Hi everyone, I'm Swaroop Krishnamurthy and I'm excited to share more with you about each method and what we've learned in the process.
What are the different authentication methods?
If you choose to have your cloud identity service handle the authentication process—
The first one is what we call Password Hash Sync. In this method, a hash value of the user's password is extracted and synchronized in Azure AD to authenticate the user when they sign in from the cloud. They can use the same username and password from the on-premises environment to access cloud resources too. This helps IT because they don't have to deploy any additional infrastructure to make it work in the cloud. This method also enables Azure AD Identity Protection capabilities, which protect and monitor your users' passwords against leaked credential reports to prevent bad passwords from being used.
The second one is Pass-through Authentication. This method uses a software agent to connect to passwords stored on-premises for validation, so that users can sign in to cloud apps with the same username and password for on-premises resources. It's a lightweight solution for IT and does not store any form of user passwords in the cloud, which may be a requirement for certain organizations. Like Password Hash Sync, pass-through authentication protects your on-premises accounts by working seamlessly with Azure AD conditional access policies, and it also supports Smart Lockout to prevent brute force attacks.
I've covered cloud authentication methods, but there's another option for custom or complex authentication needs, called federated authentication.
With Federated Authentication, Azure AD will hand off the authentication process to a separate trusted authentication system, such as Active Directory Federation Services, to validate the user's password or sign-in. This method makes sense for organizations with authentication requirements not currently available in Azure AD, such as legacy application protocols.
How do I choose?
For Azure AD customers, I've tried to simplify the decision with this decision tree below. It helps illustrate the effort, user experiences, advanced scenarios, business continuity and other considerations which you should incorporate into your decision-making process.
This decision tree is just a guideline. If you'd like to read more about each of the authentication methods and compare the pros and cons, check out the
Authentication methods documentation and comparison chart.
Swaroop (Twitter: @swaroop_kmurthy)
Check out the other posts in this series:
Download the Hybrid Identity Digital Transformation Framework whitepaper to get a baseline on your hybrid identity strategy.