Document 390986

Microsoft Account
Microsoft Account
Ex: [email protected]
User
Windows Azure Active Directory
Organizational Account
Ex: [email protected]
User
Windows Azure
Active Directory
Authentication
platform
Directory
store
Your App
Cloud Identities
Single identity in the cloud
suitable for small organizations
with no integration to onpremises directories
Synchronized Passwords
Single identity
suitable for medium
and large organizations
without federation
Federated Identities
Single federated identity
and credentials suitable
for medium and large
organizations
Cloud IDs
Password Sync
Federated IDs
Same password to access resources on-premises and in cloud
Can control password policies on-premises
Single Sign-on for no password re-entry if on premises
Client access filtering by IP, client type, or by time schedule
Authentication occurs and is audited on-premises
Can immediately block disabled accounts on-premises
Change password available from web
Works with Forefront Identity Manager 2010 R2
Can customize the User Sign-in Page
Use with cloud based Multi-Factor Authentication
Use with on-premises based Multi-Factor Authentication
Source: http://technet.microsoft.com/en-us/library/jj573649.aspx
Source: http://technet.microsoft.com/en-us/library/jj573649.aspx
What is it?
WS-Trust & WS-Federation
Active Directory with ADFS
WS-Federation (passive auth)
SAML (passive auth)
Customer Benefits
• Flexibility to reuse
existing identity
provider
investments
• Confidence that
the solution is
qualified by
Microsoft
• Coordinated
support
between
*For representative
purposes only.
the partner and
Microsoft
coming soon!
Account
Directory
Exchange Orgs
Azure AD
Supported?
Sync Solution
1 AD Forest
1, in AD forest.
1 Tenant
Yes
DirSync
1 AD Forest
n resource forest(s), will retire all
Exchange Forests.
1 Tenant
Yes
DirSync
n AD Forests
n in resource forest(s), will not
retire.
1 Tenant
Yes
FIM + AAD Connector
1 LDAP Directory
N/A
1 Tenant
Yes
LDAP DirSync
n Tenants
Yes
FIM + AAD Connector OR n
DirSyncs
1 AD Forest
Non-AD directory
N/A
n Tenants
Yes
FIM + AAD Connector
n AD Forests +
m non-AD
N/A
n Tenants
Yes
FIM + AAD Connector
Resource Forest
DirSync
(migrate
data)
(“sync,
UPN,
ImmutableID”)
Login Forest
AD FS
Azure AD
Tenant
DirSync
AD Forest
Azure AD
Tenant
AD FS
DirSync
Azure AD
Tenant
Start
Number
Active
Directory
forests
Multiple (>1)
No
Want to
consolidate
single forest?
Single (1)
Yes
See
consolidation
whitepaper
After
consolidation
Use
Single Forest
DirSync
http://technet.microsoft.com/library/cc974332.aspx
Number
Exchange
Orgs
None (0)
Single (1)
Use
FIM 2010 R2
Connectors
http://technet.microsoft.com/library/dn511001.aspx
Exchange
Online
DirSync
Front-Ends
OneDrive
Windows
InTune
(workflows)
GRAPH/PS
Front-Ends
Admin portals
http://www.microsoft.com/downloads/details.aspx?FamilyID=72c15
d25-6515-4763-9b76-054362b58398
Rich Applications (SIA)
•
•
•
•
Cloud IDs
Lync Online
Office Subscriptions
CRM Rich Client
Office 2013
Web Clients
Mail Clients
•
•
•
Office 2010, Office 2007
SP2 with SharePoint
Online
Outlook Web Application
Username and Password
Username and Password
Username and Password
Online ID
Online ID
Online ID
Username and Password
Username and Password
AD credentials
Password Sync Username and Password
(SSO from
non-domain
Joined machines)
AD credentials
AD credentials
SSO IDs
No Prompt
Username
AD credentials
AD credentials
(from domain joined
machines)
•
•
Office 2010, Office 2007
SP2
Active Sync/POP/IMAP
Entourage
Can save credentials
Remember last user
Username and Password
AD credentials
Can save credentials
MEX
Web
Lync 2010/
Office Subscription
Active
AD FS 2.0
Proxy
OWA
Internal
Basic auth
proposal: Pass
client IP, protocol,
device name
Exchange
Online
MEX
Web
Active
Corporate
Boundary
OWA
External
Username
Password
AD FS 2.0
Server
Lync 2010/
Office Subscription
Username
Password
Username
Password
Username
Password
Outlook 2010/2007
IMAP/POP
Outlook 2010/2007
Active Sync
IMAP/POP
Active Sync
Authentication flow (Passive/Web profile)
Customer
Microsoft Online Services
Active Directory
Logon (SAML 1.1) Token
AD FS 2.0 Server
UPN:[email protected]
Authentication platform
Source User ID: ABC123
Auth Token
UPN:[email protected]
Unique ID: 254729
`
Client
(joined to CorpNet)
Exchange Online or
SharePoint Online
Authentication flow (MEX/Rich Client Profile)
Customer
Microsoft Online Services
Active Directory
Logon (SAML 1.1) Token
AD FS 2.0 Server
UPN:[email protected]
Authentication platform
Source User ID: ABC123
Auth Token
UPN:[email protected]
Unique ID: 254729
`
Client
(joined to CorpNet)
Lync Online
Customer
Windows Azure Active Directory
Active Directory
AD FS 2.0 Server
(SAML 1.1) Token
AD FS 2.0Logon
Proxy
UPN:[email protected]
Authentication platform
Source User ID: ABC123
Auth Token
UPN:[email protected]
Unique ID: 254729
`
Basic Auth Credentilas
Username/Password
Client
(joined to CorpNet)
Exchange Online

Excludes Office 365 dedicated SKU and SMB SKUs.
*Out of band refers to being able to use a second factor with no modification
Upgradeable to Azure Multi-Factor Authentication
to the existing app UX.
Multi-Factor Authentication
for Office 365
Windows Azure MultiFactor Authentication
Administrators can Enable/Enforce MFA to end-users
Yes
Yes
Use Mobile app (online and OTP) as second authentication factor
Yes
Yes
Use Phone call as second authentication factor
Yes
Yes
Use SMS as second authentication factor
Yes
Yes
App passwords for non-browser clients (e.g. Outlook, Lync)
Yes
Yes
Default Microsoft greetings during authentication phone calls
Yes
Yes
Custom greetings during authentication phone calls
Yes
Fraud alert
Yes
Event Confirmation
Yes
Security Reports
Yes
Block/Unblock Users
Yes
One-Time Bypass
Yes
Customizable caller ID for authentication phone calls
Yes
MFA Server - MFA for on-premises applications
Yes
MFA SDK – MFA for custom apps
Yes
Overview Identity Management in Office 365
What’s New – be up to date on abilities
Works with Office 365 – Identity program
Exchange Best Practices – Keep it simple
Multi-Factor Authentication