Azure Active directory (AAD) is a Identity as a Service.
This is a smaller subset of Active directory. This is not a replacement to active directory at all.
Azure active directory provides the identity services to the mobile apps and web apps in Private cloud.
These apps may be connected to on-premise applications. So an SSO is enabled for these apps.
So Azure active directory has very simple functionality.
Create Users, Groups. Map groups to network security groups and provide the authentication to the resources.
When you login to Azure portal, right upper corner of the screen has username along with the domain.
Domain or tenant or organization are used interchangeably.
Management of Users and Groups:
- Cloud identity (create users manually)
- Directory synchronized identifiers (users are synchronized)
Add users
Adding a cloud identity users makes the user as Guest
When you do directory synchronization on Premise AD Groups are synched up with Azure AD groups
Custom Domain
You can add your custom domain to AAD
Azure may take up to 72 hours to verify the Domain
You have to create a TXT file and submit for verification
Powershell
- MSOnline module (older)
- Azure AD V2 module (new)
Custom Directory or Tenant
Click on Create -> New.
Type Directory. Select Azure Active Directory
Select Azure Active Directory
Click Create. You will get a new screen to Create Directory.
Provide Organization name, Initial domain name and Country or region to create your new directory.
Once the directory is created, you can switch between the directories.
Look at the left upper corner where you name appears, click on that, you will be shown the directories you have access to.
You can click on the directory and you will be taken to that portal
By default we have one directory assigned when user is created. We are in that default directory.
What is the purpose of Azure Active Directory?
Identification is the primary purpose, especially for Cloud applications.
You can also enable SSO
Windows Servers Active Directory is not same as Windows Azure Active Directory
Windows Servers AD:
Domin Services
LW Services
Certification services
Federation Services
Rights Management Services
Users
LDAP, DNS, Network Services etc
Azure AD:
AAD - Identity
Azure Access control services (federated identity services from external providers)
Uses REST APIs and Identify protocols
You cannot migrate enterprise application built for Windows Servers AD to Azure AD.
You have to build your services keeping in mind about Azure AD
Office 365
We use these services everyday.
- Exchange online
- Sharepoint online
- Lync online
Azure AD is build to support
- Office 365 applications,
- Cloud applications
- Internet
The technologies that are used within organization for providing SSO are not good enough to span the internet.
So when an application is moved to cloud, user cannot use the advantage of SSO and have to be created a new userid-password.
Traditional tree model access is retrieved by querying using LDAP protocols. (if you want managers manager etc)
The same concept is used in Azure AD and is exposed using a REST API - Graph API
Azure AD is a distributed services that lives in Cloud
It exposes interfaces like
- Graph API
- Authentication end points for
- oAUTH
- SAML protocol
- WS - Federation
Azure AD is a service, it contains data inside it.
Data is like tenant, users, groups
Each customer can look only his data. He can manage data using Azure portal
For a customer to configure an application, they create an service principal in the tenant.
This is an object that describes the application principal id and secret key.
App is set up so that it is linked with service principal.
When a user access the application, app redirects it to Azure AD authentication end point.
Azure AD pops up the authentication page and user signs in.
Azure AD then sends the user id, digitally signed in as a token.
App reads the token and in some cases also maintains the DB of user profiles.
Note that app never keeps the user password in DB, authentication is done by Azure AD.
Using the token, app knows the user id and gets the profile information from DB.
If the App requires more information about user, like user manager it can use Graph API and get the information
This kind of scheme will work for, giving SSO
- Office 365 applications
- on premise applications
- applications deployed on Azure
- internet connected applications with Azure AD
To extend this to all service on premise like share point, printer. LOB etc
install Azure AD Federation service. This gives SSO services for everything.
Synch up tool will synch up information between Azure AD and Windows AD.
You can have authentication done in Windows AD, so that when a user leaves the organization automatically his login is disabled for all applications.
Traditionally if you want to access resources outside of your company, there are limits of firewalls, security, VPN requirements etc.
Also a user need to be created in external resources every time some body needs access.
To avoid this we can use Federation services. (ADFS)
Azure Active Directory has federation services with many well known applications.
Organizations can federate with Azure, so that Azure does the required authentication and provide access to the applications.
Administrators can restrict which applications users can access.
Comments
Post a Comment