Plan Your Identity & Authentication Solution (part 1)
Microsoft 365 Identity Models
Hybrid Identity
It is known for using accounts that originates in an on-premises AD DS and have a copy in the Azure AD tenant of a Microsoft 365 subscription. Azure AD connect offers synchronization to an ongoing account while running on an on-premises server, checking for changes in AD DS, and forwarding those changes to Azure AD.
While implementing hybrid identity, you should know that your on-premises AD DS is your authoritative source for account information i.e. the administrative tasks are mostly done on-premises, which are then synchronized to Azure AD and as the original as well as authoritative user accounts are always stored in the on-premises AD DS, you can easily manage your identities with the help of the same tools as AD DS like AD Users and Computers tool instead of using the Microsoft 365 admin center or Office 365 PowerShell to manage the synchronized user accounts in Azure AD.
Authentication for Hybrid Identity
There are two types of authentications for hybrid identity model:
- Managed Authentication- It is handled by Azure AD with the help of a locally-stored hashed version of the password and then sending the credentials to an on-premises software agent to be authenticated by the on-premises AD DS.
- Federated Authentication- The client computer requesting authentication can be redirected to another identity provider.
Managed Authentication
- Password Hash Synchronization- Here, you can easily synchronize your AD DS user accounts with Microsoft 365 and manage your users on-premises. The user passwords' hashes are synchronized to Azure AD from your AD DS so that the user can have the same password on-premises as well as in the cloud. This is the simplest way know to authenticate AD DS identities in Azure AD and some of the premium features of Azure AD like Identity Protection requires PHS regardless of any selected authentication method.
- Pass-through Authentication (PTA)- It offers a simple password validation for Azure AD authentication services with the help of a software agent running on one or more on-premises servers to validate the users directly with your AD DS. It permits the users to sign in to on-premises, Microsoft 365 resources, and the applications using their on-premises account as well as password. This configuration can validate users passwords directly against your on-premises AD DS without storing password hashes in Azure AD and can be used for the organizations having security requirements to immediately enforce on-premises user account states, password policies, and logon hours.
Federated Authentication
Federated authentication is also capable of supporting additional authentication requirements like smartcard-based authentication or a third-party multi-factor authentication and is generally used if organizations have an authentication requirement not natively supported by Azure AD.
Comments
Post a Comment