You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/authentication-scenarios.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ This article covers many of the authentication concepts you'll need to understan
34
34
35
35
Instead of creating apps that each maintain their own username and password information, which incurs a high administrative burden when you need to add or remove users across multiple apps, apps can delegate that responsibility to a centralized identity provider.
36
36
37
-
Azure Active Directory (Azure AD) is a centralized identify provider in the cloud. Delegating authentication and authorization to it enables scenarios such as Conditional Access policies that require a user to be in a specific location, the use of multi-factor authentication, as well as enabling a user to sign in once and then be automatically signed in to all of the web apps that share the same centralized directory. This capability is referred to as Single Sign On (SSO).
37
+
Azure Active Directory (Azure AD) is a centralized identity provider in the cloud. Delegating authentication and authorization to it enables scenarios such as Conditional Access policies that require a user to be in a specific location, the use of multi-factor authentication, as well as enabling a user to sign in once and then be automatically signed in to all of the web apps that share the same centralized directory. This capability is referred to as Single Sign On (SSO).
38
38
39
39
A centralized identity provider is even more important for apps that have users located around the globe that don't necessarily sign in from the enterprise's network. Azure AD authenticates users and provides access tokens. An access token is a security token that is issued by an authorization server. It contains information about the user and the app for which the token is intended, which can be used to access Web APIs and other protected resources.
40
40
@@ -50,7 +50,7 @@ Azure AD also provides Azure Active Directory B2C so that organizations can sig
50
50
51
51
### Security tokens
52
52
53
-
Security tokens contain information about users and apps. Azure AD uses JSon based tokens (JWTs) that contain claims. A claim provides assertions about one entity to another. Applications can use claims for various tasks such as:
53
+
Security tokens contain information about users and apps. Azure AD uses JSON based tokens (JWTs) that contain claims. A claim provides assertions about one entity to another. Applications can use claims for various tasks such as:
54
54
55
55
* Validating the token
56
56
* Identifying the subject's directory tenant
@@ -80,7 +80,7 @@ Applications can sign in users themselves or delegate sign-in to an identity pro
80
80
For an identity provider to know that a user has access to a particular app, both the user and the application must be registered with the identity provider. When you register your application with Azure AD, you are providing an identity configuration for your application that allows it to integrate with Azure AD. Registering the app also allows you to:
81
81
82
82
- customize the branding of your application in the sign-in dialog. This is important because this is the first experience a user will have with your app.
83
-
- decide if you want to let users sign in only if they belong to your organization. This is a single tenant application. Or allow users to sign in using any work or school account. This is a multi-tenant application. You can also allow personal Microsoft accounts, or a social account from Linked-In, Google, and so on.
83
+
- decide if you want to let users sign in only if they belong to your organization. This is a single tenant application. Or allow users to sign in using any work or school account. This is a multi-tenant application. You can also allow personal Microsoft accounts, or a social account from LinkedIn, Google, and so on.
84
84
- request scope permissions. For example, you can request the "user.read" scope, which grants permission to read the profile of the signed-in user.
85
85
- define scopes that define access to your Web API. Typically, when an app wants to access your API, it will need to request permissions to the scopes you define.
86
86
- share a secret with Azure AD that proves the app's identity to Azure AD. This is relevant in the case where the app is a confidential client application. A confidential client application is an application that can hold credentials securely. They require a trusted backend server to store the credentials.
@@ -95,9 +95,9 @@ The Microsoft identity platform:
95
95
* Holds all the data required to support authentication at runtime.
96
96
* Holds all the data for deciding what resources an app might need to access, and under what circumstances a given request should be fulfilled.
97
97
* Provides infrastructure for implementing app provisioning within the app developer's tenant, and to any other Azure AD tenant.
98
+
* Handles user consent during token request time and facilitate the dynamic provisioning of apps across tenants
98
99
99
-
Handle user consent during token request time and facilitate the dynamic provisioning of apps across tenants
100
-
Consent is the process of a resource owner granting authorization to a client application to access protected resources, under specific permissions, on behalf of the resource owner. The Microsoft identity platform:
100
+
Consent is the process of a resource owner granting authorization for a client application to access protected resources, under specific permissions, on behalf of the resource owner. The Microsoft identity platform:
101
101
102
102
* Enables users and administrators to dynamically grant or deny consent for the app to access resources on their behalf.
103
103
* Enables administrators to ultimately decide what apps are allowed to do and which users can use specific apps, and how the directory resources are accessed.
0 commit comments