Tag Archives: azure

What is Azure Active Directory?

Azure Active Directory: Introduction

Azure Active Directory is a multi-tenant, cloud-based directory and identity management service provided by Microsoft. It offers identity and access capabilities for applications running in both Microsoft Azure and in an on-premises environment. It is the foundation for Office 365 and other SaaS applications; users are allowed to sign in and access the resources in these applications. As it is entirely cloud based, it offers more flexibility; hence it can act as an organization’s only directory and can also be synced with an on-premises directory.

What is Azure Active Directory used for?

In Azure Active Directory core directory services, access management and identity protection are integrated into a single solution. In a large organization containing thousands of employees, each employee may need to access certain applications and services to perform their tasks. In the absence of Azure AD, the administrator has to provide a separate user ID and password for each application.

For example, a sales manager may need to access a folder containing inventory details, a database containing consumer information and a printer. Without Azure Active Directory, the IT administrator would have to provide a separate set of login credentials such as a user id and password to access each of these resources. This becomes a tedious process if this has to be done in an organization containing thousands of employees. However, with Azure Active Directory, multiple user logins can be handled without any issues. A single set of login credentials is sufficient to access all the services required by the employee. This is enhanced by features such as single sign-on (SSO), multi-factor Authentication (MFA) and conditional access which helps maintain security and ease of access.

Who can use Azure AD?

Azure AD consists of three different types of service audiences namely IT administrators, application developers and online customers.

  • The IT administrators are responsible for authentication and sign-in procedures.
  • Applications are built by the application developers using these services.
  • The online customers use the services provided to them and their needs are taken care of by the service provider.

The service audience can choose an Azure Active Directory plan that works best for their requirements.  

How does Azure AD differ from Windows AD?

While Windows Active Directory is an on-premises directory service, Azure AD Besides the contrast in on-premise and cloud location, there are many other differences listed as follows.

Windows AD is made up of components like organizational units, forests and domains. It uses the Lightweight Directory Access Protocol (LDAP) for communication. It uses Kerberos and NTLM for the process of authentication. It uses Group Policy (GPOs) or other on-premise server management systems and is incapable of managing mobile devices.

Azure AD is composed of a flat directory structure of users and groups, where the instances are called “tenants”. It uses Representational State Transfer (REST) APIs for communication with other web-based services. Cloud based protocols like OAuth2, SAML and WS-Security are used for authorization and authentication. Azure Policy and Azure AD Domain Services are used for managing servers. It is capable of managing mobile devices.

Users and Groups in Azure AD

Users and groups are the basic components that make up Azure Active Directory. Azure resources can only be accessed by users with an Azure user account. This account contains all the authentication information of the user, which is required during the sign-on process. An access token is built after the process of authentication to determine the resources that can be accessed by the user. Users are generally defined in three ways in Azure AD. They are:

  • Administrator users
  • Member users
  • Guest users

Each type of user has a specific level of access. Administrators have the highest level of access followed by members, and the guest users have the lowest level of access.

In Azure Active Directory, users can be organized together to form a group, where the groups behave alike. It is easier to manage permissions using Microsoft Azure AD groups as they may be granted at the group level to make processes like authentication and deactivation easier. Users may either be sourced from an account in Azure AD or from an account in Microsoft. Two different types of groups may be defined in Azure AD. They are:

  • Security groups: These groups can be used to manage and provide access to resources that are shared by a group of users. A security group allows all the members of the group to be provided permissions at once, instead of giving permissions to each member individually. This group may contain users, devices, service principals and other groups as its members.
  • Microsoft 365 groups: This type of group can be used to allow members to access shared Microsoft services such as mailbox, files, calendar, etc. Even external users can be added as members. Unlike security groups, these groups only allow users to be members.

Adding users and groups to Azure AD

Users and groups may be added to Azure AD in the following ways:

  • Syncing users from Windows AD to Azure AD using Azure AD Connect.
  • Adding users manually with the help of Azure Management Portal.
  • Scripting the process with Azure Active Directory PowerShell to add new users.
  • Programming the process using Azure AD Graph API.

