the announcement indicated.

IT pros also now have access to the β€œreport-only mode for Azure AD Conditional Access” feature. It lets them see the effects of Conditional Access policy changes before going live with them.

The β€œContinuous Access Evaluation” feature, which checks for changed conditions after a user has been granted access, is available for use with Exchange Online and Microsoft Teams applications. Microsoft’s Continuous Access Evaluation solution derives from an OpenID Foundation developing standard, as described last month.

Also last month, Microsoft described a β€œcombined MFA and password reset registration” feature for end users that’s available. It’s an easier way for end users with mobile devices to set up multifactor authentication (a secondary ID verification scheme) and self-service password reset capabilities. They can do the setup themselves using the My Profile Website or the Microsoft Authenticator App.

A new β€œtoken configuration” capability permits the customization of β€œaccess tokens, id tokens and SAML tokens to include additional claims.” It can be used by application developers to β€œspecify which claims they want in tokens sent to their application,” per Microsoft’s documentation.

The ability to configure β€œSAML token encryption” for applications, which is an Azure AD Premium feature, is now commercially available. Encrypting a SAML token is an added assurance, since β€œAzure AD already sends SAML tokens on an encrypted HTTPS transport channel,” the announcement explained.

Azure AD Features at Preview
A couple of new Azure AD previews were announced.

The β€œDynamic Groups rule validation” feature lets IT pros validate the rules that are set for the inclusion of users in Dynamic Groups. The Dynamic Groups capability has been around for over five years, but Microsoft is now previewing the ability of IT pros to validate these rules by β€œchecking if specific users will be members of a dynamic group or not.”

Microsoft also has an β€œadministrative units” preview that lets IT pros β€œlogically group users and devices and then delegate administration of those users and devices.” Microsoft defines an administrative unit as β€œan Azure AD resource that can be a container for other Azure AD resources.”

Administrative units are conceived as being useful for delegating tasks when organizations have β€œmultiple independent departments” overseen by different administrators, as might be the case in a large university having multiple schools. A β€œBusiness School” administrative unit might be created, for instance.

Azure AD B2B and B2C Additions

Microsoft also described a few improvements for tenancies using its Azure AD Business to Business (B2B) and Azure AD Business to Consumer (B2C) services.

Microsoft has β€œredesigned B2B collaboration invitation emails” used to establish resource sharing with external business partners. The newly designed invitation, now generally available, β€œprovides external users with more clarity to help make an informed decision for accepting the invitation,” the announcement indicated.

Azure AD B2B tenancies also now have access to a preview that will let them β€œinvite internal users to B2B collaboration.” This preview is designed for organizations that collaborated with external users but didn’t treat them as guest users. IT pros can use this feature to switch them to guest users and still β€œretain their user ID, user principal name, group memberships as well as app assignments,” the announcement explained.

Lastly, Azure AD B2C tenancies now have β€œsecure access to SAML-based applications,” a capability that has reached the general availability stage. It means that β€œall OIDC, OAUTH, and SAML-based identity providers such as Salesforce, Facebook, Google, and Active Directory Federation Services (ADFS) can be offered to your users,” Microsoft explained.

Azure AD for Zero Trust Security

If all of that info wasn’t enough Azure AD news, Microsoft outlined its vision and technologies that can be used to get to a so-called β€œzero trust” security state in this Thursday announcement.

β€œA Zero Trust strategy requires that we verify explicitly, use least privileged access principles, and assume breach,” explained Tarek Dawoud, a Microsoft principal program manager. β€œAzure Active Directory can act as the policy decision point to enforce your access policies based on insights on the user, device, target resource, and environment.”

The technologies needed for this zero trust solution involve Azure AD Premium P1 or P2 licensing at minimum, but top-tier Microsoft 365 E5 licensing sometimes got mentioned, as well.

Subscribe
Notify of
guest


This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x