Conditional Access with Azure AD B2C

  Рет қаралды 1,846

Tech Mind Factory

Tech Mind Factory

Жыл бұрын

This video explains Conditional Access concepts with the Azure AD B2C.
Helpful links:
Azure AD B2C Conditional Access configuration:
learn.microsoft.com/en-us/azu...
Identity Protection and Conditional Access for Azure AD B2C:
learn.microsoft.com/en-us/azu...
Azure AD B2C sign-in with Conditional access:
github.com/azure-ad-b2c/sampl...

Пікірлер: 14
@larrycovert4418
@larrycovert4418 7 ай бұрын
Great video series. I'm interested in how you implemented both phone and TOTP MFA for the same application. Multiple places I've read say this isn't possible. Thanks!
@TechMindFactory
@TechMindFactory 7 ай бұрын
Thank you for watching and kind words! When it comes to two MFA methods for the same application. Let me ask to clarify. Do you want to give the user option to choose between two available MFA options (like SMS and Authenticator)? So the next time user uses one of them during the authentication process? Please provide more details for your scenario. Having multiple MFA options is 100% possible with the custom policies - I can confirm this. :)
@larrycovert4418
@larrycovert4418 7 ай бұрын
@@TechMindFactory Thanks for the quick response. Ideally, at the time of sign-up, the user would be able to choose their preferred MFA method (Email, SMS, or TOTP) and then use that method from that point forward. If I can offer the choice between all three methods, great, but if only two (SMS and TOTP) are possible, that's OK. Thank you!
@Rednunzio
@Rednunzio 8 ай бұрын
It is possible that by going from "Enter admin center" in a tenant with an active AD B2C directory, in the "conditional access" section you will not have the possibility to activate the "term of use" policy but can only create new policies from scratch ?
@TechMindFactory
@TechMindFactory 8 ай бұрын
This is correct. For Azure AD B2C, "terms of use" option is not available. The same in Azure portal. However, you can create conditional access policies from scratch. Please remember that for AD B2C conditional access policies capabilities are limited. You can read more here: learn.microsoft.com/en-us/azure/active-directory-b2c/conditional-access-identity-protection-overview#feature-differences-and-limitations
@olofs3107
@olofs3107 10 ай бұрын
Awesome Video. I was wondering if you could do a video on the following scenarios: Using Azure AB B2C SSO Scenario 1 App A allows users to login either email or SMS MFA App B only allows access if you have logged in via SMS MFA (elevated permission required) users logs into App A using email, then in the same session. the user tries to log into App B. App B prompts for SMS authentication. Scenario 2 App C allows users to login either email or SMS MFA App C will have a button visible to navigate to App D based on token ACR/AMR == SMS. A user can only access App D from App C. A user can not login into App D directly. If they try to login: - Are successful, redirected to App C home page - or an error can be displayed.
@TechMindFactory
@TechMindFactory 10 ай бұрын
Thank you for watching. When it comes to your questions - I have some other topics scheduled already for the new videos however let me explain. With scenario 1 you could achieve this kind of result using DefaultSSOSessionProvider technical profile to store information about the login method used. When accessing application B you could extract data from existing session: learn.microsoft.com/en-us/azure/active-directory-b2c/custom-policy-reference-sso#defaultssosessionprovider When it comes to scenario 2, it is more complex. ACR claim is no longer supported: learn.microsoft.com/en-us/azure/active-directory-b2c/tokens-overview#claims It means you will not be able to get information about MFA method from this claim. You could use custom claim instead and include it in the token. When it comes to controlling access inside the application I think the better idea is to use authorization mechanism in the application. However, I am not sure if I understood this scenario full picture.
@nolimitsREAL
@nolimitsREAL 10 ай бұрын
Hello guys, after the configuration of the CA is done. In my case to ask for MFA. A user starts to log in with google chrome browser (never used tor browser), shouldn't be able to log in without requesting the MFA ? Because I noticed that is requesting every time to use MFA, which is weird. I thought that CA is only applied where it sees a risky situation and also if the user passes the security checks, not something that is requesting all the time.
@TechMindFactory
@TechMindFactory 10 ай бұрын
Hello, Two questions: 1. Did you disable "security defaults" feature in your Azure AD B2C tenant? 2. How did you configure your CA policy? Here you should user "sign-in" risk set to medium or high and then set grant to require MFA.
@nolimitsREAL
@nolimitsREAL 10 ай бұрын
@@TechMindFactory 1. Yes I did disable it because, if I remember correctly it was something that it was requesting me to do, because I use the CA functionality. Also please tell me where I can reactivate it. 2. Don't have to many options to choose, because I don't have to option to choose medium or high. I have only Block access, Grant Access and the possibility to check the MFA. That's it. I think to have more options I need to purchase the P2 of the CA. Thank you.
@TechMindFactory
@TechMindFactory 10 ай бұрын
@@nolimitsREAL Got it, in this case, you need to have P2 license. Azure AD B2C Premium P2 is required to create risky sign-in policies: learn.microsoft.com/en-us/azure/active-directory-b2c/conditional-access-identity-protection-overview
@nolimitsREAL
@nolimitsREAL 10 ай бұрын
@@TechMindFactory The only good thing with the P1 license is that announce a risky user and the rest to do it manually. Also could you tell me how to activate the security defaults back again, mentioned at point 1? thank you
@TechMindFactory
@TechMindFactory 10 ай бұрын
@@nolimitsREAL To activate security defaults feature again, you have to sign in to your Azure AD B2C directory, then select "Azure Active Directory" (or Microsoft Entra ID) service from the left menu. Then select "Properties". On the page you should see "Security Defaults" section. Please note that you can enable security defaults only when you remove all Conditional Access policies. In other case you will see this information: Your organization is currently using Conditional Access policies which prevents you from enabling security defaults. You can use Conditional Access to configure custom policies that enable the same behavior provided by security defaults.
Single Sign Out (Single Logout) with Azure AD B2C
31:38
Tech Mind Factory
Рет қаралды 6 М.
Understanding Azure AD Conditional User and Sign-in Risk
28:46
John Craddock Identity and Access Training
Рет қаралды 4,1 М.
Smart Sigma Kid #funny #sigma #comedy
00:25
CRAZY GREAPA
Рет қаралды 28 МЛН
What are Azure AD External Identities?
28:44
John Savill's Technical Training
Рет қаралды 61 М.
SSO with Azure AD B2C
45:13
Tech Mind Factory
Рет қаралды 8 М.
Azure AD B2C Webinar Series: Custom Policies Part 1
57:59
Azure AD B2C Community
Рет қаралды 30 М.
Azure B2C Identity Experience Framework (IEF)
30:40
Atmosera
Рет қаралды 9 М.
DevOps automation for Azure AD B2C
30:07
Tech Mind Factory
Рет қаралды 996
Magic Links with Azure AD B2C
30:20
Tech Mind Factory
Рет қаралды 1,1 М.
Hisense Official Flagship Store Hisense is the champion What is going on?
0:11
Special Effects Funny 44
Рет қаралды 3,2 МЛН
Choose a phone for your mom
0:20
ChooseGift
Рет қаралды 7 МЛН
WATERPROOF RATED IP-69🌧️#oppo #oppof27pro#oppoindia
0:10
Fivestar Mobile
Рет қаралды 19 МЛН
Samsung Galaxy 🔥 #shorts  #trending #youtubeshorts  #shortvideo ujjawal4u
0:10
Ujjawal4u. 120k Views . 4 hours ago
Рет қаралды 7 МЛН