SlideShare a Scribd company logo
1 of 25
Protect Your Applications with
Windows Azure Multi-Factor
Authentication
Brian Desmond
Intro
• Chicago based
• Active Directory & Identity consultant
– Edgile, Inc – www.edgile.com

• Microsoft MVP for Active Directory since 2003
• Author of Active Directory, 5th Ed from O’Reilly
– You should own a copy!
e-mail: brian.desmond@edgile.com
e-mail: brian@briandesmond.com
website & blog: www.briandesmond.com

@brdesmond
Agenda
•
•
•
•
•

Intro to Multi-Factor Authentication
Windows Azure Multi-Factor Authentication
Configuration and Deployment
Demo
Wrap-Up
What is Multi-Factor Authentication?
• Two or more factors:
– Something you know: a password or PIN
– Something you have: a phone, smart card or hardware
token
– Something you are: a fingerprint, retinal scan or other
biometric

• Even stronger with multiple communication channels
Why Multi-Factor Authentication?
• The concept of keeping identities and data
behind the firewall is changing
– Users are working remotely
– Employee owned devices are connecting to the
network
– Applications and services are moving to the cloud

• Regulatory compliance requirements
Solutions in the Market Place Today
Hardware Tokens

Smart Cards

Certificates

Phones
Hardware Tokens
• Key fob or other device that generates a one
time passcode (OTP) every 60 seconds
• Expensive to distribute, replace, and maintain
– Another item for end users to carry and remember

• Single channel of communication
• Complex to extend to cloud/SaaS services
Smart Cards
• Credit card or USB token with a user certificate
• Requires special hardware to read card
– Difficult to work from non-company issued devices

• Complex infrastructure to support a proper PKI
• End users must keep track of card or token
– Issuance and replacement procedures may require inperson visit
Azure Multi-Factor Authentication
• Authenticate via any registered mobile or desk
phone or phone app
– Optional PIN to proof the call

• No additional hardware requirement
• Two channels of communication adds security
1

2

RADIUS
LDAP
IIS
RDS/VDI

Multi-Factor
Authentication
Server

Windows Server
AD or Other LDAP

Multi-Factor
Authentication
Service
Integrating Existing Systems
• Windows Azure MFA works with existing onpremises applications and services
• SAML and ADFS integration enables SaaS apps
to transparently take advantage of MFA
• Azure Active Directory enables MFA for
Office365 and AAD integrated applications
On-Premises Applications and Services
• MFA Server installed on-premises to broker authentication
–
–
–
–
–
–

RADIUS
LDAP
IIS Applications
ADFS/SAML
Remote Desktop Services
Custom integration via SDK

• MFA Server connects to Azure MFA cloud service to
perform authentication
SaaS and Federated Applications
• ADFS in Windows Server 2012 R2 supports multi-factor
authentication
– MFA Server will also work with ADFS 2.0/2.1

• Authentication policies enable flexible deployment of
multi-factor authentication
– Device type
– User location
– Specific applications
Azure and Office365
• Link Azure MFA to your Azure Active Directory
• Enable users for MFA and they will be prompted to
register on their next sign-in
• Experience with Office applications is not ideal today
– Application specific passwords required for each non-web
application

• Great for securing your administrative accounts
Deployment
• Two major steps to taking advantage of Azure MFA:
– Register user phone information
– Configure applications and services to use MFA

• Plan for new support dependencies
– Forgotten PINs
– Lost/stolen phones

• Don’t forget to involve your security team early-on
On-Premises Server
• Download from the Azure MFA Portal
• Post-installation wizard will prompt for activation
credentials
– Generate these on the Azure MFA server download page
– Credentials expire after 60 seconds

• Multiple instances can be configured to replicate
– Don’t forget to backup the MFA server database
Authentication Methods
• Voice Call
– Optional PIN and/or voice print analysis

• SMS Text Message 1-way or 2-way
– 1-way includes a one time pass code
– 2-way requires user to reply with PIN

• App
– Available for iOS, Android, Windows Phone
– Push notification triggers app to approve
authentication attempt
User Registration
• Phone numbers must be associated with each
user to enable authentication
• On-premises, phone numbers can be sourced
from Active Directory or via end user self-service
registration
• In Windows Azure, phone numbers are currently
sourced via end user self-service
Registration Portal
• Cloud users can be prompted by Windows
Azure to register their phone details
• On-premises server includes an optional user
registration portal
– Populates the Windows Azure MFA server
database
Registration Processes
• Think about how you will get all of your users
registered
– MFA Server can be configured to automatically email
new users

