Browse Tag

azure

Azure AD Seamless Single Sign-on

The single sign-on (Azure AD Seamless SSO) feature of Azure AD adds extra value to the Azure AD authentication process and provides a better experience for your users by eliminating the need to enter passwords or even usernames whenever you need to authenticate to Azure AD to access various resources.

Keep Reading

Azure AD pass-through authentication

Pass-through authentication is one of the Azure authentication methods that allows for users to use a single set of credentials to access both on-premises resources, and resources in the cloud such as Office 365, or other SaaS applications.

Keep Reading

Install and configure Azure AD Connect

Azure AD Connect is the replacement for DirSync and Azure AD Sync, and it in simple terms allows you to integrate your on-premises Active Directory with Azure Active Directory, keeping both directories in sync with each other. This enables you to provide identities that are consistent across your on-premises services, and services in the cloud such as Office 365, or other SaaS applications without the need for separate logon credentials to private and public cloud resources.

Keep Reading

Single sign-on to Office 365 using NetScaler SAML and nFactor authentication with Azure MFA

The following post describes how to configure SAML authentication with NetScaler as the IdP (Identity Provider) and Microsoft Office 365 as the SP (Service Provider). Going above just using SAML, a mixture of Azure Multi-Factor Authentication, User Certificates, LDAP and Negotiate authentication policies are used for authentication from external and internal locations.

Keep Reading

Azure Multi-Factor Authentication with NetScaler Unified Gateway

MFA/Azure Multi Factor Authentication (previously PhoneFactor) is a multi-factor authentication technology that can be used with IIS, VPNs, OWA, ADFS, Office 365 and NetScaler to name a few using either the LDAP or RADIUS protocols from Azure cloud or on-premise. MFA has the ability to verify a users identity by calling their phone, texting their phone or using an app for verification. Using a phone for the second factor allows you to make use of something everyone will likely already have without additional bits of hardware whilst making it a great deal harder for attackers to break into accounts.

Keep Reading