Reader small image

You're reading from  Mastering Identity and Access Management with Microsoft Azure - Second Edition

Product typeBook
Published inFeb 2019
PublisherPackt
ISBN-139781789132304
Edition2nd Edition
Tools
Right arrow
Author (1)
Jochen Nickel
Jochen Nickel
author image
Jochen Nickel

Jochen Nickel is a Cloud, Identity and Access Management Solution Architect with a clear focus and in-depth technical knowledge of Identity and Access Management. He is currently working for inovit GmbH in Switzerland leading and executing projects in the field of Identity and Access Management including Data Classification and Information protection. Jochen is focused on Microsoft Technologies, especially in the Enterprise Mobility + Security Suite, Office 365 and Azure. He is an established speaker at many technology conferences like Azure Bootcamps, TrustInTech Meetups or the Experts Live Switzerland and Europe.
Read more about Jochen Nickel

Right arrow

Chapter 10. Exploring Azure AD Identity Services

In this chapter, we'll explore the different Azure AD identity services and AD FS as an on-premise identity service. We'll look at the Azure AD B2B and B2C functionality and explain the main concepts behind these technologies. Furthermore, we'll look at and extend the Azure AD Domain Services that we configured in Chapter 1Building and Managing Azure Active Directory. To get the whole picture, we'll also view the different capabilities of the Active Directory Federation Services, and how they support different authentication scenarios. You will learn how to use the Azure AD B2B and B2C services for your projects, in order to provide suitable access to your applications for customers, partners, and internal employees. Particularly, you can use Azure AD B2C as a complete identity platform for your developed applications.

The chapter will be divided into the following sections:

  • Preparing your lab environment
  • Understanding Azure AD Business to...

Preparing your lab environment


In this chapter, we will need to have an additional Azure AD, configured with Office 365, to test the different features. You already know how to create this configuration from Chapter 1Building and Managing Azure Active DirectoryBuild this additional tenant with a minimum set of configurations. Basically, you'll need to have a custom domain verified and registered, and nothing else. Furthermore, you will need to install Visual Studio 2017 Community with the ASP.NET and web development workload on your administrative workstation:

Lab environment overview

To configure the Azure AD Domain Services LDAPS use case, you need to provide a public SSL certificate. You can use the procedure from Chapter 7, Deploying Solutions on Azure AD and AD FS, to generate certificates for your needs with Let's Encrypt solution. We'll start with the Azure AD B2B functionality.

 

 

Understanding Azure AD B2B


Azure AD B2B solves the problem of collaboration between business partners. It allows users to share business applications between partners, without going through inter-company federation relationships and internally-managed partner identities. With Azure AD B2B, you can create cross-company relationships by inviting and authorizing users from partner companies to access your resources. With this process, each company federates once, with Azure AD, and each user is then represented by a single Azure AD account. This option also provides a higher security level, because if a user leaves the partner organization, access is automatically disallowed. Inside of Azure AD, the user will be handled as a guest, and they won't be able to traverse other users in the directory. Permissions of the invited user will be provided over the correct associated group membership.

The following figure shows the process of enabling business partners to access your applications:

Azure AD...

Exploring Azure AD B2C


Azure AD B2C builds a complete identity-management framework for developers and supports signing in to your application using social networks, such as Facebook, Google, or LinkedIn, and creating developed accounts with usernames and passwords specifically for your company-owned application. Self-service password management and profile management are also provided. Additionally, Azure MFA introduces a higher grade of security to the solution. Principally, this feature allows for small, medium, and large companies to hold their customers in a separate Azure Active Directory, with all the capabilities, and more, in a similar way to the corporate-managed Azure Active Directory. With different verification options, you are also able to provide the necessary identity assurance required for more sensible transactions. Azure AD B2C takes care of all of the IAM tasks for your own development activities.

Basically, the minimum architecture with the usage of Azure AD B2C looks...

Extending Active Directory solutions with Azure AD Domain Services


Azure AD Domain Services helps you to move your on-premise applications, depending on traditional authentication methods, such as Kerberos and NTLM, to the cloud. This cloud-based service allows you to join your IaaS virtual machines to a managed domain without the need to provide domain controllers on virtual machines. With this solution, you can integrate your applications directly in your Azure Active Directory services and benefit from the rich feature set. With the synchronization of the Azure AD users to Azure AD DS, you can use identities to provide authentication and authorization. You're also able to connect by Lightweight Directory Access Protocol (LDAP/S) to the directory service. 

The following diagram shows the integration scenario, from the perspective of an application installed on an IaaS virtual machine:

Azure AD Domain Services overview

This service provides you with a flat organizational unit structure and...

AD FS as an on-premise identity service for the cloud


Authenticating users in multi-forest environments is just a bit more complex than doing it in a typical single-forest deployment. You should already be aware of the basics of the different authentication protocols and AD FS, thanks to previous chapters. The configuration of the integration with Office 365 is a straightforward process; with the Convert-MsolDomainToFederated command, you can create everything that's needed in your AD FS configuration. With the SupportMultipleDomain switch, you can define whether you're using a multi-forest scenario.

Next, we'll start with the supported and possible scenarios in the case of using multiple forests and Office 365. We'll focus on the AD FS server deployment. Furthermore, you can always attach an AD FS proxy/WAP to these scenarios.

This section will cover the following scenarios:

  • A typical single-forest deployment
  • Two or more Active Directory forests running separate AD FS instances
  • Running one AD...

Summary


In this chapter, you worked through the different Azure AD identity services, such as Azure AD B2B/B2C and the Domain Services. You also explored different options with AD FS as an identity service, in order to get the whole picture of a hybrid identity and the access-management world.

In the next chapter, we'll dive into different application types and deployment methods, including more details about conditional access and other features that we can use.

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Mastering Identity and Access Management with Microsoft Azure - Second Edition
Published in: Feb 2019Publisher: PacktISBN-13: 9781789132304
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £13.99/month. Cancel anytime

Author (1)

author image
Jochen Nickel

Jochen Nickel is a Cloud, Identity and Access Management Solution Architect with a clear focus and in-depth technical knowledge of Identity and Access Management. He is currently working for inovit GmbH in Switzerland leading and executing projects in the field of Identity and Access Management including Data Classification and Information protection. Jochen is focused on Microsoft Technologies, especially in the Enterprise Mobility + Security Suite, Office 365 and Azure. He is an established speaker at many technology conferences like Azure Bootcamps, TrustInTech Meetups or the Experts Live Switzerland and Europe.
Read more about Jochen Nickel