How does Azure AD protect my organisation?

I'll assume you've read my first post, which is a gentle introduction to modern authentication.

We now look at some of the security advantages of using Microsoft's Azure AD to act as your Identity Provider.


Azure Active Directory ('AAD') is of course the cloud successor to the very successful Active Directory, a distributed directory of users introduced at around the turn of the century.

Active Directory used a protocol called Kerberos (developed outside of Microsoft in the 80s and 90s) to carry out that all-important authentication handshake and carry tokens around the system.

The Azure version uses OpenID Connect, a widely used authentication protocol built on OAuth 2.0.  This ensures that the user's user name and password are not seen by the relying application, and that only the relying application can read and trust the token from AAD.

Connect your applications

As a company, you configure or write your applications to connect to AAD for authentication, and then your users (let's assume you have users in your AAD) will attempt to access those applications, be redirected to AAD for sign in, sign in successfully with their usual AAD user name and password, and will be passed back to the application to gain access - the flow we discussed previously. 

So far, so good - you've got an ever-green service using the latest industry standard protocols to protect your login information.

More secure

There are, however, other services which provide pretty much the same thing.  What distinguishes AAD is that in addition to supporting the most modern protocols, it also detects suspicious activity and guards against it.

Suspicious activity can be anything from multiple bad password attempts, impossible travel, activity originating at a suspicious IP address, stolen credentials, or being part of a botnet.  Microsoft stores information about some of these but detects others in real time - for example it can uncover botnet activity just because it has so many entry points worldwide which are subject to attack - over AAD, XBox,  , MSN, B2C and so on.

You'll find more info on some of this automatic threat detection here: https://docs.microsoft.com/en-us/azure/security/fundamentals/threat-detection 





Comments

Popular posts from this blog

Microsoft CIAM debuts at Build 2023

LinkedIn now uses Verified ID for Employee verification

Keeping safe beyond sign-in