Buffl

Chapter 8 Authentication & Authorization

as
by abdullah S.

Multi-Factor Authentication

Multi-factor authentication, or MFA, plays a crucial role in modern online security, especially for your applications. If you're not familiar with multi-factor authentication, it involves using at least two methods to identify yourself during the login process. The key security feature of MFA lies in its layered approach to authentication, providing an extra level of protection.

MFA typically incorporates two or more of the following authentication methods:

  1. Something you know: This is typically a username and password, which is a common factor in most authentication processes.

  2. Something you have: This could be an application on your phone or a key fob, serving as an additional element to prove your identity.

  3. Something you are: This involves biometrics, such as a fingerprint or retina scan. It adds a unique physical aspect to the authentication process.

The strength of MFA lies in the fact that if one authentication factor is compromised by attackers, they still need to overcome additional layers to gain access.

For example, let's consider logging in to your favorite gingerbread cookie recipe website. Initially, you enter your username and password (something you know). To ensure your credentials haven't been compromised, the system sends a code to your phone (something you have), which you then enter into the website. This two-step verification process utilizes both something you know and something you have to grant access, enhancing the overall security of the login.

MFA is generally recommended as a default security practice. However, there might be specific scenarios where, as an Azure admin, you may choose not to enable it. MFA is facilitated through Azure Active Directory and is integrated into Azure as a first-class citizen right from the start, making it a seamless and effective security measure.

How Azure AD DS Works

Azure AD DS is a managed service

• No need for OS configuration/management

• Behind the scenes: two Windows domain controllers for high availability


Create unique namespace/domain name

• Example: aadds-companyname.com

• Standalone domain, not extension of on-premises AD domain


One-way sync from Azure AD to Azure AD DS

• Synchronize users, groups, and credentials

• Azure AD may also bidirectional sync with on-premises AD


As opposed to the self-managed option running on an Azure Virtual Machine, Azure Active Directory Domain Services (AADDS) is a fully managed instance of Active Directory Domain Services. It offers all the classic Active Directory features, including Group Policy, LDAP, Kerberos, and the capability to join servers to a Windows domain. In the managed service, you are relieved of configuring and managing the underlying operating system.


AADDS operates with two separate Windows domain controllers running behind the scenes in a high-availability scenario. Despite this, you don't need to directly interact with these domain controllers; they serve as the underlying infrastructure supporting the managed service.


A crucial distinction between AADDS and classic Active Directory (ADDS) is that the managed AADDS service requires creating a completely separate and unique namespace or domain name, like "aadds-companyname.com." This is distinct from the typical companyname.com domain and emphasizes that AADDS is a standalone domain, not an extension of an on-premises AD domain.

Once configured with a unique domain name, the next step involves a one-way synchronization process from Azure Active Directory to the managed AADDS service. This synchronization includes users, groups, and credentials from your Azure AD instance.


In more complex hybrid scenarios, Azure Active Directory might engage in a bidirectional sync process with on-premises Active Directory environments, alongside the one-way synchronization with the managed AADDS service. This results in a two-way synchronization of users, groups, and credentials between your on-premises Active Directory and the managed AADDS environment.


To sum up, the managed AADDS service becomes the ideal choice for a cloud migration scenario where there's a need to lift and shift legacy enterprise applications to Azure Virtual Machines. This is particularly relevant when these applications don't support modern authentication standards and must be integrated with a classic cloud-hosted Active Directory instance. Choosing a managed service is preferable over maintaining a self-hosted environment on an Azure Virtual Machine. The resolution involves creating an Azure Active Directory Domain Services instance as the managed cloud-hosted version of classic Active Directory and integrating the legacy applications with the AADDS managed service.









Author

abdullah S.

Information

Last changed