The following steps define how to create a basic group in Azure Active Directory and add members to the group.

  1. Sign in to the Azure Portal using a Global Administrator account and select Azure Active Directory.
  2. Once you enter the Azure Active Directory page, select Groups–>New Group, to create a new group.
  3. Enter the required information on the New Group panel such group type, group name, group email address and the group description.
  4. Select a Membership type from the available options such as Assigned, Dynamic user and Dynamic device.
  5. Select Create to create the group and add members.
  6. In the Group page, select the Members option and add members to the group from the Select Members page.
  7. After adding the members, choose the Select option to complete the process.
  8. The members who are added to the group are displayed in the Group Overview page.

Access Management in Azure AD

In Azure AD, access rights can be given to users or groups to use the organization’s resources. Instead of providing access individually, the administrator or resource owner can provide access permissions to the group as a whole. Management rights can also be given to a member of the group, allowing them to add and remove the group members.

Access rights can be provided to users in the following ways.

  1. Direct assignment: The resource is assigned directly to the user, by the resource owner.
  2. Group assignment: The resource is assigned to a group by the owner, which allows all the members of the group to access the resource.
  3. Rule-based assignment: The resource is assigned to the users based on a rule specified by the resource owner. These rules are based on certain attributes assigned to the users.
  4. External authority assignment: The access to the resource is provided by an external source, such as an on-premises directory.

Security in Azure AD

Security can be maintained in Azure Active Directory by performing certain security defaults that are mentioned as follows. This helps protect the organization against both internal and external threats.

  • All users should be required to perform Multi-factor Authentication (MFA).
  • Privileged activities like the Azure portal access should be protected.
  • Legacy authentication protocols should be blocked.

Security defaults can be enabled using the following steps.

  1. Sign in to the Azure portal as a security administrator, global administrator or a Conditional Access administrator and select Azure Active DirectoryàProperties.
  2. Select Manage security defaults and choose the Yes option for Enable security defaults.
  3. Finalize by selecting the Save option.

They can be disabled by following similar steps as mentioned above, and selecting the No option in step 3.

Azure Active Directory Pros and Cons

Azure AD provides high availability and strong security measures. Multi-factor Authentication, Privileged Identity Management and Conditional Access provide an extra layer of security against risks and threats. It is highly flexible and scalable, and is entirely cloud-based. Features like Single Sign-on offer ease of access. On the other hand, Azure AD requires some expertise in managing Microsoft Azure which includes server monitoring and patching. While the single solution offered by Azure AD increases the ease of access, it also increases the risks associated.

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

Microsoft announces Azure Best Practices and Launches Conditional Access Enhancements

Joy Chik, corporate vice president for Microsoft Identity, recently laid out a general overview of Azure AD security best practice. This announcement comes in the light of improvements that were recently announced to Azure Active Directory including conditional access policy management enhancements and synchronization service additions.

Microsoft has suggested that companies using Azure AD follow their five-point best-practices plan. The following is a brief excerpt.
Microsoft wants organizations to move toward a “zero trust” approach to Active Directory. The overview also encourages enterprises to move away from traditional passwords-based approaches to verifying user identities, and adopt Windows Hello for Business, Microsoft Authenticator, and FIDO2 security keys from partners like AuthenTrend, Feitian, or Yubico.” Microsoft also advocates using MFA, a secondary means of verifying user identities in addition to a password.

Azure AD Improvements:

Microsoft announced some enhancements to its Azure AD Connect solution. The service can now use two synchronization services, namely “Azure AD Connect sync which lives on-premises, and Azure AD Connect cloud sync which is powered by the cloud,” Microsoft explained.

Changes to Conditional Access Policy Sorting:

Microsoft has added a search bar to its Azure Portal. Additionally, Azure AD Conditional Access policies now can be sorted by “policy name, state, creation date and modified date.” Users can now use the new “filter” function to filter the policy lists by state, creation time and modified time. Moreover, a count of the Conditional Access policies that are created recently gets shown in the portal, too.

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)