Azure AD & Office 365 1. Logon with Username / Password 2. MFA challenge 3. Reply to MFA challenge -1-way or 2-way SMS -Phone call -Mobile Application.

Slides:



Advertisements
Similar presentations
Agenda AD to Windows Azure AD Sync Options Federation Architecture
Advertisements

Name | Title | Microsoft Corporation
Mobile Device Management Intune-Configmanager CHANDAN BHARTI PREMIER FIELD ENGINEER-MICROSOFT.
The traditional perimeter is rapidly eroding IT needs continuous data protection that work across ‘classic ‘boundaries’ Consumerization of IT Users.
SharePoint Server Exchange Server CORPORATE NETWORK Mobile devices PCs Browsers INTERNET DMZ Active Directory Policies Filter EAS Filter web access.
Peter Ginnegar Technical Solution Professional Microsoft Corporation
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Business Productivity Online Suite Enterprise class software delivered via subscription services hosted by Microsoft and sold with partners.
Active Directory Integration with Microsoft Office 365
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Cloud app Cloud app Cloud app Separate username/password sign-in Manual or semi-automated provisioning Active Directory App Separate username/password.
Active Directory Integration with Microsoft Office 365 Ross Adams & Jono Luk Program Managers Microsoft Corporation OSP321.
User Microsoft Account Ex: User Organizational Account Ex: Microsoft Account Windows Azure Active Directory.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
5 | Microsoft Confidential 6 | Microsoft Confidential.
Microsoft Confidential - Internal Only Cloud Services for Collaboration – the road to Wave 15.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Office 365: Identity and Access Solutions Suresh Menon Technology Specialist – Office 365 Microsoft Corporation India.
The traditional perimeter is rapidly eroding IT needs continuous data protection that work across ‘classic ‘boundaries’ Consumerization of IT Users.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern.
Configuration Manager and InTune Gemeinsam oder einsam?
User and Device Management
Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.
Craig Pringle & Derek Moir
Identities and Azure AD Premium
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
 Step 2 Deployment Overview  What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Understanding.
 What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Demo.
Enabling the Modern Workstyle with Windows 10 & Azure Active Directory Venkatesh Gopalakrishnan 2016 Redmond Summit | Identity Without Boundaries May 25,
EMS in action Hugh Simpson-Wells and Mark Riley 2016 Redmond Summit | Identity Without Boundaries
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently work away from their desks.***
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Active Directory Modernization Technical competitive comparison
Implementing and Managing Azure Multi-factor Authentication
LOCAL CLOUDINESS Dino Buljubašić Rijad Smajlović
Azure Active Directory voor Developers
Deployment Planning Services
Module 1: Identity is the New Perimeter
Azure AD for the client management guy (or gal!)
6/25/ :13 PM BRK1076 Make Windows devices more secure by taking them out of your existing infrastructure Chris Rhodes & Andrew Bettany MCTs & MVPs.
Microsoft Virtual Academy
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Enhancing the Office 365 Multi-Factor Authentication and RM Online
Replace with Application Image
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Microsoft Virtual Academy
Cloud Connect Seamlessly
Azure AD Application Proxy
Office 365 Identity Management
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
Microsoft Ignite /20/2018 2:21 PM
Access and Information Protection Product Overview October 2013
Getting Started.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
SharePoint Online Hybrid – Configure Outbound Search
Microsoft Virtual Academy
Getting Started.
Five mistakes to avoid when deploying Enterprise Mobility + Security
Office 365 Identity Management
Microsoft Virtual Academy
Protecting your data with Azure AD
Microsoft Virtual Academy
Microsoft Virtual Academy
Presentation transcript:

Azure AD & Office Logon with Username / Password 2. MFA challenge 3. Reply to MFA challenge -1-way or 2-way SMS -Phone call -Mobile Application

Microsoft Confidential

8

11

Microsoft Confidential 12

Azure AD & Office One-time setup: User create App Password (1 per application) through MOP or AAD 2. Rich client logon with App Password

 Admin must:  Create a Windows Azure Authentication Provider  Enable Multi-Factor Authentication for the users  App Password available to end-users only  Not available for Administrative accounts  Password is automatically generated  16 characters  A limit of 40 passwords per user  Passwords never expire  Set Expiration feature is schedule for a future release

The traditional perimeter is rapidly eroding IT needs continuous data protection that work across ‘classic ‘boundaries’ Consumerization of IT Users need access, from any device Externalization of IT Applications are on-premises and in the cloud More Data, Stored in More Places Dispersed enterprise data needs protection Social Enterprise Data is shared between people and applications

 Use Windows Azure AD Right Management  Out-of the box  Integrate natively with Exchange online and SharePoint online  Integrate Office 365 with existing on-premises AD RMS infrastructure