SlideShare a Scribd company logo
1 of 18
Azure Multifactor Authentication
and Conditional Access
Ahmad Yasin
Cloud Identity Support Engineer /ahyasin
81%
of breaches are caused
by credential theft
73%
of passwords are
duplicates
WHY IDENTITY IS IMPORTANT
On-premises /
Private cloud
devices datausers apps
THE WORLD BEFORE
MOBILITY & CLOUD
On-premises /
Private cloud
CLOUD APPS & SAAS SERVICES
On-premises /
Private cloud
MOBILE AND PERSONAL DEVICES
On-premises /
Private cloud
ORGANIZATION & SOCIAL IDENTITIES
On-premises /
Private cloud
On-premises /
Private cloud
Windows Server
Active Directory
Azure
Public cloud
Microsoft Azure
Active Directory
Commercial
IdPs
Consumer
IdPs
Partners
Customers
Azure AD
Connect
Access Reviews
Conditional
Access
Multi-Factor
Authentication
Addition of
custom cloud
apps
Remote Access
to on-premises
apps
Privileged
Identity
Management
Dynamic Groups
Identity
ProtectionAzure AD DS
Office 365 App
Launcher
Group-Based
Licensing
Access
Panel/MyApps
Azure AD
Connect
Connect Health
Provisioning-
DeprovisioningAzure AD Join
Self-Service
capabilities
MDM-auto
enrollment /
Enterprise State
Roaming
Security
Reporting
Governance
HR App
Integration
B2B
collaboration
Azure AD
B2CSSO to SaaS
Microsoft
Authenticator -
Password-less
Access
334K 90%64K1.01B14.2M
+30%
YoY
+35%
YoY
+65%
YoY
+150%
YoY
— Every Office 365 and Microsoft Azure customer uses Azure Active Directory —
On-Premises
applications
Conditional Access Control
Application
Business sensitivity
Other
Inside corp. network
Outside corp. network
Risk profile
Devices
Authenticated
MDM Managed (Intune)
Compliant with policies
Not lost/stolen
User attributes
User identity
Group memberships
Auth strength (MFA)
Conditional access
control
Azure AD
http://azuredummies.com/2017/07/18/deep-dive-in-azure-active-directory-synchronization-ahmad-yasin-beta-editi
Azure multi factor authentication - Global Azure bootcamp 2018  security

More Related Content

What's hot

EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
Eric Inch
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
Chris Genazzio
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services
OlivierMichot
 

What's hot (20)

3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Cloud App Security
Cloud App SecurityCloud App Security
Cloud App Security
 
20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad
 
Modern Workplace Deep Dive infographic
Modern Workplace Deep Dive infographicModern Workplace Deep Dive infographic
Modern Workplace Deep Dive infographic
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Preparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional AccessPreparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional Access
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
4 Modern Security - Integrated SecOps and incident response with MTP
4  Modern Security - Integrated SecOps and incident response with MTP4  Modern Security - Integrated SecOps and incident response with MTP
4 Modern Security - Integrated SecOps and incident response with MTP
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services
 
1 Modern Security - Keynote
1  Modern Security - Keynote1  Modern Security - Keynote
1 Modern Security - Keynote
 
Microsoft Advanced Security & Compliance
Microsoft Advanced Security & ComplianceMicrosoft Advanced Security & Compliance
Microsoft Advanced Security & Compliance
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
 
Microsoft Cloud App Security
Microsoft Cloud App SecurityMicrosoft Cloud App Security
Microsoft Cloud App Security
 
Azure Security Center
Azure Security CenterAzure Security Center
Azure Security Center
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacks
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 

Similar to Azure multi factor authentication - Global Azure bootcamp 2018 security

20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium
Robin Vermeirsch
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
uberbaum
 

Similar to Azure multi factor authentication - Global Azure bootcamp 2018 security (20)

Azure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAzure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - Ajay
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
 
Securing your Azure Identity Infrastructure
Securing your Azure Identity InfrastructureSecuring your Azure Identity Infrastructure
Securing your Azure Identity Infrastructure
 
20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium
 
SCU Berlín | Cloud identity for maximum productivity
 SCU Berlín | Cloud identity for maximum productivity SCU Berlín | Cloud identity for maximum productivity
SCU Berlín | Cloud identity for maximum productivity
 
What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?
 
