黑料海角91入口

Azure AD Best Practices

Written by David Worthington on November 7, 2022

Share This Article


Contents


Identity is the new perimeter. Cyberattacks are becoming more advanced and cloud-focused. Identity providers (IdP) have responded by offering security controls that make it possible for small and medium-sized enterprises (SMEs) to be proactive and mitigate these threats. Many SMEs use Microsoft鈥檚 Azure Active Directory (AAD), which has to secure identities. Microsoft reserves several features for its most premium subscriptions levels. IT administrators must determine which , or mixture of supplemental services from an open directory, are most appropriate for their unique security requirements. 

This article outlines the fundamentals of securing identities in AAD with emphasis on understanding what options are available and tailoring security controls to your organization. Provisioning and identity and access management (IAM) is the starting point, followed by centralizing the identity management lifecycle, adding appropriate controls, and auditing.

Identity and Access Control

There are three main paths for provisioning in AAD: 

  • HR-driven onboarding.
  • Federating identity from AAD to cloud apps.
  • Inter-directory such as between the Active Directory Domain Services (AD DS) server role to access resources from your on-prem Active Directory domains.
Diagram depicting Azure AD provisioning
Image credit: Microsoft

Provision, Manage, and Deprovision Access 

Get started with identity governance in Azure Active Directory

Most Microsoft shops have Active Directory (AD). A sync tool called Azure AD Connect syncs users with AAD. Microsoft also accepts non-Microsoft identities for access control, but additional costs may be assessed. Some organizations may have deployed Active Directory Federation Services (AD FS) prior to the advent of AAD. 

There鈥檚 a significant potential for disruptions to system availability when identities are migrated from AD FS to AAD without deliberate planning. Avoid impulsive decision-making when you鈥檙e migrating users. Organizations that opt for a hybrid approach should harden Active Directory. This detailed guide to Active Directory offers recommendations about how AD should be managed and maintained for optimal security. Always limit administrative privileges in AD and avoid running day-to-day as a domain administrator.

Configure Azure AD cloud sync

Familiarize yourself with 鈥渏oin, move, and leave鈥 planning processes and Microsoft鈥檚 concepts for identity governance. Automation is possible, but it鈥檚 designed for mid-size to large organizations. There鈥檚 no default auditing to avoid over-provisioning users or for when individuals leave. Due diligence is necessary to avoid security and compliance issues.

Critically Important AAD Best Practices

Verify that you鈥檝e completed these steps before moving on.

Role-Based Access Control

Role-based access control inside Azure Active Directory

AAD has built-in and custom user roles, and role-based access control (RBAC) is standard across all subscription tiers. This permits IT to follow the concept of least privilege and helps to establish a Zero Trust security approach, but it relies heavily on manual input and maintenance. Dynamic membership rules are now possible using a that’s separate from RBAC.

Ensure that you:

  • Minimize the number of privileged accounts.
    • Plan to manage, control, and monitor access.
    • Limit global administrator accounts and make use of other roles such as billing administrator, global reader, helpdesk administrator, and license administrator.
  • Limit global administrators and never sync high privilege accounts from AD.
  • Pay careful attention to external collaboration settings and consider restricting external users from being able to invite guests to shared files; third-party storage; as well as review and adjust global sharing settings for SharePoint Online and OneDrive. These changes impact end users, but make it easier to recognize the 鈥渙fficial鈥 channels.

Using security groups for users assists with application security and lowers administrative overhead. Microsoft limits this capability to AAD Premium 1 (P1) and Premium 2 (P2) accounts. However, always try to avoid assigning resources directly to users and use identity protection. Please note that Microsoft has to syncing AD groups with ADD groups.  For example, AD primary group memberships will not sync over to AAD.

Multi-Factor Authentication

Configuring multi-factor authentication in Azure Active Directory

Multi-factor authentication (MFA) is vital for identity protection. AAD鈥檚 free tier only permits the use of the Microsoft Authenticator application. Admins have the option of only protecting the Azure AD Global Administrator versus all accounts, but it鈥檚 highly advisable to set up MFA for all users. Protect against MFA self-enrollment attacks by using a Temporary Access Pass (TAP) to secure the initial registration. Avoid mixing per-user MFA with Security Defaults and other settings.

Your budget may impact what鈥檚 possible. Microsoft assesses fees for all MFA verifications that happen with non-Microsoft identities and capabilities vary depending upon . 

