Abstract
Authentication is crucial although if system which facilitates secure their networks by limiting access to protected resources such as networks, websites, network-based software, databases, and other computer systems or services to only authenticated users (or processes). In general, modern authentication protocols such as Security Assertion Markup Language 2.0 (SAML), WS-Fed, OAuth, and OpenID discourage apps from handling user credentials. The aim is to keep an app's authentication method and its functionality separate. Azure Active Directory (Azure AD) manages the login process to keep confidential data (such as passwords) out of the hands of websites and apps. This allows identity providers (IdP) like Azure AD to provide seamless single sign-on experiences, allow users to authenticate using factors other than passwords (phone, face, biometrics), and block or elevate authentication attempts if Azure AD detects, for example, that the user's account has been compromised or that the user is attempting to access an app from an untrusted location. The main goal of the work is Converting Visual Studio from ADAL to MSAL has allowed us to better support Conditional Access and Multi-factor Authentication and other new AAD features which benefit our customers. Visual Studio 2019 and the.NET Core SDK can be used to complete this work. The SAML request–response authentication workflow between these providers is checked to ensure that user login information is accurate and safe.
Similar content being viewed by others
References
Armando A et al (2013) An authentication flaw in browser-based single sign-on protocols: impact and remediations. Comput Secur 33:41–58
Basney J, Cao P, Fleury T (2020) Investigating root causes of authentication failures using a SAML and OIDC observatory. 2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application (DependSys), Nadi, Fiji: 119–126. https://doi.org/10.1109/DependSys51298.2020.00026
Bhat M (2015) Simulation study of different authentication protocols used for federated identity management in cloud. Int J Emerg Res Manage Technol 4:2
Bradford M, Earp JB, Grabski S (2014) Centralized end-to-end identity and access management and ERP systems: a multi-case analysis using the Technology Organization Environment framework. Int J Account Inf Syst 15:149–165
Catuogno L, Galdi C (2014) Achieving interoperability between federated identity management systems: a case of study. J High Speed Netw 20(4):209–221
Chagas M, Silva JJ, Adriano DD, Wangham MS (2019) SM4VO: a security management mechanism for virtual organizations. 2019 9th Latin-American Symposium on Dependable Computing (LADC), Natal, Brazil: 1–10. https://doi.org/10.1109/LADC48089.2019.8995732
Eludiora S et al (2011) A user identity management protocol for cloud computing paradigm. IJCNS 4:152–163
Ferdous MS, Chowdhury F, Alassafi MO, Alshdadi AA, Chang V (2020) Social anchor: privacy-friendly attribute aggregation from social networks. IEEE Access 8:61844–61871. https://doi.org/10.1109/ACCESS.2020.2981553
Grabatin M, Hommel W (2018) Reliability and scalability improvements to identity federations by managing SAML metadata with distributed ledger technology. NOMS 2018–2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan: 1–6. https://doi.org/10.1109/NOMS.2018.8406310.
Indu I, Anand PMR, Bhaskar V (2017) Encrypted token based authentication with adapted SAML technology for cloud web services. J Netw Comput Appl 99:131145
Michael S, Anna ZJ (2019) An Identity Provider as a Service platform for the eduGAIN research and education community. 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Arlington, VA, USA: 739–740
Rupa C, Patan R, Al-Turjman F, Mostarda L (2020) Enhancing the access privacy of IDaaS system using SAML protocol in fog computing. IEEE Access 8:168793–168801. https://doi.org/10.1109/ACCESS.2020.3022957
Shehu A, Pinto A, Correia ME (2019) Privacy preservation and mandate representation in identity management systems. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), Coimbra, Portugal: 1–6. https://doi.org/10.23919/CISTI.2019.8760690.
Tanimoto S, Toriyama S, Iwashita M, Endo T, Chertchom P (2009) Secure operation of biometric authentication based on User’s viewpoint. 2019 IEEE International Conference on Big Data, Cloud Computing, Data Science & Engineering (BCD), Honolulu, HI, USA: 166–171. https://doi.org/10.1109/BCD.2019.8885177
Verzeletti GM, de Mello ER, Wangham M (2018a) A mobile identity management system to enhance the Brazilian electronic government. IEEE Latin Am Trans 16(11):2790–2797. https://doi.org/10.1109/TLA.2018.8795121
Verzeletti GM, de Mello ER, Wangham MS (2018b) A National Mobile Identity Management Strategy for Electronic Government Services. 2018 17th IEEE International Conference on Trust, Security and Privacy In Computing and Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA: 668–673. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00098
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
On behalf of all authors, the corresponding author states that there is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Subbarao, D., Raju, B., Anjum, F. et al. Microsoft Azure active directory for next level authentication to provide a seamless single sign-on experience. Appl Nanosci 13, 1655–1664 (2023). https://doi.org/10.1007/s13204-021-02021-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13204-021-02021-0