• Azure MFA SDK can be used to build custom
registration processes
– You may not want to create an additional place for
users to visit for IT services
Building Applications with the SDK
• Web service enables developers to integrate
with on-premises Azure MFA server
• Typical scenarios include tightly integrating
multi-factor authentication and building
custom user management / registration
portals
DEMO
Summary
• Azure MFA is a simple and secure solution for
protecting existing and new applications
• Works with on-premises and cloud hosted
applications
• No expensive tokens or complex end user
training is required
Questions?
Please evaluate the session
before you leave


More Related Content

What's hot

Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Sectricity
 
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020  Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020 Ronni Pedersen
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADuberbaum
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campOlav Tvedt
 
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...Kenny Buntinx
 
Windows Autopilot White Glove Process
Windows Autopilot White Glove ProcessWindows Autopilot White Glove Process
Windows Autopilot White Glove ProcessJustin Lee
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeSamsung Biz Mobile
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next levelRonny de Jong
 
Tdswe 1810 learn how to create a secure and modern windows device
Tdswe 1810   learn how to create a secure and modern windows deviceTdswe 1810   learn how to create a secure and modern windows device
Tdswe 1810 learn how to create a secure and modern windows devicePer Larsen
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung Biz Mobile
 
Windows Autopilot - Workplace Nijna Summmit 2020
Windows Autopilot - Workplace Nijna Summmit 2020Windows Autopilot - Workplace Nijna Summmit 2020
Windows Autopilot - Workplace Nijna Summmit 2020Ronni Pedersen
 
User activity monitoring with SysKit
User activity monitoring with SysKitUser activity monitoring with SysKit
User activity monitoring with SysKitSysKit Ltd
 
Modernise your Windows 10 deployment with Windows Autopilot
Modernise your Windows 10 deployment with Windows AutopilotModernise your Windows 10 deployment with Windows Autopilot
Modernise your Windows 10 deployment with Windows AutopilotAndrew Bettany
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéMarketingArrowECS_CZ
 
Predstavitev Kaspersky Small Office Security za mala podjetja
Predstavitev Kaspersky Small Office Security za mala podjetjaPredstavitev Kaspersky Small Office Security za mala podjetja
Predstavitev Kaspersky Small Office Security za mala podjetjaDejan Pogačnik
 
In tune inaction
In tune inactionIn tune inaction
In tune inactionOlav Tvedt
 
Bangalore IT Pro Full Day Event on Intune and SCCM
Bangalore IT Pro Full Day Event on Intune and SCCMBangalore IT Pro Full Day Event on Intune and SCCM
Bangalore IT Pro Full Day Event on Intune and SCCMAnoop Nair
 
Internal Communication Solution
Internal Communication SolutionInternal Communication Solution
Internal Communication SolutionAlexander Maletin
 

What's hot (20)

Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
 
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020  Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot camp
 
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
 
Windows Autopilot White Glove Process
Windows Autopilot White Glove ProcessWindows Autopilot White Glove Process
Windows Autopilot White Glove Process
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, Anytime
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next level
 
Knox Manage
Knox ManageKnox Manage
Knox Manage
 
Tdswe 1810 learn how to create a secure and modern windows device
Tdswe 1810   learn how to create a secure and modern windows deviceTdswe 1810   learn how to create a secure and modern windows device
Tdswe 1810 learn how to create a secure and modern windows device
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
Windows Autopilot - Workplace Nijna Summmit 2020
Windows Autopilot - Workplace Nijna Summmit 2020Windows Autopilot - Workplace Nijna Summmit 2020
Windows Autopilot - Workplace Nijna Summmit 2020
 
User activity monitoring with SysKit
User activity monitoring with SysKitUser activity monitoring with SysKit
User activity monitoring with SysKit
 
Knox Customization Sales Deck
Knox Customization Sales DeckKnox Customization Sales Deck
Knox Customization Sales Deck
 
Modernise your Windows 10 deployment with Windows Autopilot
Modernise your Windows 10 deployment with Windows AutopilotModernise your Windows 10 deployment with Windows Autopilot
Modernise your Windows 10 deployment with Windows Autopilot
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 
Predstavitev Kaspersky Small Office Security za mala podjetja
Predstavitev Kaspersky Small Office Security za mala podjetjaPredstavitev Kaspersky Small Office Security za mala podjetja
Predstavitev Kaspersky Small Office Security za mala podjetja
 