Consider using additional context and 鈥渘umber matching鈥 in Authenticator notifications to include the application name and geographic location in Push MFA prompts. This practice safeguards against 鈥淢FA bombing,鈥 where attackers send repeated requests to exploit MFA fatigue. Attackers successfully hijacked Microsoft users鈥 sign-in sessions to bypass by using advanced phishing toolkits. Microsoft鈥檚 mitigation is to use certificate-based authentication and Fast ID Online (FIDO) v2.0 MFA implementations. 

MFA through FIDO 2 devices and Windows Hello requires AAD P1 and P2. Additional hardware costs may apply. Some additional security controls include conditional access (CA).

Conditional Access

Microsoft recommends that all accounts deploy CA, but it鈥檚 also an extra cost and only available through P1, P2, or the E3 and E5 tiers for Microsoft 365 (M365) users. The standard M365 tier doesn鈥檛 include it. The overall licensing scheme is changing and can be bewildering. 

There鈥檚 more than one CA implementation:

  • P1 enforces MFA in certain scenarios
  • P2 is risk based, learning user behavior to minimize MFA prompts

There are additional steps to consider for password management before we move on.

Configure Password Management

Self-service password reset in Azure Active Directory

Microsoft has revised its password policy guidance to no longer expire passwords. It鈥檚 important to understand that SMEs that are regulated or don鈥檛 have MFA and CA configured shouldn鈥檛 do that. You may also consider changing passwords if you suspect an ID has been hijacked. CrowdStrike found that 71% of attacks are now malware-less and targeting cloud IDs. 75% of cloud breaches are due to compromised identities. A Zero Trust posture isn鈥檛 optional. Consider deploying (XDR) from a vendor of your choosing or paying extra for Microsoft Identity Protection if you prefer the Microsoft stack.

Other best practices are:

  • Set up self-service password reset (SSPR) with two authentication methods. Note that using security questions might be risky, because attackers gather intelligence on employees that鈥檚 鈥渙pen source鈥 from the web or obtain information from third-party breaches elsewhere. Microsoft charges extra for on-premises write-back.
  • Use the same password policies everywhere (on-prem and cloud-based). Microsoft maintains on an agent-based approach to enforce AAD password protection on AD DS without exposing your domain controller to the web or forcing networking changes. Note that you have to be proficient in modifying AD settings.

Prepare for the Worst

Creating an emergency access global admin account inside Azure Active Directory

Create an Global Admin account for when it鈥檚 necessary to 鈥渂reak the glass鈥 during network outages and periods of system downtime. This account is excluded from CA and MFA. Always store these credentials appropriately and use a highly complex password.

Following the steps outlined above provides a strong foundation with the appropriate entitlements, attributes, and processes to prepare AAD for application provisioning.

黑料海角91入口

Breaking Up with Active Directory

Don鈥檛 let your directory hold you back. Learn why it鈥檚 time to break up with AD.

Manage Connected Applications

Application provisioning is on a per user basis by default with group assignment to applications being reserved for P1, P2, or equivalent AAD subscribers. Ensure that applications don鈥檛 provision high access through RBAC. There are multiple options, and automation is available for application provisioning. The initial provisioning cycle populates users, followed by programmatic incremental updates that handle updates made through Microsoft Graph or AD.

Microsoft provides several options for attribute mapping from identities that originate from the 鈥渢hree paths鈥 mentioned above via SCIM endpoints to cloud resources or the . The latter must run on the same server as your SCIM application. Microsoft also has options for one-way connections from AAD to LDAP or SQL database user stores, but those have several . Provisioning users into AD DS isn鈥檛 supported.

Siloed identities complicate existing identity practices and infrastructure as well as increase technical overhead and the attack surface area. Enable single sign-on (SSO) to centralize identity management either through AAD or a system or service that integrates with it. 

Enable Single Sign-On

Registering an application and enable single sign-on in Azure AD

SSO will improve security through modern authentication protocols, make life easier for your users, and reduce management overhead. Microsoft has imposed restrictions on the number of SSO applications per user on its free tier, but that policy may be changing. AAD provides pre-built integrations through the Azure AD application gallery in addition to SAML and OAuth 2.0 SSO protocols for manual settings. Microsoft doesn鈥檛 support the AAA protocol RADIUS, which many network appliances use for access control, so its SSO doesn鈥檛 access all of your resources. Consider using cloud RADIUS or install and configure the Microsoft NPS server role.

It鈥檚 possible for all AAD tiers to access native Windows apps via Kerberos, NTLM, LDAP, RDP, and SSH authentication in a hybrid deployment. However, identity protection features such as CA are limited to P1 and P2 products including or . These services will extend modern security to legacy apps.

