Active Directory Integration with Microsoft Office 365

Slides:



Advertisements
Similar presentations
Office 365 Identity June 2013 Microsoft Office365 4/2/2017
Advertisements

Office 365 Identity Federation Technology Deep-Dive
Agenda AD to Windows Azure AD Sync Options Federation Architecture
Core identity scenarios Federation and synchronization 2 3 Identity management overview 1 Additional features 4.
Configuring SharePoint 2013 and Office 365 Hybrid – Part 1
Authentication solutions for Outlook and Office 365 Multi-factor authentication for Office 365 Outlook client futures.
Office 365 Identity aka Azure Active Directory
Identity management integration options for Office 365
Federated sign-in WS-Federation WS-Trust SAML 2.0 Metadata Shibboleth Graph API Synchronize accounts Authentication.
Microsoft Ignite /16/2017 4:55 PM
Sessions about to start – Get your rig on!. Notes from the field – Implement Hybrid Search and OneDrive for Business Chris Zhong - Microsoft Aaron Dinnage.
OSP206. Experience Office as it was meant to be… without the complexity of setting up servers.
Cloud app Cloud app Cloud app Separate username/password sign-in Manual or semi-automated provisioning Active Directory App Separate username/password.
Active Directory Integration with Microsoft Office 365 Ross Adams & Jono Luk Program Managers Microsoft Corporation OSP321.
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
User Microsoft Account Ex: User Organizational Account Ex: Microsoft Account Windows Azure Active Directory.
Building Integrated Microsoft Office 365, SharePoint Online, and Office Solutions Using BCS and LOB Data Donovan Follette Sr. Technical.
Configuring Hybrid Exchange the Easy Way
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
SIM 320. Contoso customer premises AD MS Online Directory Sync Identity Services Provisioning platform Provisioning platform Lync Online Lync Online.
Introduction Please answer the survey questions posted at the end of this meeting. Let us know what sessions you want! Josh Topal at
Scenario covered in this presentation Separate credential from on- premises credential Authentication occurs via cloud directory service Does not.
@jseghers – Jethro Seghers.
OUC204. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Timothy Heeney| Microsoft Corporation. Discuss the purpose of Identity Federation Explain how to implement Identity Federation Explain how Identity Federation.
Supporting Microsoft Office in an Enterprise Environment Will Brandt Sr Technical Lead Microsoft Corporation OSP303.
5 | Microsoft Confidential 6 | Microsoft Confidential.
Single Sign-On with Microsoft Azure
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Office 365 – evaluating, Deploying & Migrating – Notes from the field Daryl Gwyn Office 365 TSP (Technical Solutions Professional) Microsoft Corporation.
Cloud Identity Windows Azure Active Directory Cloud Identity & Directory SyncFederated Identity Appropriate for Smaller orgs without.
Microsoft ® Official Course Module 13 Implementing Windows Azure Active Directory.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Office 365 deployment choices Cutover, Staged, Hybrid What is AD FS (Active Directory Federation Services) Attribute Stores, ADFS Configuration Database.
Office 365: Identity and Access Solutions Suresh Menon Technology Specialist – Office 365 Microsoft Corporation India.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Office 365 Office 365 Overview & InfrastructureAdministering Lync Online.
Supporting Microsoft Office in an Enterprise Environment Will Brandt Sr Technical Lead Microsoft Corporation OSP303.
Bronze Sky customer premises AD MS Online Directory Sync Provisioning platform Provisioning platform Lync Online Lync Online SharePoint Online SharePoint.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Configuration Manager and InTune Gemeinsam oder einsam?
Adxstudio Portals Training
DNS DNS changes required to validate domains in Office 365 UPN – User Principal Name Every user must have a UPN UPN suffixes must match a validated.
Identities and Azure AD Premium
Microsoft Office 365: Identity and Access Solutions
BE-com.eu Brussel, 26 april 2016 EXCHANGE 2010 HYBRID (IN THE EXCHANGE 2016 WORLD)
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
 Step 2 Deployment Overview  What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Understanding.
 What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Demo.
Enabling the Modern Workstyle with Windows 10 & Azure Active Directory Venkatesh Gopalakrishnan 2016 Redmond Summit | Identity Without Boundaries May 25,
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
Office 365 Migration Challenges Drew St. John 2016 Redmond Summit | Identity Without Boundaries May 24, 2016 Consultant
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Identity; What you need to know to be in the Microsoft Cloud
Authentication Interact Cloud.
6/1/2018 2:18 AM OSP302 Building Integrated Microsoft Office 365, SharePoint Online, and Office Solutions Using BCS and LOB Data Donovan Follette
6/17/2018 5:54 AM OSP322 Getting the best of both worlds, making the most of SharePoint hybrid search solutions Shyam Narayan Microsoft © 2013 Microsoft.
SharePoint Online Management and Control
Microsoft Office 365: Identity and Access Solutions
Azure AD Application Proxy
Office 365 Identity Management
05 | AD to Windows Azure AD IT Professionals
TechEd /24/2018 4:00 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Microsoft Ignite NZ October 2016 SKYCITY, Auckland.
SharePoint Online Hybrid – Configure Outbound Search
M7: New Features for Office 365 Identity Management
Office 365 Identity Management
Office 365 Identity Management
M3: Guidance for choosing the right integration option
Microsoft Ignite /24/2019 6:23 PM
2/27/2019 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Presentation transcript:

