AAD – Using Managed Service Identity (MSI) with Azure App Service and Azure SQL Database

Managed Identity Service is a useful feature to implement for the cloud applications you plan to develop in Azure. You can use this identity to authenticate to any service that supports Azure AD authentication without having any credentials in your code. The credentials never appear in the code or in the source control. It works by defining a service principal ID attributed to either a system-assigned (Azure Service instance) or a user-assigned (Azure stand-alone resource). The difference between both is that for the system-assigned identity, the service principal ID is available […]

Read More →

Azure AD Connect – How to extend your Active Directory Domain to Azure AD ? Part 3 | Federation

What is exactly a federated solution ? It enables applications to redirect to Azure AD for user authentication instead of prompting for its own password. Federated single sign-on is supported for applications that support protocols such as SAML 2.0, WS-Federation, or OpenID Connect, and is the richest mode of single sign-on. It implements an authentication mechanism that can use federated identity. It separates user authentication from the application code, and delegate authentication to a trusted identity provider. This can simplify development and allow users to authenticate using a wider range […]

Read More →

Introduction to Windows Hello

Windows Hello Business With Windows 10 only, Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and uses a biometric or PIN. Windows Hello addresses the following problems with passwords: Strong passwords can be difficult to remember, and users often reuse passwords on multiple sites. Server breaches can expose symmetric network credentials (passwords). Passwords are subject to replay attacks. Users can inadvertently expose their passwords due to phishing attacks. Windows Hello […]

Read More →

Introduction to Seamless SSO

Password Hash Synchronization or pass-through authentification allow users to use same user name and password to log in to cloud applications but this is not a “Seamless” access. Even they are using same user name and password, when log in to Azure workloads it will prompt for password. Azure AD Seamless SSO automatically signs users in when they are on their corporate devices connected to your corporate network. When enabled, users don’t need to type in their passwords to sign in to Azure AD, and usually, even type in their […]

Read More →

AAD – Azure Cloud-based SSO Authentification

Cloud-based users Authentication or Azure AD Single Sign-on with Password Hash Sync   This means enable the user to signed in with an Azure Active Directory account to a 3rd party SaaS application in Azure only. Azure AD collects and securely stores the user account information and the related password. Azure AD can support any cloud-based app that has an HTML-based sign-in page. By using a custom browser plugin, AAD automates the sign-in process via securely retrieving application credentials such as the username and the password from the directory, and […]

Read More →

ADFS – How-to federate with a customer

What is ADFS ? It’s a web service that authenticates your users to Active Directory while also simultaneously providing them access to some claims-aware application (i.e. Office 365). Many times, these applications are typically used through the client’s web browser. The applications can be on-premises, off-premises, or even hosted by other companies. It doesn’t really matter where these applications live, who owns them, as long as they can accept a token with claims. ADFS is an identity access solution that provides client computers (internal or external to your network) with […]

Read More →