Azure AD Application Proxy requires AAD Premium or a Basic License

Phishing Considerations

App registrations and admin portal access can be restricted in AAD

Microsoft鈥檚 default settings permit all users to access the AAD admin portal and register custom SSO applets. Attackers are wise to this workflow and exploit OAuth in phishing exploits, which may bypass MFA. The principle of least privilege mandates that users who don鈥檛 need access shouldn鈥檛 receive it. Strongly consider restricting user-driven application consent and setting to 鈥渓ow impact.鈥 This also applies to group owners. Compliance boundaries are murkier and should be carefully assessed outside of the Microsoft ecosystem.

Configuring permissions in Azure Active Directory

AAD can be complex and Microsoft has amassed for advanced specialization. Blocks of time with consultants should be a budgeting consideration for any AAD project. This writer, a former IT director, needed consultants even when projects appeared straightforward.

AAD is capable of alerting you to suspicious OAuth authorization requests, but that requires an additional subscription to Microsoft Cloud App security, either standalone or through M365 E5. Other solutions such as have this capability. 黑料海角91入口 is a CrowdStrike partner and integrates with its solutions through the .

Now that you鈥檙e familiar with configuring users, groups, and applications, let鈥檚 review reporting. 

Audit Your Security Regularly

Screenshot of reports available in Azure Active Directory

You should always look for ways to improve in-house security and processes. If you can鈥檛 stop it, you should at least monitor it. Regularly audit your entitlements, users, and review activity reports. Taking this extra step helps make security a process as opposed to relying solely on products and services. 

Ideally, you鈥檒l be monitoring all privilege changes, suspicious activity, and signs of known attacks. AAD will provide you with several reports:

  • Basic security and usage reports are included among all subscription tiers
  • Advanced reporting is restricted to P1 and P2
  • SIEM reporting and Identity Protection require P2 (or equivalent) subscriptions

Some security capabilities may be more accessible and easier to deploy via 黑料海角91入口, which integrates with AD, AAD/M365, , and Okta, or can function as a standalone directory. 黑料海角91入口 is focused on managing identities, in all places, as your security perimeter.

黑料海角91入口

Breaking Up with Active Directory

Don鈥檛 let your directory hold you back. Learn why it鈥檚 time to break up with AD.

How 黑料海角91入口 Improves Upon Azure AD Best Practices

黑料海角91入口 admin console

黑料海角91入口 is an open directory platform that manages identities, access control, and devices. Devices are a method of granting access to an identity or application, so device management is included by default. That makes it possible to assemble high visibility telemetry data for reporting.

As previously noted, Microsoft requires its users to purchase additional subscriptions (, M365 E3/5, AAD P1/2, and Intune for device management) to meet its recommendations for best practices. Standard AAD deployments fall short of Microsoft鈥檚 guidance, but some of its premium offerings may sell SMEs more features than they require or even want to purchase.

黑料海角91入口 can help to fill in some of those gaps, and is easy to deploy, with deepening integrations for exporting AAD user groups. It鈥檚 designed for SMEs, so IT teams may benefit from having more control over what they鈥檙e buying (as opposed to not using what they pay for). The next section explores the specifics of how 黑料海角91入口 can improve AAD and help your organization to build the stack of its choosing out of best-of-breed apps and services.

IAM and SSO

Configuring SSO applications in 黑料海角91入口

Identities flow into 黑料海角91入口 from other directories, HRIS systems, or 黑料海角91入口鈥檚 Cloud LDAP. Attributes, such as where users are located, who their supervisor is, or what team they belong to, simplify provisioning user access to IT resources such as applications and networks. 

User groups in 黑料海角91入口

Group management is provided at no additional cost and leverages attribute-based access control (ABAC), enabling the system to continuously audit entitlements for Zero Trust access control. 黑料海角91入口 is introducing the ability to automate and apply membership suggestions to groups. RBAC is more of a manual process, which can lead to mistakes that over or under provision users. Group members can access resources through SSO protocols and more:

  • SAML
  • OAuth 2.0
  • OIDC
  • RADIUS
  • LDAP

黑料海角91入口 provides delegated authentication that leverages AAD credentials and password policies for RADIUS. This capability extends Azure SSO to network resources such as Wi-Fi networks and VPNs while also reducing technical overhead and eliminating siloed identities. SSO applets launch from within the 黑料海角91入口 user console as a security control for phishing.

