We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Skip to main content
Log in

Microsoft Azure active directory for next level authentication to provide a seamless single sign-on experience

  • Original Article
  • Published:
Applied Nanoscience Aims and scope Submit manuscript

Abstract

Authentication is crucial although if system which facilitates secure their networks by limiting access to protected resources such as networks, websites, network-based software, databases, and other computer systems or services to only authenticated users (or processes). In general, modern authentication protocols such as Security Assertion Markup Language 2.0 (SAML), WS-Fed, OAuth, and OpenID discourage apps from handling user credentials. The aim is to keep an app's authentication method and its functionality separate. Azure Active Directory (Azure AD) manages the login process to keep confidential data (such as passwords) out of the hands of websites and apps. This allows identity providers (IdP) like Azure AD to provide seamless single sign-on experiences, allow users to authenticate using factors other than passwords (phone, face, biometrics), and block or elevate authentication attempts if Azure AD detects, for example, that the user's account has been compromised or that the user is attempting to access an app from an untrusted location. The main goal of the work is Converting Visual Studio from ADAL to MSAL has allowed us to better support Conditional Access and Multi-factor Authentication and other new AAD features which benefit our customers. Visual Studio 2019 and the.NET Core SDK can be used to complete this work. The SAML request–response authentication workflow between these providers is checked to ensure that user login information is accurate and safe.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Armando A et al (2013) An authentication flaw in browser-based single sign-on protocols: impact and remediations. Comput Secur 33:41–58

    Article  Google Scholar 

  • Basney J, Cao P, Fleury T (2020) Investigating root causes of authentication failures using a SAML and OIDC observatory. 2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application (DependSys), Nadi, Fiji: 119–126. https://doi.org/10.1109/DependSys51298.2020.00026

  • Bhat M (2015) Simulation study of different authentication protocols used for federated identity management in cloud. Int J Emerg Res Manage Technol 4:2

    Google Scholar 

  • Bradford M, Earp JB, Grabski S (2014) Centralized end-to-end identity and access management and ERP systems: a multi-case analysis using the Technology Organization Environment framework. Int J Account Inf Syst 15:149–165

    Article  Google Scholar 

  • Catuogno L, Galdi C (2014) Achieving interoperability between federated identity management systems: a case of study. J High Speed Netw 20(4):209–221

    Article  Google Scholar 

  • Chagas M, Silva JJ, Adriano DD, Wangham MS (2019) SM4VO: a security management mechanism for virtual organizations. 2019 9th Latin-American Symposium on Dependable Computing (LADC), Natal, Brazil: 1–10. https://doi.org/10.1109/LADC48089.2019.8995732

  • Eludiora S et al (2011) A user identity management protocol for cloud computing paradigm. IJCNS 4:152–163

    Article  Google Scholar 

  • Ferdous MS, Chowdhury F, Alassafi MO, Alshdadi AA, Chang V (2020) Social anchor: privacy-friendly attribute aggregation from social networks. IEEE Access 8:61844–61871. https://doi.org/10.1109/ACCESS.2020.2981553

    Article  Google Scholar 

  • Grabatin M, Hommel W (2018) Reliability and scalability improvements to identity federations by managing SAML metadata with distributed ledger technology. NOMS 2018–2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan: 1–6. https://doi.org/10.1109/NOMS.2018.8406310.

  • Indu I, Anand PMR, Bhaskar V (2017) Encrypted token based authentication with adapted SAML technology for cloud web services. J Netw Comput Appl 99:131145

    Google Scholar 

  • Michael S, Anna ZJ (2019) An Identity Provider as a Service platform for the eduGAIN research and education community. 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Arlington, VA, USA: 739–740

  • Rupa C, Patan R, Al-Turjman F, Mostarda L (2020) Enhancing the access privacy of IDaaS system using SAML protocol in fog computing. IEEE Access 8:168793–168801. https://doi.org/10.1109/ACCESS.2020.3022957

    Article  Google Scholar 

  • Shehu A, Pinto A, Correia ME (2019) Privacy preservation and mandate representation in identity management systems. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), Coimbra, Portugal: 1–6. https://doi.org/10.23919/CISTI.2019.8760690.

  • Tanimoto S, Toriyama S, Iwashita M, Endo T, Chertchom P (2009) Secure operation of biometric authentication based on User’s viewpoint. 2019 IEEE International Conference on Big Data, Cloud Computing, Data Science & Engineering (BCD), Honolulu, HI, USA: 166–171. https://doi.org/10.1109/BCD.2019.8885177

  • Verzeletti GM, de Mello ER, Wangham M (2018a) A mobile identity management system to enhance the Brazilian electronic government. IEEE Latin Am Trans 16(11):2790–2797. https://doi.org/10.1109/TLA.2018.8795121

    Article  Google Scholar 

  • Verzeletti GM, de Mello ER, Wangham MS (2018b) A National Mobile Identity Management Strategy for Electronic Government Services. 2018 17th IEEE International Conference on Trust, Security and Privacy In Computing and Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA: 668–673. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00098

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Subbarao.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Subbarao, D., Raju, B., Anjum, F. et al. Microsoft Azure active directory for next level authentication to provide a seamless single sign-on experience. Appl Nanosci 13, 1655–1664 (2023). https://doi.org/10.1007/s13204-021-02021-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13204-021-02021-0

Keywords

Navigation