Active Directory Integration with Microsoft Office 365 4/19/2017 4:19 AM OSP321 Active Directory Integration with Microsoft Office 365 Ross Adams Senior Program Manager Microsoft Corporation © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Session Objectives Architecture for Office 365 and other services Integration Options Planning for Directory Integration Single Sign on Experience How Single sign on works Options for strong authentication

Windows Azure Active Directory Password policy controls for Cloud Accounts Password never expire Password complexity can be turned off Custom password policies for expiry/notification Single sign On with corporate credentials Role-based administration: Five administration roles Company Admin Billing Admin User Account Admin Help Desk Admin Service Support Admin

Windows Azure Active Directory Provisioning Manual Simple Web based user interface Bulk import of user Best for small customers Scriptable PowerShell module for windows Programmable New REST based API Limited attribute set/object types Automated Directory Synchronization with delta Full fidelity of attributes and object types Optimized for large object sets

Architecture and Integration Options No Integration Directory Data Only Directory and Single sign-on (SSO) Exchange Online Windows Azure Active Directory Authentication platform SharePoint Online Contoso customer premises Trust Active Directory Federation Server 2.0 Admin Portal/ PowerShell IdP Lync Online IdP Directory Store AD MS Online Directory Sync Provisioning platform Office Subscription Services Office 365 Desktop Setup

Why Directory and SSO Integration Single place for management User and groups including security groups Passwords Password policies Support for Enterprise Single Sign on Support for Hybrid environments for services such as Exchange Online Options for Strong Authentication (e.g. Smart cards)

Integration Comparison 1. No Integration 2. Directory Only 3. Directory and SSO Appropriate for Smaller orgs without AD on-premises Pros No servers required on-premises Cons No SSO No 2FA 2 sets of credentials to manage with differing password policies IDs mastered in the cloud Appropriate for Medium/Large orgs with AD on-premises Pros Users and groups mastered on-premises Enables co-existence scenarios Cons No SSO No 2FA 2 sets of credentials to manage with differing password policies Single server deployment Appropriate for Larger enterprise orgs with AD on-premises Pros SSO with corporate cred IDs mastered on-premises Password policy controlled on-premises 2FA solutions possible Enables hybrid scenarios Location isolation Cons High availability server deployments required

General Integration Requirements Active Directory Forest Functionality level 2003 Windows 2008 for AD FS 2.0 and SSO Windows 2003 or above for Directory Synchronization Depreciated 32 Bit (Windows 2003) Recommended 64 Bit (Windows 2008 and above) Support Virtualization Single Forest Multiple domains in a single the forest Multi forest support through premier engagement

Preparing for Directory integration and SSO Design for a high availability of AD FS 2.0 services Every User must have a UPN UPN suffix must match a validated domain in Office 365 UPN Character restrictions Only certain characters allows: Letters, numbers and .-_!#^~ No dot before @ symbol (for example ross.adams@contoso.com is allowed but ross.adams.jr.@contoso.com isn’t) Users need use UPN to logon to Office 365 Apps Office 365 Deployment Readiness Tool checks all of these and more

Directory Integration Validations Licensed Users All Proxy Address (SMTP/SIP) must be against a verified domain Addresses dropped during licensing UPN not updated automatically for Cloud ID based Users Must be updated manually Will update automatically when domain is converted to Single Sign on Unlicensed Users SMTP Proxy Address can be against non-verified domains SIP Address must match a verified domain Drop if not valid Verifying after Sync will add the removed proxy address back Background process