Environment-Wide MFA

黑料海角91入口 Protect鈩, an integrated authenticator app for MFA, is designed to be frictionless. It provides application-based Push MFA and TOTP in addition to WebAuthn and U2F keys. More options for biometric authentication and passwordless log-in experiences are being added to the platform. 

MFA can be configured for most SSO, LDAP, and RADIUS logins. It鈥檚 also integrated with CA.

RADIUS and MFA configuration in 黑料海角91入口

Conditional Access

AAD identities can be protected by conditional access through 黑料海角91入口 as an add-on without purchasing P1 or P2 from Microsoft. Pre-built rules are available to enforce MFA for privileged user groups, restrict logins to specific locations, and to require device trust. Meaning, any identity + device that isn鈥檛 managed by 黑料海角91入口 won鈥檛 be able to access cloud apps. More granular conditions such as OS version and device encryption status are coming soon.

Configuring conditional access policies

Password Management

A decentralized password manager and vault is available as an add-on through browser plug-ins and mobile apps to help SMEs implement complex passphrases for users. This feature assists with provisioning and revoking user access to reduce the risk of data breaches. Centralized password management also increases visibility for compliance peace of mind.

黑料海角91入口 password management categories

Device Management

Mobile device management (MDM) in 黑料海角91入口

黑料海角91入口 is cross-OS, supporting:

  • Android: Support for policies and application distribution is coming in late 2022 and beyond.
  • Apple products: Mobile Device Management (MDM) is available for macOS and iOS devices, providing for application distribution, policies, and commands with the option for Zero Trust deployment. Policies are timely and in-touch with the needs of Mac admins, including addressing 鈥淒ay 0鈥 OS upgrade controls. 
  • Linux: 黑料海角91入口 supports with multiple deployment options. It provides pre-built policies, including full disk encryption (FDE), and Sudo access for commands (with pre-built security commands through the Admin Console). IAM capabilities aren鈥檛 restricted to certain browsers; Microsoft mandates Edge for Intune device enrollment. Intune is an additional subscription beyond standalone AAD. 
  • Windows: Anything an admin wishes to do is possible through security commands and a PowerShell module. Commands function through a queue. 黑料海角91入口 provides pre-built GPO-like policies including fine-grained control over BitLocker, as well as a GUI for custom policies. There鈥檚 also software distribution, and more, with Windows Out of Box Experience (OOBE) coming soon to streamline onboarding remote workers.

Patch Management

黑料海角91入口 Patch Management release trains

黑料海角91入口 offers cross-OS patching as an add-on. Patching is an important activity to mitigate the risk of security breaches that leverage 0-Day attacks with a healthy device state. Centralizing patch management helps to reduce costs versus purchasing a third-party patch management solution for Windows and all other operating systems. Browser patch management is arriving in Q4, 2022, and it will extend to reporting for management status.

Google Chrome patch management in 黑料海角91入口

Remote Assist

IT teams can extend opt-in remote support to users with Remote Assist. It鈥檚 free and works cross-OS. The only configuration that鈥檚 required is to have 黑料海角91入口 agents running on a device that鈥檚 bound to an identity from the open directory. It鈥檚 possible to:

  • Copy and paste between devices
  • Work in multi-monitor systems
  • Turn on audit logging
黑料海角91入口 Remote Assist

Reporting

黑料海角91入口鈥檚 emphasis on making identity the new perimeter is reflected in the telemetry that鈥檚 available from built-in reporting tools including Device Insights and Directory Insights. There鈥檚 a growing selection of pre-made reports, stored for analysis. SIEM integration is also possible.

Some of those include:

  • User to Devices
  • User to RADIUS Server
  • User to LDAP
  • User to Directories
  • User to SSO Applications
  • OS Patch Management Policy

Cloud Insights is an add-on to monitor Amazon Web Services (AWS) events and user actions. This makes compliance and data forensics easier for SMEs and helps to enforce least privilege in cloud infrastructure. Support for Google Cloud (GCP) will be introduced next for a multi-cloud strategy.

黑料海角91入口 Cloud Insights makes compliance, monitoring, and compliance easier

Avoid Vendor Lock-In and Do More with 黑料海角91入口

黑料海角91入口 is with its full functionality. AAD users benefit from more freedom of choice, simpler deployment workflows, access to more sources, and lower costs.

David Worthington

I'm the 黑料海角91入口 Champion for Product, Security. 黑料海角91入口 and Microsoft certified, security analyst, a one-time tech journalist, and former IT director.

Continue Learning with our Newsletter