Skip to content

Commit bde1191

Browse files
authored
Merge pull request #110177 from ArvindHarinder1/patch-103
[Ready to merge] Create common-scenarios.md
2 parents 6d88221 + ffae853 commit bde1191

File tree

2 files changed

+93
-0
lines changed

2 files changed

+93
-0
lines changed
Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
---
2+
title: Common application management scenarios for Azure Active Directory | Microsoft Docs
3+
description: Centralize application management with Azure AD
4+
documentationcenter: ''
5+
author: msmimart
6+
manager: CelesteDG
7+
8+
ms.assetid:
9+
ms.service: active-directory
10+
ms.subservice: app-provisioning
11+
ms.workload: identity
12+
ms.tgt_pltfrm: na
13+
ms.devlang: na
14+
ms.topic: conceptual
15+
ms.date: 03/02/2019
16+
ms.author: mimart
17+
ms.reviewer: arvinh
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Centralize application management with Azure AD
23+
24+
Passwords, both an IT nightmare and a pain for employees across the world. This is why more and more companies are turning to Azure Active Directory, Microsoft's Identity and Access Management solution for the cloud and all your other resources. Jump from application to application without having to enter a password for each one. Jump from Outlook, to Workday, to ADP as fast as you can open them up, quickly and securely. Then collaborate with partners and even others outside your organization all without having to call IT. What's more, Azure AD helps manage risk by securing the apps you use with things like multi-factor authentication to verify who you are, using continuously adaptive machine learning and security intelligence to detect suspicious sign-ins giving you secure access to the apps you need, wherever you are. It's not only great for users but for IT as well. With just-in-time access reviews and a full scale governance suite, Azure AD helps you stay in compliance and enforce policies too. And get this, you can even automate provisioning user accounts, making access management a breeze. check out some of the common scenarios that customer use Azure Active Directory's application management capabilities for.
25+
26+
**Common scenarios**
27+
28+
29+
> [!div class="checklist"]
30+
> * SSO for all your applications
31+
> * Automate provisioning and deprovisioning
32+
> * Secure your applications
33+
> * Govern access to your applications
34+
> * Hybrid secure access
35+
36+
## Scenario 1: Set up SSO for all your applications
37+
38+
No more managing password. Securely access all the resources you need with your corporate credentials.
39+
40+
|Feature | Description | Recommendation |
41+
|---------|---------|---------|
42+
|SSO|Standards-based federated SSO using trusted industry standards.|Always use [SAML / OIDC](https://docs.microsoft.com/azure/active-directory/manage-apps/isv-choose-multi-tenant-federation) to enable SSO when your application supports it.|
43+
|Access panel|Offer your users a simple hub to discover and access all their applications. Enable them to be more productive with self-service capabilities, like requesting access to apps and groups, or managing access to resources on behalf of others.| Deploy the [access panel](https://docs.microsoft.com/azure/active-directory/manage-apps/access-panel-deployment-plan) in your organization once you've integrated your apps with Azure AD for SSO.|
44+
45+
## Scenario 2: Automate provisioning and deprovisioning
46+
47+
48+
Most applications require a user to be provisioned into the application before accessing the resources that they need. Using CSV files or complex scripts can be costly and hard to manage. Furthermore, customers need to ensure that accounts are removed when someone shouldn't have access anymore. Leverage the tools below to automate provisioning and deprovisioning.
49+
50+
51+
|Feature |Description|Recommendation |
52+
|---------|---------|---------|
53+
|SCIM Provisioning|[SCIM](https://aka.ms/SICMOverview) is an industry best practice for automating user provisioning. Any SCIM-compliant application can be integrated with Azure AD. Automatically create, update, and delete user accounts without having to maintain CSV files, custom scripts, or on-prem solutions.|Check out the growing list of [pre-integrated](https://docs.microsoft.com/azure/active-directory/saas-apps/tutorial-list) apps in the Azure AD app gallery|
54+
|Microsoft Graph|Leverage the breath and depth of data that Azure AD has to enrich your application with the data that it needs.|Leverage the [Microsoft graph](https://developer.microsoft.com/graph/) to get data from across the Microsoft ecosystem. |
55+
56+
57+
## Scenario 3: Secure your applications
58+
Identity is the linchpin for security. If an identity gets compromised, it's incredibly difficult to stop the domino effect before it's too late. On average over 100 days pass before organizations discover that there was a compromise. Use the tools provided by Azure AD to improve the security posture of your applications.
59+
60+
|Feature |Description| Recommendation |
61+
|---------|---------| ---------|
62+
