Jul 02 2021 06:55 AM
Register Here!
Many customers use ADFS to provide single sign-on to SaaS applications. In our current reality of a highly dispersed remote workforce, now more than ever identity is your control plane to have greater visibility and control over who has access to what, when they should have it, and under what conditions. With Azure AD, you can have a single control plane for all your apps, users and devices. Azure AD isn’t just an Active Directory in the Cloud, it's a universal identity platform, Strong identity foundation for Zero Trust, and built in Identity Governance mechanisms. Azure AD supports open standards like SAML, OAUTH2, OpenID, SCIM and WebAuthn, with built-in integrations for over 3000 3rd party applications and can be easily configured to connect your existing applications, in the cloud or on-premises.
With Azure AD, you get a single control plane for all your apps – and when we say all your apps, we truly mean ALL your apps. From Microsoft apps like Office 365, to SaaS apps like Workday, ServiceNow, Box, Salesforce as well as your on-premises apps that might be using legacy authentication protocols. Once you bring in all your apps under one control plane, you can start to unlock all the benefits Azure AD and start to unify app management and benefit from:
The migration process itself is quite simple, especially when you apply a high-level view of the entire process, like we will cover today. Join us to learn about this process and how easy it is to move from ADFS to Azure AD!
Speaker: Nick Wryter
Nick Wryter is a Security Cloud Solution Architect in Microsoft’s Customer Success Unit (CSU) covering regulated industries. In this role, Nick enables customers by equipping them strategically to get the full value of the licensed capabilities, guide customers on their Zero Trust User Access journey, and simplify their Identity and Access Management (IAM) infrastructure. Before joining Microsoft in 2020, Nick spent most of his career as a federal government contractor with various organizations, where he specialized in smart card security application/data management, identity and access control usage models, mobile/near field communication (NFC) usage models plus FIPS 201, PIV card and federal identity management initiatives.
Drawing on about his experience in identity and access management, Nick now focuses mainly on Azure Active Directory, helping customers adopt the notion of identity as the control plane.
Register Here!