Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Mastering Identity and Access Management with Microsoft Azure. - Second Edition

You're reading from  Mastering Identity and Access Management with Microsoft Azure. - Second Edition

Product type Book
Published in Feb 2019
Publisher Packt
ISBN-13 9781789132304
Pages 698 pages
Edition 2nd Edition
Languages
Author (1):
Jochen Nickel Jochen Nickel
Profile icon Jochen Nickel

Table of Contents (23) Chapters

Title Page
Copyright and Credits
About Packt
Contributors
Preface
1. Building and Managing Azure Active Directory 2. Understanding Identity Synchronization 3. Exploring Advanced Synchronization Concepts 4. Monitoring Your Identity Bridge 5. Configuring and Managing Identity Protection 6. Managing Authentication Protocols 7. Deploying Solutions on Azure AD and ADFS 8. Using the Azure AD App Proxy and the Web Application Proxy 9. Deploying Additional Applications on Azure AD 10. Exploring Azure AD Identity Services 11. Creating Identity Life Cycle Management in Azure 12. Creating a Security Culture 13. Identifying and Detecting Sensitive Data 14. Understanding Encryption Key Management Strategies 15. Configuring Azure Information Protection Solutions 16. Azure Information Protection Development 1. Other Books You May Enjoy Index

Provide user and group-based application access


In this section, we configure a typical workplace, which a user can access under the Access Panel UI (https://myapps.microsoft.com). We assign applications to users and groups to see the different capabilities. The steps don't contain all single sign-on or provisioning options. We will discuss these feature sets later in specific chapters.

Log in to https://portal.azure.com with your Global Administrator credentials and add several applications from the application gallery under the Enterprise applications section. After adding the applications, we assign the accounts, which are to be provided access.

Build a list of applications like the following, and assign all groups to access the applications, except the one with user provisioning:

Azure AD application management

Note

You will note the differences in the format with and without user provisioning.

Test your newly configured workplace and log in as don.hall@domain.onmicrosoft.com to https://myapps.microsoft.com:

Azure AD access panel UI - application access

Also, test the user experience on Office 365 and log in as don.hall@domain.onmicrosoft.com to https://portal.office.com.

Next, we will assign applications to users.

Assign applications to users and define login information

In the next step, we will assign the LinkedIn application to Don Hall, with the company credentials. Don Hall will not be able to see the credentials. So, if he leaves the company, the credentials are still protected.

Add the LinkedIn application from the application gallery and assign Don Hall to access this application:

Application - Users and Groups assignment

Next, we provide valid LinkedIn credentials. If you don't have a LinkedIn account, register a demo one:

Azure AD Credentials store

Note

If you assign an application to a group, you can decide whether the credentials will be shared:

The following options for working with credential sets are available:

  • View with shared credentials: Users can view this just a few seconds after clicking the application. Test it with the Twitter app.
  • View with no shared credentials: Users need to add the preferred credentials once. Test it with the Twitter app.

Note

You get the same behavior if you, as the administrator, don't provide the credentials.

Test this behavior with the user account, assign applications to groups, and define login information.

Assign applications to groups and define login information

In the next steps, we do the same for groups, such as an HR group that uses these groups to get news from an individual Twitter channel:

Filling the Azure AD Credentials store for application access

Add the Twitter app from the application gallery. Assign the HR group and configure the credentials. Check the application at https://myapps.microsoft.com with a user of the HR group.

Now, we can configure the self-service application management.

Self-service application management

In this section, we allow users to add their applications to their workplace under https://myapps.microsoft.com to enjoy the Single Sign-On feature. Under your Azure AD in the Configure section, navigate to Enterprise applications. Activate the function shown here:

Enterprise applications management options

Log in as Ellen.Adams@domain.onmicrosoft.com to https://myapps.microsoft.com. Click Get more applications and add MailChimp. After you add MailChimp, click Manage applications and choose MailChimp.

As admin@domain.onmicrosoft.com on https://manage.windowsazure.com, you can see the newly added application under the Enterprise applications section of your Azure AD.

Configure the application, add some users, and test it!

You have been reading a chapter from
Mastering Identity and Access Management with Microsoft Azure. - Second Edition
Published in: Feb 2019 Publisher: Packt ISBN-13: 9781789132304
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}