In tune inaction
In tune inactionIn tune inaction
In tune inaction
 
Bangalore IT Pro Full Day Event on Intune and SCCM
Bangalore IT Pro Full Day Event on Intune and SCCMBangalore IT Pro Full Day Event on Intune and SCCM
Bangalore IT Pro Full Day Event on Intune and SCCM
 
Internal Communication Solution
Internal Communication SolutionInternal Communication Solution
Internal Communication Solution
 

Viewers also liked

Jan Egil Ring - Get started with windows power shell desired state configuration
Jan Egil Ring - Get started with windows power shell desired state configurationJan Egil Ring - Get started with windows power shell desired state configuration
Jan Egil Ring - Get started with windows power shell desired state configurationNordic Infrastructure Conference
 
Debrief powerpoint elections 2014
Debrief powerpoint elections 2014Debrief powerpoint elections 2014
Debrief powerpoint elections 2014mattmylesbrown
 
The Cross Then and Now
The Cross Then and NowThe Cross Then and Now
The Cross Then and NowGary V Carter
 
599. Three BHK Flat for Rent in Satellite
599. Three BHK Flat  for Rent in Satellite599. Three BHK Flat  for Rent in Satellite
599. Three BHK Flat for Rent in SatelliteAAD Realty
 
Madhav Trading Company
Madhav Trading CompanyMadhav Trading Company
Madhav Trading CompanyASHISH KALRA
 
Make Use of Your Bow Ps 78:9
Make Use of Your Bow Ps 78:9Make Use of Your Bow Ps 78:9
Make Use of Your Bow Ps 78:9Gary V Carter
 
Relevance of songs
Relevance of songsRelevance of songs
Relevance of songsLucyrutter21
 
2014 - A Year For Zeal (Part 4)
2014 - A Year For Zeal (Part 4)2014 - A Year For Zeal (Part 4)
2014 - A Year For Zeal (Part 4)Gary V Carter
 
Post 8-modes of documentary
Post 8-modes of documentary Post 8-modes of documentary
Post 8-modes of documentary Lucyrutter21
 

Viewers also liked (20)

Jan Egil Ring - Get started with windows power shell desired state configuration
Jan Egil Ring - Get started with windows power shell desired state configurationJan Egil Ring - Get started with windows power shell desired state configuration
Jan Egil Ring - Get started with windows power shell desired state configuration
 
Storyboard
StoryboardStoryboard
Storyboard
 
Debrief powerpoint elections 2014
Debrief powerpoint elections 2014Debrief powerpoint elections 2014
Debrief powerpoint elections 2014
 
Parisa
ParisaParisa
Parisa
 
The Cross Then and Now
The Cross Then and NowThe Cross Then and Now
The Cross Then and Now
 
Changers
ChangersChangers
Changers
 
Question 3
Question 3 Question 3
Question 3
 
Resurrection Sunday
Resurrection SundayResurrection Sunday
Resurrection Sunday
 
599. Three BHK Flat for Rent in Satellite
599. Three BHK Flat  for Rent in Satellite599. Three BHK Flat  for Rent in Satellite
599. Three BHK Flat for Rent in Satellite
 
Members
MembersMembers
Members
 
Madhav Trading Company
Madhav Trading CompanyMadhav Trading Company
Madhav Trading Company
 
Make Use of Your Bow Ps 78:9
Make Use of Your Bow Ps 78:9Make Use of Your Bow Ps 78:9
Make Use of Your Bow Ps 78:9
 
The Application
The ApplicationThe Application
The Application
 
The Intended Flow
The Intended FlowThe Intended Flow
The Intended Flow
 
Relevance of songs
Relevance of songsRelevance of songs
Relevance of songs
 
Madhav group
Madhav groupMadhav group
Madhav group
 
Fonts and colours
Fonts and coloursFonts and colours
Fonts and colours
 
2014 - A Year For Zeal (Part 4)
2014 - A Year For Zeal (Part 4)2014 - A Year For Zeal (Part 4)
2014 - A Year For Zeal (Part 4)
 
Post 8-modes of documentary
Post 8-modes of documentary Post 8-modes of documentary
Post 8-modes of documentary
 
The Seven Loves
The Seven LovesThe Seven Loves
The Seven Loves
 

Similar to Brian Desmond - Quickly and easily protect your applications and services with multi factor authentication

SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...Nuno Árias Silva
 
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB201904_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019Kumton Suttiraksiri
 
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...Nuno Árias Silva
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SASrobbuddingh
 
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 EcosystemWSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 EcosystemWSO2
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Okta-Inc
 
Windows Azure Active Directory: Identity Management in the Cloud
Windows Azure Active Directory: Identity Management in the CloudWindows Azure Active Directory: Identity Management in the Cloud
Windows Azure Active Directory: Identity Management in the CloudChris Dufour
 
Understanding Office 365’s Identity Solutions: Deep Dive - EPC Group
Understanding Office 365’s Identity Solutions: Deep Dive - EPC GroupUnderstanding Office 365’s Identity Solutions: Deep Dive - EPC Group
Understanding Office 365’s Identity Solutions: Deep Dive - EPC GroupEPC Group
 
Brian Desmond - Identity and directory synchronization with office 365 and wi...
Brian Desmond - Identity and directory synchronization with office 365 and wi...Brian Desmond - Identity and directory synchronization with office 365 and wi...
Brian Desmond - Identity and directory synchronization with office 365 and wi...Nordic Infrastructure Conference
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CJoonas Westlin
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Essential MDM configurations
Essential MDM configurationsEssential MDM configurations
Essential MDM configurationsPeter Hewer
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesSumana Mehta
 
Office 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfsOffice 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfsamitchachra
 
FIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
FIDO2 : vers la fin des mots de passe ? - Par Arnaud JumeletFIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
FIDO2 : vers la fin des mots de passe ? - Par Arnaud JumeletIdentity Days
 
Cloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users GroupCloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users GroupJ.D. Wade
 
O365con14 - moving from on-premises to online, the road to follow
O365con14 - moving from on-premises to online, the road to followO365con14 - moving from on-premises to online, the road to follow
O365con14 - moving from on-premises to online, the road to followNCCOMMS
 
The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewNick Owen
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 

Similar to Brian Desmond - Quickly and easily protect your applications and services with multi factor authentication (20)

SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
 
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB201904_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
 
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 EcosystemWSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 
Windows Azure Active Directory: Identity Management in the Cloud
Windows Azure Active Directory: Identity Management in the CloudWindows Azure Active Directory: Identity Management in the Cloud
Windows Azure Active Directory: Identity Management in the Cloud
 
Understanding Office 365’s Identity Solutions: Deep Dive - EPC Group
Understanding Office 365’s Identity Solutions: Deep Dive - EPC GroupUnderstanding Office 365’s Identity Solutions: Deep Dive - EPC Group
Understanding Office 365’s Identity Solutions: Deep Dive - EPC Group
 
Brian Desmond - Identity and directory synchronization with office 365 and wi...
Brian Desmond - Identity and directory synchronization with office 365 and wi...Brian Desmond - Identity and directory synchronization with office 365 and wi...
Brian Desmond - Identity and directory synchronization with office 365 and wi...
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2C
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Essential MDM configurations
Essential MDM configurationsEssential MDM configurations
Essential MDM configurations
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Office 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfsOffice 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfs
 
FIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
FIDO2 : vers la fin des mots de passe ? - Par Arnaud JumeletFIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
FIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
 
Cloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users GroupCloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users Group
 
O365con14 - moving from on-premises to online, the road to follow
O365con14 - moving from on-premises to online, the road to followO365con14 - moving from on-premises to online, the road to follow
O365con14 - moving from on-premises to online, the road to follow
 
The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems Overview
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 

More from Nordic Infrastructure Conference

Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...Nordic Infrastructure Conference
 
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for itAndy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for itNordic Infrastructure Conference
 
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...Nordic Infrastructure Conference
 
Wally Mead - Overview of system center 2012 r2 configuration manager
Wally Mead - Overview of system center 2012 r2 configuration managerWally Mead - Overview of system center 2012 r2 configuration manager
Wally Mead - Overview of system center 2012 r2 configuration managerNordic Infrastructure Conference
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Nordic Infrastructure Conference
 
Ståle Hansen - Understand how lync integrates with exchange
Ståle Hansen - Understand how lync integrates with exchangeStåle Hansen - Understand how lync integrates with exchange
Ståle Hansen - Understand how lync integrates with exchangeNordic Infrastructure Conference
 