Directory Sync Setup Options 1 Way Sync from AD to Cloud Provisions users, DLs, Security Groups and contacts Can move to 2 Way Sync later on-premises master for all objects and properties 2 Way Sync from AD to Cloud and Cloud to AD Required for Hybrid Deployments e.g. co-existence with Exchange online and Exchange on-premises Cannot move back to 1 way sync Cloud becomes master for certain properties (safe senders, mail co-existence, UM)

Directory Sync configuration options Sync’s all objects with some exceptions Does not Default accounts (Administrator etc) Does not sync System Objects Directory Sync can be turned off but takes time Options that can’t be changed Scoping the attribute set Sync timeframe is every 3 hours

Sign in Experience for Single Sign On Rich/Web clients Rich clients applications with Microsoft Online Sign In Assistant. Lync Online, Office Subscriptions, CRM Online Integrated experience on a domain joined PC on the corporate network Client connects directly to AD FS 2.0 server or proxy Web based applications SharePoint Online, OWA, Office Rich Applications (Word, PowerPoint etc) Prompts for username for realm discovery Can be bypassed “Keep me signed in”, still required to authenticate to AD FS. Integrated auth to AD FS on domain joined PC on the corporate network Smart links can help with username prompt for example http://www.outlook.com/contoso.com

Sign in Experience for Single Sign On Exchange Online Outlook/IMAP/Active Sync/Entourage Often refereed to Exchange Proxy authentication Basic credentials relayed through Exchange to AD FS proxy active end point Prompts for both username and password but can be saved Support for rules to control access based on Client IP/Device type/Exchange Endpoint filtering

Sign On Experience with SSO Rich Applications (SIA) Lync Online Office Subscriptions CRM Rich Client Can save credentials Web Clients Office 2010, Office 2007 SP2 with SharePoint Online Outlook Web Application Remember last user Exchange Clients Office 2010, Office 2007 SP2 Active Sync/POP/IMAP Entourage Can save credentials Username and Password MS Online IDs Username and Password Username and Password Online ID Online ID Online ID SSO IDs (non-domain joined) Username and Password Username and Password Username and Password AD credentials AD credentials AD credentials SSO IDs (domain joined) No Prompt Username Username and Password AD credentials AD credentials AD credentials

Identity Integration/SSO Details MS Online business scenarios always use WS-* WS-Federation for passive clients WS-Trust provides support for rich client authentication Identity federation supported through AD FS 2.0 SAML 1.1 Token Issuer URI : Used to locate the domain for certificate verifcation User Source Address : Unique, never changing identifier of the user UserPrincipalName (UPN) : Name the user uses to logon

Client to End Points usage

Client Access Filtering Enabled through client issuance rules in AD FS 2.0 Targeted at blocking external access scenarios for Outlook Block all external access Allow external access for specific mail clients (Active Sync, POP/IMAP) Allow external access to web applications (OWA, SharePoint) Requires ADFS Proxy Allow external access for specific groups of users No granularity on limiting Lync Online/Office Subscription services externally i.e. any rule above blocks access 3rd Party Proxies are required additional work see http://technet.microsoft.com/en-us/library/hh526961(v=ws.10).aspx

Identity Federation Authentication flow (Passive/Web profile) Customer Microsoft Online Services User Source ID Logon (SAML 1.1) Token UPN:user@contoso.com Source User ID: ABC123 Auth Token UPN:user@contoso.com Unique ID: 254729

Identity Federation Authentication flow (MEX/Rich Client Profile) Customer Microsoft Online Services User Source ID Logon (SAML 1.1) Token UPN:user@contoso.com Source User ID: ABC123 Auth Token UPN:user@contoso.com Unique ID: 254729

Identity Federation Active flow (Outlook/Active Sync) Always external Customer Microsoft Online Services User Source ID Logon (SAML 1.1) Token UPN:user@contoso.com Source User ID: ABC123 Auth Token UPN:user@contoso.com Unique ID: 254729 Basic Auth Credentilas Username/Password

Single Forest AD Structures and Considerations Description Considerations Matching domains Internal Domain and External domain are the same i.e. contoso.com No special requirements Sub domain Internal domains is a sub domain of the external domain i.e. corp.contoso.com Requires Domains registered in order, primary then sub domains .local domain Internal domain is not publicly “registered” i.e. contoso.local Domain ownership can’t be proved, must use a different domain Requires all users to get new UPN Use SMTP address if possible Smart Card issues Multiple distinct UPN suffixes in single forest Mix of users having login UPNs under different domains i.e. contoso.com & fabrikam.com Must use SupportMultipleDomain switch in PowerShell Sub domains require additional work Multi Forest Multiple AD Forest Premier engagement

