{"id":46255,"date":"2020-05-24T09:00:00","date_gmt":"2020-05-24T15:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=46255"},"modified":"2024-11-05T18:12:38","modified_gmt":"2024-11-05T23:12:38","slug":"aad-authentication-protocols","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols","title":{"rendered":"Azure AD Authentication Protocols"},"content":{"rendered":"\n

Azure\u00ae<\/sup> Active Directory\u00ae <\/sup>(Azure AD or AAD) has been a popular identity management tool used among IT admins since its introduction. As a useful resource for bridging Azure credentials to select pre-integrated applications, Azure AD\u2019s authentication protocols provide value for IT admins looking to allow their Azure users to employ single sign-on (SSO) for a number of applications.<\/p>\n\n\n\n

Below, we\u2019ll discuss Azure AD\u2019s native authentication capabilities, as well as options for admins looking to connect AAD users to additional resources.<\/p>\n\n\n\n

\n
\n \"JumpCloud\"\n <\/div>\n
\n

\n Breaking Up with Active Directory <\/p>\n

\n Don\u2019t let your directory hold you back. Learn why it\u2019s time to break up with AD. <\/p>\n <\/div>\n

\n Read Now<\/a>\n <\/div>\n<\/div>\n\n\n\n\n

Using Azure AD For Authentication<\/h2>\n\n\n\n

Authentication is the process of making sure users are who they say they are, which is vital for protecting sensitive information contained within IT resources. <\/p>\n\n\n\n

Natively, AAD authenticates Azure user credentials to Windows\u00ae<\/sup> 10 Pro devices and select web apps via SAML 2.0, OpenID Connect, OAuth 2.0, and WS-Federation. IT teams seeking a tool for connecting Azure users to applications like Office 365\u2122 may find great value in Azure AD\u2019s native capabilities. However, cloud-forward organizations looking to implement a single cloud IdP for connecting users to their systems, networks, applications, and files may require additional solutions.<\/p>\n\n\n\n

Authenticating to All IT Infrastructure<\/h2>\n\n\n\n

Azure Active Directory was originally designed as a complementary service to on-prem Active Directory. As such, for admins wanting to use Azure AD as a cloud-based directory service, AAD may lack key features.<\/p>\n\n\n\n

Though it is a useful solution for integrating Azure credentials with certain apps, AAD\u2019s list of available authentication protocols often leave IT teams searching for other solutions for authenticating their infrastructure. Azure AD struggles to intrinsically authenticate users to systems beyond Windows 10 Pro. These include other Windows systems, macOS\u00ae<\/sup> machines, and Linux\u00ae<\/sup> servers hosted in AWS\u00ae<\/sup>.<\/p>\n\n\n\n

In addition, IT admins who want to use Azure AD for network authentication will have to implement and configure their own FreeRADIUS server (or RADIUS compatible solution) that syncs with Azure AD. This is usually done via a managed LDAP<\/a> domain in Azure AD Domain Services (Azure AD DS). <\/p>\n\n\n\n

Azure AD also requires additional support for authentication to legacy applications via LDAP. To achieve LDAP connectivity, IT teams can enable an Azure AD DS instance (note, this is a separate solution that requires additional costs) with configured network security groups through Azure Networking. However, since this LDAP traffic isn\u2019t encrypted by default admins must manually configure these ports. The lack of automation can leave organizations open to human error, making them vulnerable to cyberthreats such as brute force attacks.<\/p>\n\n\n\n

Overall, IT teams can manually configure and implement additional solutions to make Azure AD work as a core identity provider, but this process can be intensive on an admin\u2019s time and budget. For organizations seeking a cloud-hosted solution that natively authenticates to heterogeneous systems, cloud and on-prem applications, wired and WiFi networks, and file servers, there may be a solution beyond Azure AD.<\/p>\n\n\n\n

JumpCloud Directory-as-a-Service<\/h3>\n\n\n\n

JumpCloud\u00ae<\/sup> Directory-as-a-Service\u00ae<\/sup> is the first directory service that authenticates users to nearly all their resources via entirely cloud-based SAML 2.0, LDAP, and RADIUS. By using the DaaS portal, IT admins can use built-in tools like PowerShell<\/a> to enact automated user provisioning and deprovisioning, ensuring that directory services in the cloud are scalable and secured.
<\/p>\n\n\n\n

And, through Office365 Integration<\/a>, organizations can keep Azure AD as an authentication resource and integrate it with JumpCloud, effectively providing organizations with an entirely cloud-based identity and access management suite.\u00a0
Interested in learning more? Try a
personalized demo or guided simulation<\/a> to see JumpCloud in action.<\/p>\n","protected":false},"excerpt":{"rendered":"