Scott Schnoll - Exchange server 2013 virtualization best practices
Scott Schnoll - Exchange server 2013 virtualization best practicesScott Schnoll - Exchange server 2013 virtualization best practices
Scott Schnoll - Exchange server 2013 virtualization best practicesNordic Infrastructure Conference
 
Scott Schnoll - Exchange server 2013 high availability and site resilience
Scott Schnoll - Exchange server 2013 high availability and site resilienceScott Schnoll - Exchange server 2013 high availability and site resilience
Scott Schnoll - Exchange server 2013 high availability and site resilienceNordic Infrastructure Conference
 
Ståle Hansen - Understand how video works in lync and how video interoperabil...
Ståle Hansen - Understand how video works in lync and how video interoperabil...Ståle Hansen - Understand how video works in lync and how video interoperabil...
Ståle Hansen - Understand how video works in lync and how video interoperabil...Nordic Infrastructure Conference
 
Robert Waldinger - How to recover active directory if disaster should occur
Robert Waldinger - How to recover active directory if disaster should occurRobert Waldinger - How to recover active directory if disaster should occur
Robert Waldinger - How to recover active directory if disaster should occurNordic Infrastructure Conference
 
Peter De Tender - The roadmap to deploying office365 pro plus
Peter De Tender - The roadmap to deploying office365 pro plusPeter De Tender - The roadmap to deploying office365 pro plus
Peter De Tender - The roadmap to deploying office365 pro plusNordic Infrastructure Conference
 

More from Nordic Infrastructure Conference (20)

Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
 
Mike Resseler - Using hyper-v replica in your environment
Mike Resseler - Using hyper-v replica in your environmentMike Resseler - Using hyper-v replica in your environment
Mike Resseler - Using hyper-v replica in your environment
 
Mike Resseler - Deduplication in windows server 2012 r2
Mike Resseler - Deduplication in windows server 2012 r2Mike Resseler - Deduplication in windows server 2012 r2
Mike Resseler - Deduplication in windows server 2012 r2
 
Andy Malone - The new office 365 for it pro's
Andy Malone - The new office 365 for it pro'sAndy Malone - The new office 365 for it pro's
Andy Malone - The new office 365 for it pro's
 
Andy Malone - Migrating to office 365
Andy Malone - Migrating to office 365Andy Malone - Migrating to office 365
Andy Malone - Migrating to office 365
 
Andy Malone - Microsoft office 365 security deep dive
Andy Malone - Microsoft office 365 security deep diveAndy Malone - Microsoft office 365 security deep dive
Andy Malone - Microsoft office 365 security deep dive
 
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for itAndy Malone - Keynote: the cloud one small step for man one giant leap for it
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
 
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
 
Wally Mead - Overview of system center 2012 r2 configuration manager
Wally Mead - Overview of system center 2012 r2 configuration managerWally Mead - Overview of system center 2012 r2 configuration manager
Wally Mead - Overview of system center 2012 r2 configuration manager
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Travis Wright - PS WF SMA SCSM SP
Travis Wright - PS WF SMA SCSM SPTravis Wright - PS WF SMA SCSM SP
Travis Wright - PS WF SMA SCSM SP
 
Travis Wright - Complete it service management
Travis Wright - Complete it service managementTravis Wright - Complete it service management
Travis Wright - Complete it service management
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
 
Ståle Hansen - Understand how lync integrates with exchange
Ståle Hansen - Understand how lync integrates with exchangeStåle Hansen - Understand how lync integrates with exchange
Ståle Hansen - Understand how lync integrates with exchange
 
Scott Schnoll - Exchange server 2013 virtualization best practices
Scott Schnoll - Exchange server 2013 virtualization best practicesScott Schnoll - Exchange server 2013 virtualization best practices
Scott Schnoll - Exchange server 2013 virtualization best practices
 
Scott Schnoll - Exchange server 2013 high availability and site resilience
Scott Schnoll - Exchange server 2013 high availability and site resilienceScott Schnoll - Exchange server 2013 high availability and site resilience
Scott Schnoll - Exchange server 2013 high availability and site resilience
 
Ståle Hansen - Understand how video works in lync and how video interoperabil...
Ståle Hansen - Understand how video works in lync and how video interoperabil...Ståle Hansen - Understand how video works in lync and how video interoperabil...
Ståle Hansen - Understand how video works in lync and how video interoperabil...
 
