First published on CloudBlogs on Jul, 29 2016
Hey there, Ramiro Calderon back for another post on Hybrid Identity and ADFS. This is really a part 2 from last weeks post which can be found here . Let’s pick up right where we left off!
Question 1: Both AD FS and Azure AD give me SaaS App SSO. What should I use when?
Answer 1: Azure AD is an Identity and Access Management (IAM) platform that brings additional capabilities for Software as a Service (SaaS) applications beyond Single Sign On (SSO).
In general, it is recommended to use Azure AD for SaaS apps SSO configuration because it provides:
In an on premises deployment, the capabilities above are usually available with 3 rd party solutions.
In addition to the functional reasons above, there are also some practical considerations:
So, when should you keep the SaaS application RP trusts in AD FS? Simply, when Azure AD does not support it. There are some advanced use cases that can only be implemented by AD FS such as:
As mentioned above, Azure AD is constantly releasing more capabilities to close the SSO functional gaps with AD FS, especially around conditional access capabilities.
Question 2: I am confused. On premises Web Application Proxy (WAP) and Azure AD Application Proxy give me internal application publishing. What should I use?
Answer 2: In general, we recommend using Azure AD Application proxy to publish on-premises applications. As I mentioned in my previous answers, Azure AD provides a lot of capabilities beyond the endpoint publishing:
In an on premises deployment, the capabilities above are usually available with 3 rd party solutions.
Additional capabilities specific to internal applications including:
1. Azure AD Application Proxy connectors simplify the on premises footprint. No DMZ or inbound ports are needed since there is only outbound traffic.
2. Azure AD provides SSL termination so reduces exposure to vulnerabilities like heart bleed
3. Azure AD ensures that your servers on premises are not exposed directly to the internet so no port scanners and other similar tools are not a threat
4. With pre-authentication, Azure AD will ensure that only authenticated requests are sent to your on-premises servers, mitigating DDOS attacks
5. Alternate login ID is very straightforward to configure for Kerberos applications. So, when should you publish your internal applications in WAP? Simply, when Azure AD does not support it.
There are some advanced use cases where WAP is a better fit such as:
Question 3: So, if I move my SaaS apps and my internal apps to Azure AD, can I shut AD FS Down? What are the tradeoffs if I move from federation to Password Hash Sync?
Answer 3: AD FS has a very important place in an overall identity solution to meet specific use cases that might be part of your requirements:
1. Support for authentication methods other than username/password. This includes:
2. Support for auto-registration of Windows 7 and 8.1 domain joined devices for device-based conditional access.
Question 4: I have MFA on premises with AD FS, but Azure AD attempts to do MFA in the cloud again. How can I fix that?
Answer 4: Azure AD recognizes the MFA authentication on premises based on claims from the identity provider (AD FS in your case). To set it up with AD FS you need to do the following:
1. Configure the domain authentication properties to indicate MFA is supported on premises:
2. Then, configure AD FS to pass through the authentication method references claim in the issuance transform rules:
The underlying claims language is:
3. Then, any requests that Azure AD deems requiring MFA (for example Conditional access policies), will result on a request like this when using WS-Federation. Note the wauth parameter
4. Then, Azure AD will look for the authentication method references claim in the highlighted claim types and value, which is sent to Azure AD with the rule created in step 2.
Note that steps 1,3,4 apply to other identity providers as well. If you have the same requirements for 3rd party identity provider, consult with your provider to produce the claims described here.
Question 5: I have MFA on prem with AD FS, and want to move to Azure MFA. How can I phase in my users?
Answer 5: This is a tricky one because the “MFA on premises support” is a per-domain setting, and you can’t slice it by groups of users. However, here's the trick: Reading View. Alt Shift A for Accessibility Help. * The “SupportsMFA” flag means that Azure AD to send the request back to AD FS with the MFA request parameter. * As a decoupled behavior, Azure AD will honor the authentication method references claim from on prem if it sees it.
In other words, if you issue the MFA claim on premises then Azure AD will use it. This is an example: Let’s say your MFA requirement is to prompt multifactor when outside the corporate network, then it is possible to phase users from an on-premises MFA to Azure MFA as follows:
1. Create a security Group on-premises called AzureMFAUsers
2. In AD FS, create a rule so request MFA for requests coming from outside the corporate network for users who are not members of AzureMFAUsers
3. In Azure AD, disable the “SupportsMFA” property of the federated domain: 4. In Azure AD, set the MFA service to skip MFA for on-premises requests for federated users:
5. Then, make sure that the members of the “AzureMFAUsers” and set Azure MFA to be “enforced” in the cloud. You can do this in the management portal, or at scale with a quick powershell function as follows: function Set-AzureADEnforcedMFAToGroup { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string] $GroupName ) $groupId = Get-MsolGroup -SearchString $GroupName | Select-Object -ExpandProperty ObjectId $members = Get-MsolGroupMember -GroupObjectId $groupId $st = New-Object -TypeName Microsoft.Online.Administration.StrongAuthenticationRequirement $st.RelyingParty = "*" $st.State = "Enabled" $sta = @($st) foreach($member in $members) { $memberObjectGuid = $member.ObjectId Set-MsolUser -ObjectId $memberObjectGuid -StrongAuthenticationRequirements $sta } } So, with the trick above you can play with the AD FS rules to phase users from On prem MFA to Azure MFA. We hope you’ve found this post and this series to be helpful.
For any questions you can reach us at AskAzureADBlog@microsoft.com , the Microsoft Forums and on Twitter @AzureAD , @MarkMorow and @Alex_A_Simons
-Ramiro Calderon and Mark Morowczynski
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.