Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By : Jochen Nickel
Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By: Jochen Nickel

Overview of this book

Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (23 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

OpenID Connect (OIDC)


OIDC was established as a standard by its membership in February 2014. OIDC provides a lightweight framework for identity interactions in a RESTful manner. The specification was developed under the OpenID Foundation and has its roots in OpenID; it was greatly affected by OAuth 2.0, because that specification was not intended for authentication. Microsoft was also a co-author of the OIDC specification.

Key facts about OIDC

It defines the following identity layers on top of OAuth 2.0:

  • It uses two OAuth 2.0 flows:
    • Authorization code flow
    • Implicit flow
  • Adds an ID token to OAuth 2.0 exchange
  • Adds the ability to request claims using an OAuth 2.0 access token

The following roles are used:

  • OpenID Connect Provider (OP): Authorization server issues the ID token
  • Relying Party: Client application that requests the ID token
  • ID token: Issued by the OP
  • Claim: Information about the user

The following figure shows the OpenID Connect flow:

OpenID Connect flow

The flow runs with the following steps...