Blog Post

Microsoft Entra Blog
3 MIN READ

OpenID Connect and OAuth 2.0 support in Azure Active Directory has GA’d!

Alex Simons (AZURE)'s avatar
Sep 07, 2018
First published on CloudBlogs on Sep, 09 2014
Howdy folks, Today Azure AD reaches an important milestone. I am excited to announce that OpenID Connect and OAuth 2.0 support in Azure Active Directory reached general availability! Industry-standard protocol support is at the very heart of any Identity as a Service solution. We invested a lot of time and energy to ensure we would offer you a world-class experience end to end, from the endpoints performance, manageability and compliance to the usability of our developer libraries. Here there is what we are making available for you today: ADAL v2 for the Microsoft platforms follows closely the GA of the 1.0 versions of ADAL for iOS, Android and OSX – announced from this blog in July . Microsoft has been deeply involved in the standards work for both OAuth 2.0 and OpenID Connect . In AAD we take this participation in the standards community seriously and have worked hard to ensure interoperability. We have been very pleased with the results we have seen interoperating with other implementations, this success was an important criteria for declaring general availability. This is an important moment for Azure Active Directory and for the development community. OpenID Connect represents the state of the art in modern authentication protocols, and we are excited to do our part to help fulfil its promises in the world of real applications. You will now be able to leverage OpenID Connect in your production apps to take advantage of all the features that our service provides: Azure AD authentication, Directory Graph API, Office 365 API, Azure API, Intune API and all the resources that customers and partners such as yourself are adding every day to the Azure AD ecosystem. The fact that we reached GA does not mean that we no longer need feedback! As always, we look forward to your feedback and suggestions on what we released today and anything else you'd like us to include in our offering.

Best Regards,

Alex Simons (Twitter: @Alex_A_Simons )

Director of PM

Active Directory Team

P.S. If you are an admin and you want to turn off user consent for applications, you can do so using PowerShell. Go here to learn more: http://technet.microsoft.com/en-us/library/dn194127.aspx The switch you want to use is:     - UsersPermissionToUserConsentToAppEnabled <Boolean>         Indicates whether to allow users to consent to apps that require access to their cloud user data, such as directory user profile or Office 365 mail and OneDrive for business.         This setting is applied company-wide. Set to False to disable users' ability to grant consent to applications.           Required?                    false         Position?                    named         Default value                true         Accept pipeline input?       false         Accept wildcard characters?  false
Published Sep 07, 2018
Version 1.0
No CommentsBe the first to comment