Reader small image

You're reading from  Mastering Identity and Access Management with Microsoft Azure - Second Edition

Product typeBook
Published inFeb 2019
PublisherPackt
ISBN-139781789132304
Edition2nd Edition
Tools
Right arrow
Author (1)
Jochen Nickel
Jochen Nickel
author image
Jochen Nickel

Jochen Nickel is a Cloud, Identity and Access Management Solution Architect with a clear focus and in-depth technical knowledge of Identity and Access Management. He is currently working for inovit GmbH in Switzerland leading and executing projects in the field of Identity and Access Management including Data Classification and Information protection. Jochen is focused on Microsoft Technologies, especially in the Enterprise Mobility + Security Suite, Office 365 and Azure. He is an established speaker at many technology conferences like Azure Bootcamps, TrustInTech Meetups or the Experts Live Switzerland and Europe.
Read more about Jochen Nickel

Right arrow

Chapter 8. Using the Azure AD App Proxy and the Web Application Proxy

As the successor to Chapter 7Deploying Solutions on Azure AD and ADFS, we dig further into the different features of Azure AD and ADFS. We already published the Kerberos on-premises application to external users. We'll do this with another application in this chapter. Furthermore, we will dive into the functionality of the Azure AD app proxy. Additionally, the first usage examples and the basic functionality of conditional access will be shown in this chapter. We do some more claims operation and task customization in Chapter 10Exploring Azure AD Identity Services, and provide examples in the code package for the book. With this chapter, you will get all the information for managing the application integration into Azure AD and ADFS. You will also learn to publish applications with the Azure AD or the Web Application Proxy. Additionally, you will be enabled to use conditional access for securing your application access...

Configuring additional applications for Azure AD and ADFS


We will continue the deployment and configuration of more business apps to allow you to test the different authentication mechanisms. For our support, we configure ServiceNow with SAML and active user provisioning from Azure AD to ServiceNow:

  1. Navigate to Azure Active Directory | Enterprise Applications and add a New Application:

Adding a new Enterprise application

  1. Choose ServiceNow and add the app from the gallery:

Adding ServiceNow

  1. After adding the application, we will configureSAML to authenticate our users:

Using SAML as an authentication method

  1. In the Basic SAML Configuration, we add our ServiceNow instance information, as shown in the following screenshot:

Configuring the SAML options

The following URIs need to be used:

https://.service-now.com/navpage.do
https://.service-now.com

Note

We will use the automatic configuration method for this chapter.

  1. For the manual configuration tasks, you can download the certificate by using the Base64 option...

Publishing with Windows server and Azure AD Web Application Proxy


The Azure AD Application Proxy is similar to the on-premises Web Application Proxy role, starting in Windows Server 2012 R2. With this service, you can enable external access for on-premises applications. Azure AD Application Proxy requires an Azure AD Basic or an Azure AD Premium subscription. The connection is made directly with Azure and done through a proxy into the private network, with an application proxy agent installed on the on-premises web application server.

Let's run a very common use case to include a Kerberos on-premises application into our Azure AD Access UI, https://myapps.microsoft.com. We use our existing application to configure the scenario:

  1. Log in to https://portal.azure.com and choose the Azure Active Directory blade.
  2. Under Application proxy, we first need to download and install the application proxy agent on our YD1APP01 server.

You don't need to install the agent directly on the application server. It...

Using conditional access


In our first conditional access scenario, we will use the Azure AD functionality to secure Salesforce access with Azure MFA:

  1. Navigate to https://portal.azure.com and the Azure AD pane | Conditional Access.
  2. Click New policy:

Creating a Conditional Access policy

  1. Call the new policy Salesforce Protection.
  1. Under assignments, go to Include | All users:

User assignment options

  1. Under Cloud apps | Select apps, choose Salesforce:

Selecting the Salesforce app

  1. Under Conditions | choose Locations | Yes and Any location:

Choosing the location attributes

Note

As you can see, you have many conditions that can be set when you want to fulfill security requirements in the case of additional authentication or access control mechanisms. You can find more information at the following source: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/.

  1. Under Access controls, go to Grant.
  1. Choose Grant access | Require multi-factor authentication:

Using MFA for granting the access

  1. Enable...

Summary


In this chapter, you have learned to configure different authentication scenarios using Azure AD and ADFS capabilities. There are many possible combinations, and we can't provide all of them in one chapter. We gave you an introduction and some of our practical tips to get started and guide you in your upcoming journey through this technology. Don't worry; we jump more and more into some different scenarios in the next chapters of this book to give you as much help as possible. Also, look at the code package for the book; you will find additional practical examples from our projects.

In the next chapter, we will explore more Azure AD identity services, such as Azure AD B2B and B2C.

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Mastering Identity and Access Management with Microsoft Azure - Second Edition
Published in: Feb 2019Publisher: PacktISBN-13: 9781789132304
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £13.99/month. Cancel anytime

Author (1)

author image
Jochen Nickel

Jochen Nickel is a Cloud, Identity and Access Management Solution Architect with a clear focus and in-depth technical knowledge of Identity and Access Management. He is currently working for inovit GmbH in Switzerland leading and executing projects in the field of Identity and Access Management including Data Classification and Information protection. Jochen is focused on Microsoft Technologies, especially in the Enterprise Mobility + Security Suite, Office 365 and Azure. He is an established speaker at many technology conferences like Azure Bootcamps, TrustInTech Meetups or the Experts Live Switzerland and Europe.
Read more about Jochen Nickel