Author Archives: anuj - Page 4
One Time Passwords
What are OTPs? OTPs (alphanumeric strings) authenticate a user for a single transaction or session. OTPs may replace authentication login information or may be used in addition to it, to…
SCIM based provisioning of users versus Graph API
Say you had a SaaS product configured as an enterprise App in AAD and wanted to automate the addition / decommissioning of users for that app. There's a few paths…
Microsoft Identity Manager – MIM
MIM can be thought of as the precursor to AAD Enterprise Applications. It enables on premises AD Admins to provide users access to Active Directory and on-premises business applications. By…
Adding an Internal App to MyApps (to AAD) using App Proxy
One is accustomed to going to MyApps to see all their SaaS apps configured. However, even non-SaaS apps, including internal web apps and APIs can be hosted on MyApps. This…
Why move from ADFS to AAD?
Here are some of the reasons you should consider moving away from ADFS to AAD Certificate Management No Planned Downtime as in ADFS changes / updates. AAD Conditional Access -…
More on AAD Guest Users
(Also read AAD B2B External Users and Apps Visible in MyApps) Per Microsoft's Documentation Member: This value indicates an employee of the host organization and a user in the organization's…
Invitation Flows for AAD B2B Users
Invitation flows b2b users AAD B2B users have to be invited. Either via an email invitation or a direct URL link. There are also backdoor mechanisms (powershell and graph API)…
App Visibile in MyApps versus Access to apps
There is a common misconception around AAD apps. If you can see it in myapps, you have access to it - otherwise you do not. This is not entirely true.…
AAD External users (vendors etc) and Office 365 Access
Guest Users (aka B2B Users) These are users that are added as 'Guest' users in your AAD tenant. Some external users ( vendors ) are truly B2B users. For example,…
Query AAD for all members of a group
To query AAD for all members of a group (note that the -All flag does not retrieve all users - try the -Top option instead) Get-AzureADGroupMember -ObjectId "my_obect_id" -Top 200000…