Robert Waldinger - How to recover active directory if disaster should occur
Robert Waldinger - How to recover active directory if disaster should occurRobert Waldinger - How to recover active directory if disaster should occur
Robert Waldinger - How to recover active directory if disaster should occur
 
Peter De Tender - The roadmap to deploying office365 pro plus
Peter De Tender - The roadmap to deploying office365 pro plusPeter De Tender - The roadmap to deploying office365 pro plus
Peter De Tender - The roadmap to deploying office365 pro plus
 
Peter De Tender - How to efficiently license office 365
Peter De Tender - How to efficiently license office 365Peter De Tender - How to efficiently license office 365
Peter De Tender - How to efficiently license office 365
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Brian Desmond - Quickly and easily protect your applications and services with multi factor authentication

  • 1. Protect Your Applications with Windows Azure Multi-Factor Authentication Brian Desmond
  • 2. Intro • Chicago based • Active Directory & Identity consultant – Edgile, Inc – www.edgile.com • Microsoft MVP for Active Directory since 2003 • Author of Active Directory, 5th Ed from O’Reilly – You should own a copy! e-mail: brian.desmond@edgile.com e-mail: brian@briandesmond.com website & blog: www.briandesmond.com @brdesmond
  • 3. Agenda • • • • • Intro to Multi-Factor Authentication Windows Azure Multi-Factor Authentication Configuration and Deployment Demo Wrap-Up
  • 4. What is Multi-Factor Authentication? • Two or more factors: – Something you know: a password or PIN – Something you have: a phone, smart card or hardware token – Something you are: a fingerprint, retinal scan or other biometric • Even stronger with multiple communication channels
  • 5. Why Multi-Factor Authentication? • The concept of keeping identities and data behind the firewall is changing – Users are working remotely – Employee owned devices are connecting to the network – Applications and services are moving to the cloud • Regulatory compliance requirements
  • 6. Solutions in the Market Place Today Hardware Tokens Smart Cards Certificates Phones
  • 7. Hardware Tokens • Key fob or other device that generates a one time passcode (OTP) every 60 seconds • Expensive to distribute, replace, and maintain – Another item for end users to carry and remember • Single channel of communication • Complex to extend to cloud/SaaS services
  • 8. Smart Cards • Credit card or USB token with a user certificate • Requires special hardware to read card – Difficult to work from non-company issued devices • Complex infrastructure to support a proper PKI • End users must keep track of card or token – Issuance and replacement procedures may require inperson visit
  • 9. Azure Multi-Factor Authentication • Authenticate via any registered mobile or desk phone or phone app – Optional PIN to proof the call • No additional hardware requirement • Two channels of communication adds security
  • 11. Integrating Existing Systems • Windows Azure MFA works with existing onpremises applications and services • SAML and ADFS integration enables SaaS apps to transparently take advantage of MFA • Azure Active Directory enables MFA for Office365 and AAD integrated applications
  • 12. On-Premises Applications and Services • MFA Server installed on-premises to broker authentication – – – – – – RADIUS LDAP IIS Applications ADFS/SAML Remote Desktop Services Custom integration via SDK • MFA Server connects to Azure MFA cloud service to perform authentication
  • 13. SaaS and Federated Applications • ADFS in Windows Server 2012 R2 supports multi-factor authentication – MFA Server will also work with ADFS 2.0/2.1 • Authentication policies enable flexible deployment of multi-factor authentication – Device type – User location – Specific applications
  • 14. Azure and Office365 • Link Azure MFA to your Azure Active Directory • Enable users for MFA and they will be prompted to register on their next sign-in • Experience with Office applications is not ideal today – Application specific passwords required for each non-web application • Great for securing your administrative accounts
  • 15. Deployment • Two major steps to taking advantage of Azure MFA: – Register user phone information – Configure applications and services to use MFA • Plan for new support dependencies – Forgotten PINs – Lost/stolen phones • Don’t forget to involve your security team early-on
  • 16. On-Premises Server • Download from the Azure MFA Portal • Post-installation wizard will prompt for activation credentials – Generate these on the Azure MFA server download page – Credentials expire after 60 seconds • Multiple instances can be configured to replicate – Don’t forget to backup the MFA server database
  • 17. Authentication Methods • Voice Call – Optional PIN and/or voice print analysis • SMS Text Message 1-way or 2-way – 1-way includes a one time pass code – 2-way requires user to reply with PIN • App – Available for iOS, Android, Windows Phone – Push notification triggers app to approve authentication attempt
  • 18. User Registration • Phone numbers must be associated with each user to enable authentication • On-premises, phone numbers can be sourced from Active Directory or via end user self-service registration • In Windows Azure, phone numbers are currently sourced via end user self-service
  • 19. Registration Portal • Cloud users can be prompted by Windows Azure to register their phone details • On-premises server includes an optional user registration portal – Populates the Windows Azure MFA server database
  • 20. Registration Processes • Think about how you will get all of your users registered – MFA Server can be configured to automatically email new users • Azure MFA SDK can be used to build custom registration processes – You may not want to create an additional place for users to visit for IT services
  • 21. Building Applications with the SDK • Web service enables developers to integrate with on-premises Azure MFA server • Typical scenarios include tightly integrating multi-factor authentication and building custom user management / registration portals
  • 22. DEMO
  • 23. Summary • Azure MFA is a simple and secure solution for protecting existing and new applications • Works with on-premises and cloud hosted applications • No expensive tokens or complex end user training is required
  • 25. Please evaluate the session before you leave 