Ewug 1703 azure ad pim and conditional access
Ewug 1703   azure ad pim and conditional accessEwug 1703   azure ad pim and conditional access
Ewug 1703 azure ad pim and conditional access
 
Azure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDKAzure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDK
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security Webinar
 
To sign in and beyond: Doing more with your applications and Azure AD
To sign in and beyond: Doing more with your applications and Azure ADTo sign in and beyond: Doing more with your applications and Azure AD
To sign in and beyond: Doing more with your applications and Azure AD
 
Azure active directory
Azure active directoryAzure active directory
Azure active directory
 
2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD 2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
Azure AD and Office 365 - Deja Vu All Over Again
Azure AD and Office 365 - Deja Vu All Over AgainAzure AD and Office 365 - Deja Vu All Over Again
Azure AD and Office 365 - Deja Vu All Over Again
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
JoTechies - Cloud identity
JoTechies - Cloud identityJoTechies - Cloud identity
JoTechies - Cloud identity
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access management
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
 
What small businesses need to know about Azure AD premium
What small businesses need to know about Azure AD premiumWhat small businesses need to know about Azure AD premium
What small businesses need to know about Azure AD premium
 

More from JoTechies

More from JoTechies (13)

Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 
Microsoft AI: Cognitive Service - Global Azure bootcamp 2018
Microsoft AI: Cognitive Service - Global Azure bootcamp 2018Microsoft AI: Cognitive Service - Global Azure bootcamp 2018
Microsoft AI: Cognitive Service - Global Azure bootcamp 2018
 
Building an MVVM based Xamarin Forms application
Building an MVVM based Xamarin Forms applicationBuilding an MVVM based Xamarin Forms application
Building an MVVM based Xamarin Forms application
 
JoTechies -Azure Machine Learning
JoTechies -Azure Machine LearningJoTechies -Azure Machine Learning
JoTechies -Azure Machine Learning
 
Introduction to Microsoft bot | JoTechies | Amjad Alhusseini
Introduction to Microsoft bot | JoTechies | Amjad AlhusseiniIntroduction to Microsoft bot | JoTechies | Amjad Alhusseini
Introduction to Microsoft bot | JoTechies | Amjad Alhusseini
 
JoTechies - Infrastructure as a Service IaaS
JoTechies - Infrastructure as a Service IaaSJoTechies - Infrastructure as a Service IaaS
JoTechies - Infrastructure as a Service IaaS
 
JoTechies - Azure Cloud Security
JoTechies - Azure Cloud SecurityJoTechies - Azure Cloud Security
JoTechies - Azure Cloud Security
 
JoTechies - Azure SQL DB
JoTechies - Azure SQL DBJoTechies - Azure SQL DB
JoTechies - Azure SQL DB
 
Azure api management
Azure api managementAzure api management
Azure api management
 
JoTechies - Azure App Services Using NodeJS
JoTechies - Azure App Services Using NodeJSJoTechies - Azure App Services Using NodeJS
JoTechies - Azure App Services Using NodeJS
 
JoTechies - Azure Backup
JoTechies - Azure BackupJoTechies - Azure Backup
JoTechies - Azure Backup
 
JoTechies - Azure Functions Using c#
JoTechies - Azure Functions Using c#JoTechies - Azure Functions Using c#
JoTechies - Azure Functions Using c#
 
JoTechies cloud productivity with office 365
JoTechies   cloud productivity with office 365JoTechies   cloud productivity with office 365
JoTechies cloud productivity with office 365
 

Recently uploaded

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 

Recently uploaded (20)

WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
 
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
 
WSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million PeopleWSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million People
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Era
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 