Strong authentication approaches Focuses on Strong authentication (e.g. Smart cards) for extranet access Two approaches possible Only provide strong auth for web applications (e.g. OWA, SPO) by configuring/customizing AD FS 2.0 proxy Rich clients cannot be supported Use VPN to internal network as the gate to require 2FA access when connecting from outside the internal network Will work for rich clients as well

Web applications only Configure AD FS 2.0 proxy for smartcard access using in-box support Customize AD FS 2.0 proxy with 3rd party 2FA solutions Use IIS HTTP module from 2FA provider to intercept & authenticate 2FA prior to providing AD username/pwd at forms login page in AD FS 2.0 proxy (RSA Example here) Customize AD FS 2.0 forms login page to add 2FA credential collection and authenticate to 2FA service via code behind No support for Rich clients

Authentication platform Web Applications only INTRANET DMZ Other 2FA Access Smartcard Access AD DS Windows Azure Active Directory Authentication platform Redirect to Authentication platform Redirect to IdP AD FS AD FS Proxy Provide AD/Smartcard credentials Types User Name 2FA module Redirect Back Generate SAML token for authentication platform Authenticate 2FA response Redirect to Proxy Access Application 2FA Service Redirect to Strong auth provider Present ticket to Application Authenticate 2FA Present strong credentials Install 3rd party auth provider ADFS proxy No support for rich client apps

Strong Auth VPN to internal network Configure extranet access to always require VPN access Integrate 2FA with VPN provider Allow Internal Outlook traffic to authenticate with Client Access Policies and AD FS 2.0 Optionally allow EAS traffic to authenticate via AD FS 2.0 proxy & Client Access Policy Support for Rich Clients

2FA – Web Applications only Allow internal Outlook via ADFS proxy INTRANET DMZ Strong Auth VPN to internal network AD DS Windows Azure Active Directory Authentication platform AD FS AD FS Proxy Send Creds to Exchange Proxy Auth Disable passive pages on proxy Evaluate Client Access Rules, issue SAML Token Send AuthN request to ADFS 2FA Service Authenticate 2FA VPN Send Creds to Exchange Proxy Auth Connect to internal network Connect to VPN Provide 2FA creds

Questions

OSP Related Content Code Title Schedule OSP221 Microsoft Office 365 for Enterprises 6/26/2012 16:30 OSP222 Empowering Small Businesses: Microsoft Office 365 P-Suite 6/27/2012 10:15 OSP305 The Modern Compatibility Process to Accelerate Microsoft Office Deployment 6/27/2012 12:00 OSP224 Microsoft Office 365 Management and Deployment 6/27/2012 17:00 OSP321 Active Directory Integration with Microsoft Office 365 6/28/2012 8:30 OSP303 Supporting Microsoft Office in an Enterprise Environment 6/28/2012 12:00 OSP302 Building Integrated Microsoft Office 365, SharePoint Online, and Office Solutions Using BCS and LOB Data 6/28/2012 14:45 OSP340 Office Deployment – Notes from the Field 6/28/2012 16:30 OSP323 Microsoft Office 365 Security, Privacy, and Trust 6/29/2012 8:30 OSP324 Microsoft Office 365 Service Reliability and Disaster Recovery 6/29/2012 10:15 OSP350 Office 365 – evaluating, Deploying & Migrating – Notes from the field 6/29/2012 13:00 OSP223 Microsoft Office 365 for Education 6/29/2012 14:45

Related Resources Office 365 TechCenter: technet.microsoft.com/Office365 Office Client TechCenter: technet.microsoft.com/office Office, Office 365 and SharePoint Demo Area Includes: Office 365 IT Pro Command Center Office 365 Data Center Exhibit

Resources Learning TechNet http://europe.msteched.com Connect. Share. Discuss. http://europe.msteched.com Microsoft Certification & Training Resources www.microsoft.com/learning TechNet Resources for IT Professionals http://microsoft.com/technet Resources for Developers http://microsoft.com/msdn

Submit your evals online 4/19/2017 4:19 AM Evaluations Submit your evals online http://europe.msteched.com/sessions © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

4/19/2017 4:19 AM © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

4/19/2017 4:19 AM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.