Editor's Notes

  1. First the user signs in from any device using their existing account credentials. If the user is signing into an on-premises application, the Multi-Factor Server that is installed at the customer’s site intercepts the authentication request. First it checks the username and password against the user directory. If the correct credentials are entered, a request is sent to the Multi-Factor Authenticationcloud service. The service sends the authentication request to the user’s phone. [click] Once the user has authenticated, they are instantly signed into the application. [click] The are a number of ways to configure the service to secure cloud apps. First, the on-premises multi-factor server can be used with Active Directory Federation Services or another SAML application for single sign in to cloud applications. [click] For apps that use Windows Azure Active Directory, the directory can call the Multi-Factor Authenticationcloud service directly. [click] Or developers can build multi-factor into their custom apps using one of the Software Development Kits.
  2. Convenience & SimplicityWith Multi-Factor Authentication from Windows Azure, there are no devices or certificates to purchase, provision, and maintain. It works with the user’s existing landline phone or mobile device.The authentication process is so simple. It takes just seconds and no special training is required. Unlike hardware tokens, users replace their own lost or broken phones.Users manage their own authentication methods and phone numbers, eliminating calls to your help desk for basic changes.Multi-Factor Authentication can synchronize with your existing Active Directory or LDAP directory and is built into Windows Azure Active Directory, so user management is centralized. Enrollment is fully automated. For on-premises identities, newusers can be prompted via an automated email to set up multi-factor using an on-premises web portal. For cloud identities, users are prompted to complete set up the next time they sign in. This allows for rapid deployment to large numbers of geographically dispersed users.Users get easy, anywhere access and you get a solution that’s easy to manage.ScaleThe service works out-of-the-box with a wide range of on-premises applications, such as remote access VPNs, web applications, virtual desktops, single sign-on systems and much more. This includes Microsoft systems like: Microsoft VPN/RRASRemote Desktop GatewayUniversal Access GatewayTerminal ServicesSharePointOutlook Web AccessAs well as third party VPNs and virtual desktop systems.The service supports federation to cloud services using Active Directory Federation Services as well as other SAML-based applications.It is built into Windows Azure AD and works instantly with any applications that use the directory. This includes:Office 365Dynamics CRM OnlineWindows Azure PortalWindows Intune3rd Party ApplicationsAnd applications that use the new Azure AD App Access capabilityA Software Development Kit is available for use with custom applications and directories.The reliable, scalable service supports high-volume, mission critical applications.SecurityIts out-of-band push, call, and text methods offer added protection against malware and man-in-the-middle attacks.If the user does not approve an authentication request when prompted or cannot be reached for authentication, access is denied. However, because the user’s credentials are verified before the Multi-Factor Authentication service is triggered, this is an indication that the user’s password has been compromised. In some cases, the user will have the option to submit a fraud alert during the authentication request. This will prevent further login attempts and sends a notification to your IT department. You can then work with the user to reset the user’s password. A PIN option where available offers an additional layer of security by requiring users to also enter a secret PIN to authenticate. Rules regarding PIN strength and expiration can be set by the admin. If a user’s PIN has expired, for example, they will be prompted the set a new PIN the next time they are prompted for multi-factor authentication.On-demand and scheduled reports are available for auditing of authentication requests. Multi-Factor Authentication enables compliance with NIST 800-63 Level 3, HIPAA, PCI DSS, and other regulatory requirements for multi-factor authentication.