|Azure MFA|Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Using admin-approved authentication methods, Azure MFA helps safeguard access to your data and applications while meeting the demand for a simple sign-in process.| [Enable MFA](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/all-your-creds-are-belong-to-us/ba-p/855124) for your users. |
63+
|Conditional Access|With Conditional Access, you can implement automated access control decisions for who can access your cloud apps, based on conditions.| Review the [security defaults](https://docs.microsoft.com/azure/active-directory/fundamentals/concept-fundamentals-security-defaults) and [common policies](https://docs.microsoft.com/azure/active-directory/conditional-access/concept-conditional-access-policy-common) customers are using. |
64+
|Identity Protection|Identity Protection uses the learnings Microsoft has acquired from their position in organizations with Azure AD, the consumer space with Microsoft Accounts, and in gaming with Xbox to protect your users. Microsoft analyses 6.5 trillion signals per day to identify and protect customers from threats.|Enable the [default identity protection policies](https://docs.microsoft.com/azure/active-directory/identity-protection/concept-identity-protection-policies) provided by our service. |
65+
66+
## Scenario 4: Govern access to your applications
67+
Identity Governance helps organizations achieve a balance between productivity - How quickly can a person have access to the applications they need, such as when they join my organization? And security - How should their access change over time, such as due to changes to that person's employment status?
68+
69+
|Feature |Description|Recommendation |
70+
|---------|---------| ---------|
71+
|ELM|Azure AD entitlement management can help users both inside and outside your organization more efficiently manage access to their applications.| Allow non-admins to manage access their applications with [access packages](https://docs.microsoft.com/azure/active-directory/governance/entitlement-management-access-package-first).|
72+
|Access Reviews|User's access to apps can be reviewed on a regular basis to make sure only the right people have continued access.| [Review access](https://docs.microsoft.com/azure/active-directory/governance/access-reviews-overview) to your most sensitive applications. |
73+
|Log Analytics|Generate reports about who is accessing which applications and store them in your SIEM tool of choice to correlate data between data sources and over time.| Enable [log analytics](https://docs.microsoft.com/azure/active-directory/reports-monitoring/howto-analyze-activity-logs-log-analytics) and set up alerts for critical events related to your applications. |
74+
75+
76+
## Scenario 5: Hybrid Secure Access
77+
Identity can only be your control plane if it can connect everything across cloud and on-premises applications. Leverage the tools provided by Azure AD and its partners to secure access to legacy-auth based applications.
78+
79+
|Feature |Description|Recommendation |
80+
|---------|---------|---------|
81+
|Application Proxy|Employees today want to be productive at any place, at any time, and from any device. They need to access SaaS apps in the cloud and corporate apps on-premises. Azure AD Application proxy enables this robust access without costly and complex virtual private networks (VPNs) or demilitarized zones (DMZs).|Setup [remote access](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy) for your on-prem apps. |
82+
|F5, Akamai, Zscaler|Using your existing networking and delivery controller, you can easily protect legacy applications that are still critical to your business processes but that you couldn't protect before with Azure AD. It's likely you already have everything you need to start protecting these applications.| Using Akamai, Citrix, F5, or Zscaler? Check out our [pre-built solutions](https://docs.microsoft.com/azure/active-directory/manage-apps/secure-hybrid-access). |
83+
84+
## Related articles
85+
86+
- [Application management](https://docs.microsoft.com/azure/active-directory/manage-apps/index)
87+
- [Application provisioning](https://docs.microsoft.com/azure/active-directory/app-provisioning/user-provisioning)
88+
- [Hybrid secure access]()
89+
- [Identity governance](https://docs.microsoft.com/azure/active-directory/governance/identity-governance-overview)
90+
- [Microsoft identity platform](https://docs.microsoft.com/azure/active-directory/develop/v2-overview)
91+
- [Identity security](https://docs.microsoft.com/azure/active-directory/conditional-access/index)

articles/active-directory/manage-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@
77
href: what-is-application-management.md
88
- name: What is Application Proxy for on-premises apps?
99
href: what-is-application-proxy.md
10+
- name: Common app management scenarios
11+
href: common-scenarios.md
1012
- name: What is application provisioning?
1113
href: /azure/active-directory/app-provisioning/user-provisioning?context=azure/active-directory/manage-apps/context/manage-apps-context
1214
- name: Quickstarts

0 commit comments

Comments
 (0)