IT teams interested in utilizing Azure AD may need to know what protocols it natively supports for connecting users to their resources.<\/p>\n","protected":false},"author":88,"featured_media":46257,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[2781],"tags":[],"collection":[2777],"platform":[],"funnel_stage":[3015],"coauthors":[2530],"acf":[],"yoast_head":"\nAzure AD Authentication Protocols - JumpCloud<\/title>\n<meta name=\"description\" content=\"IT teams interested in utilizing Azure AD may need to know what protocols it natively supports for connecting users to their resources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Azure AD Authentication Protocols\" \/>\n<meta property=\"og:description\" content=\"IT teams interested in utilizing Azure AD may need to know what protocols it natively supports for connecting users to their resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-24T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-05T23:12:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/aad-auth.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Coco-Stotts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Coco-Stotts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols\"},\"author\":{\"name\":\"Kayla Coco-Stotts\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/56652882e0c7f57c3fa87bf90fe846e9\"},\"headline\":\"Azure AD Authentication Protocols\",\"datePublished\":\"2020-05-24T15:00:00+00:00\",\"dateModified\":\"2024-11-05T23:12:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols\"},\"wordCount\":586,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/aad-auth.jpeg\",\"articleSection\":[\"How-To\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols\",\"url\":\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols\",\"name\":\"Azure AD Authentication Protocols - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/aad-auth.jpeg\",\"datePublished\":\"2020-05-24T15:00:00+00:00\",\"dateModified\":\"2024-11-05T23:12:38+00:00\",\"description\":\"IT teams interested in utilizing Azure AD may need to know what protocols it natively supports for connecting users to their resources.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/aad-auth.jpeg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/aad-auth.jpeg\",\"width\":780,\"height\":520},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure AD Authentication Protocols\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/56652882e0c7f57c3fa87bf90fe846e9\",\"name\":\"Kayla Coco-Stotts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/24b6b3616a82f11f1831e6ddabb00e1d\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/98fcc95270f30eaf65a1f1f55b72f3f8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/98fcc95270f30eaf65a1f1f55b72f3f8?s=96&d=mm&r=g\",\"caption\":\"Kayla Coco-Stotts\"},\"description\":\"Kayla is a content writer at JumpCloud with a B.A. in Print Journalism from the University of Kentucky. She hails from St. Louis, Missouri, and loves to eat good food and hike Boulder's beautiful trails when she is not writing.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Azure AD Authentication Protocols - JumpCloud","description":"IT teams interested in utilizing Azure AD may need to know what protocols it natively supports for connecting users to their resources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols","og_locale":"en_US","og_type":"article","og_title":"Azure AD Authentication Protocols","og_description":"IT teams interested in utilizing Azure AD may need to know what protocols it natively supports for connecting users to their resources.","og_url":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols","og_site_name":"JumpCloud","article_published_time":"2020-05-24T15:00:00+00:00","article_modified_time":"2024-11-05T23:12:38+00:00","og_image":[{"width":780,"height":520,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/aad-auth.jpeg","type":"image\/jpeg"}],"author":"Kayla Coco-Stotts","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kayla Coco-Stotts","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols"},"author":{"name":"Kayla Coco-Stotts","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/56652882e0c7f57c3fa87bf90fe846e9"},"headline":"Azure AD Authentication Protocols","datePublished":"2020-05-24T15:00:00+00:00","dateModified":"2024-11-05T23:12:38+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols"},"wordCount":586,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/aad-auth.jpeg","articleSection":["How-To"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols","url":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols","name":"Azure AD Authentication Protocols - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/aad-auth.jpeg","datePublished":"2020-05-24T15:00:00+00:00","dateModified":"2024-11-05T23:12:38+00:00","description":"IT teams interested in utilizing Azure AD may need to know what protocols it natively supports for connecting users to their resources.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/aad-auth.jpeg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/aad-auth.jpeg","width":780,"height":520},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/aad-authentication-protocols#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Azure AD Authentication Protocols"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/56652882e0c7f57c3fa87bf90fe846e9","name":"Kayla Coco-Stotts","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/24b6b3616a82f11f1831e6ddabb00e1d","url":"https:\/\/secure.gravatar.com\/avatar\/98fcc95270f30eaf65a1f1f55b72f3f8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98fcc95270f30eaf65a1f1f55b72f3f8?s=96&d=mm&r=g","caption":"Kayla Coco-Stotts"},"description":"Kayla is a content writer at JumpCloud with a B.A. in Print Journalism from the University of Kentucky. She hails from St. Louis, Missouri, and loves to eat good food and hike Boulder's beautiful trails when she is not writing."}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/46255"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/88"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=46255"}],"version-history":[{"count":2,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/46255\/revisions"}],"predecessor-version":[{"id":117161,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/46255\/revisions\/117161"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/46257"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=46255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=46255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=46255"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=46255"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=46255"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=46255"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=46255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}