Azure multi factor authentication - Global Azure bootcamp 2018 security

Editor's Notes

  1. So lets first start by focusing on why identity is important. Cybersecurity attacks have been a great headache for IT organizations. Even large organizations, reputable financial organizations and even governments are not immune to these threats. The nature of the cybersecurity attacks have been changing, attackers found an intelligent way to breach into the networks, by breaching into credentials. Rather than using virus or malware software, most of the time they hide under the identity of an innocent user. 81% of hacks and cybersecurity attacks are traced back to lost, weak or compromised user credentials. Why credentials are so vulnerable? Because passwords are vulnerable. And passwords are not really the best form of access and authentication. Think about it. How many times you have used the same password to access a corporate account as well as a personal account? How old are your personal passwords? I think the WiFi password I use at my house is more than 10+yrs old. Do you use the same password for your social media and bank account? It is quiet possible – because it is hard to remember several passwords when you’re trying to get things done. Statistics prove this as well – 73% of passwords are duplicates. This means the users are using the same password for several accounts. And why do we use this? Because they want to be productive, we want to get things done, wherever we are. As users, our first focus is productivity before security. 80% of employees admit using non-approved SaaS apps for work. 79% of employees work on virtual teams according to Forbes (FORBES - https://www.forbes.com/sites/unify/2013/12/10/how-technology-has-changed-workplace-communication/#71c8043f670b). The mobile work force has grown by 103% since 2005.
  2. So lets step back for a minute and think about the tectonic shift that has happened to IT systems with the introduction of mobility and the cloud. Before these mega trends, users, devices, apps and data were within the confines of the enterprise. Users will use devices only given to them by the IT department. They will access apps that are identified by the IT department. The data, identities, devices are all on premises or in the private cloud.
  3. But world has changed. Employees want to be more productive – our own telemetry says that an average employee uses 17 SaaS apps for work. Why? They want to be productive. SaaS apps are great in terms of anytime access, always up to date.
  4. Then of course, we have the introduction of mobile and personal devices. We get things done using our phones, our tablets – where ever we are, in the airport in the coffee shop.
  5. And accordingly we have several different identities. We have our organizational identity to access corporate resources, we have social media accounts. Several accounts, several passwords - if we can use the same password for these multiple identities we will, cause it is easy and convenient.
  6. Documents designed for anytime, anywhere collaboration allow team members to work seamlessly with each other and make progress quickly. People want to interact with people, not with documents and systems. People are taking more risks than you can imagine, if you want to protect them, this protection should built in to the design of your solution.
  7. As organizations and their employees are moving to the cloud, the security strategy needs to start with a strong protected single identity at the center of the business. AS we talk to customers who’re moving to the cloud, we realize that they are still concerned about network security in their journey to the cloud. The reality is that as you move the cloud, the identity becomes your control plane, it is the new perimeter. As you can see the confines of the enterprise is no longer and can no longer be the perimeter of your organization. Having a strong identity and access strategy is critical, I want to say crucial for balancing security and productivity in the organization and for being the first line of defense. So Identity is the new control plane, it safeguards your core assets on-prem and in the cloud. But we also know that most breaches can be traced back to compromised credentials, remember the stat I mentioned about the credentials under attack! Let me show you how risk based conditional access helps you identify at risk credentials, and take the appropriate steps to avoid breach or data exfiltration, while providing a good experience for IT and users – internal and external!
  8. Build 2012
  9. Based on what we are seeing, we are easily the largest single enterprise cloud identity in the world. 14.2 m organizations in the world using the directory managing 1B identities using that directory. While Azure AD powers all of Microsoft online services, we are also, today, powering more than 300k 3rd party apps that were integrated to the directory and authenticated at least 1 user. We have 64k organizations that are paid EMS/Azure AD customers. I’ll pause a moment here to let you understand these numbers for yourself. …. Now that we understand where Azure Active Directory is coming from, lets understand what Azure AD aims to provide to customers