Azure AD Understanding Tokens

Поділитися
Вставка
  • Опубліковано 14 лип 2024
  • A quick whiteboard walking through how Azure AD uses tokens and how they impact your authentication to services.
  • Наука та технологія

КОМЕНТАРІ • 83

  • @OKBrooksy
    @OKBrooksy Рік тому +4

    A little over a year into my IT journey after coming from years of blue collar work, going for my AZ104 per my company requiring it, your videos are so helpful especially with how daunting all of this new info is but you break it down really well and explain it very practically. Thanks so much for all you do John. Cheers mate.

  • @mmiltenburg
    @mmiltenburg 4 роки тому +1

    Great video,
    I am explaining federation services for 12 years now, this is one of the best explanations I know.
    Will use it in my classes.
    Thank you!

  • @johnanonanon
    @johnanonanon Рік тому

    John. You are a legend! You continue to be an excellent trainer and font of MS knowledge. I remember starting out my IT journey over 20 years ago, and watching your material along the way has been priceless. Thank-you!

  • @NathanCarter
    @NathanCarter 6 років тому +5

    You explained this very well. helped me out a lot! keep up the good work.

  • @name-vi6fs
    @name-vi6fs 5 років тому

    Excellent video. Very straightforward, and easy to understand.

  • @007Joelsky
    @007Joelsky 3 роки тому

    The kind of explanation I was looking for! Clear and simple thank you!!

  • @tsmith77772
    @tsmith77772 2 роки тому

    I find your video series the most useful and informative on youtube in regards to Azure. Great job!

  • @davidfarrell1062
    @davidfarrell1062 4 роки тому

    Great video. Enough detail on all aspects to get my head around it all.

  • @2pb
    @2pb 5 років тому

    This is very well explained and enjoyable. Over the years I have gained familiarity with legendary names such as John Savill and Laura Hunter and their books must form a part of the library of any serious IT professional. Having this topic explained by one of the professionals in the field is just great - don'tcha just love UA-cam ?

  • @bryansaville2282
    @bryansaville2282 3 роки тому

    This is a brilliant presentation! Thanks John, it really helped!

    • @NTFAQGuy
      @NTFAQGuy  3 роки тому +1

      Thanks! Glad it was useful.

  • @BATMAN_1
    @BATMAN_1 4 роки тому +1

    Outstanding presentation, thank you.

  • @CapNJunkie
    @CapNJunkie 5 років тому +2

    Excellent explanation video. As with most things Microsoft the "suggested" method keeps changing. I've been looking into WHB and this just makes those decisions even more confusing. But hey, that's why I get paid the mediocre bucks!

  • @amjds1341
    @amjds1341 3 роки тому +1

    Honestly I always didn't like AD topics but after watching this video I have realized what I was missing and how interesting it is. Also it is very imp concept to understand while implementing Azure solutions in Enterprises

    • @NTFAQGuy
      @NTFAQGuy  3 роки тому

      That’s awesome to hear, it is cool how the parts all work together!

  • @ShaliniSingh-wf9ed
    @ShaliniSingh-wf9ed 2 роки тому

    Ur way is really The best way to explain these topics n make it all sound so easy. Thanks a ton 😊

  • @TimVerbist
    @TimVerbist 5 років тому +2

    Thanks for the great explanation!

  • @alessandrolanza9148
    @alessandrolanza9148 Рік тому

    Great video, very clear as always, Thanks!

  • @RDGTEX
    @RDGTEX Рік тому

    This was excellent. Thank you!

  • @Str1der1
    @Str1der1 3 роки тому +1

    Great explanation, you should keep doing more videos.

    • @NTFAQGuy
      @NTFAQGuy  3 роки тому

      Thanks. I post about 3 videos a week on my channel.

  • @TimGoodrich0528
    @TimGoodrich0528 6 років тому +2

    Good job explaining where to place policies on ADFS vs AAD. Also, those guns are gonna need a bigger shirt pretty soon! 💪🤣😉

    • @NTFAQGuy
      @NTFAQGuy  6 років тому +1

      lol. thanks. I think :-)

  • @yulaw3289
    @yulaw3289 2 місяці тому

    enjoying this video for today learning, thanks a lot!

  • @inetregsameer
    @inetregsameer 6 років тому +3

    Hi John,
    Nice video and awesome explanation. Really enjoying watching your videos in youtube and Pluralsight. Could you please consider making a video about Azure AD join.
    Regards.

  • @andryakaaad
    @andryakaaad 5 років тому +31

    an awesome explanation. how much do you bench?

  • @dinhomhm
    @dinhomhm 5 років тому

    I have seen you on Safari, taking your MCSE courses, thank you
    I am going to subscribe in your channel.

  • @guptalav
    @guptalav 4 роки тому +1

    Succinctly explained. Thank you.

  • @vladscheip6285
    @vladscheip6285 3 роки тому

    Excellent explanatory session.

  • @hanhgio
    @hanhgio 3 роки тому

    Very clear explanation thank you

  • @amjds1341
    @amjds1341 3 роки тому

    Best instructor

    • @NTFAQGuy
      @NTFAQGuy  3 роки тому

      That’s very kind, thank you!

  • @eddiejackson4227
    @eddiejackson4227 5 років тому +1

    Thanks!

  • @ashutoshnigam37
    @ashutoshnigam37 4 роки тому

    Awsome !!!

  •  4 роки тому

    Outstanding presentation. I have one question. When you talk about federated service, can I say Google and Facebook logins are federated services?

  • @James-sc1lz
    @James-sc1lz 4 роки тому

    Thanks John. Excellent video.
    The only thing I need to work out now is the point made at T:1120 and why when using password hash even if password was locked or expired it would still work. Surely that is a security risk?
    So our password policy rules do not apply on prem as AAD policy applies only?

  • @jaiveershringi
    @jaiveershringi 5 років тому

    Hey John, has the federated view changed in the current world?

  • @kitefriend
    @kitefriend 5 років тому +1

    great execution. what kind of whiteboard do you use?

  • @gauravsharma8220
    @gauravsharma8220 5 років тому +1

    Thanks

  • @ricklucas6216
    @ricklucas6216 3 роки тому +1

    If the device is rebooted or a user sign-out of their profile does the refresh token get removed? Will the initial auth need to take place again against the PTA or ADFS (if used)?

  • @owensben
    @owensben 3 роки тому +1

    Is there any chance you'd be looking to provide an update to this video to include Continuous Access Evaluation impact to token lifetime and the impacts?
    This video is great at painting the picture on AT and RT's. I've back to this video several times or referenced to customers or colleagues.

    • @NTFAQGuy
      @NTFAQGuy  3 роки тому +1

      I’ll do a separate cae video. I’ve talked about it a number of times in my weekly updates.

    • @owensben
      @owensben 3 роки тому

      @@NTFAQGuy thanks. Sure they'll be plenty looking to implement it once it's out of preview.

  • @user-sc7ry7id9o
    @user-sc7ry7id9o 2 роки тому

    @John, please see my questions below.
    1. What is a Primary Refresh Token (PRT) used for with SSO, the MS recommendation for Windows 10 and Windows Server 2016 or newer? Is a PRT just the first RT you receive in the authn process?
    2. What is the first token named that a federated identity provider gives you, before AAD gives you the AT and RT?

    • @NTFAQGuy
      @NTFAQGuy  2 роки тому +1

      Prt is special token on brokers for sso across apps. Not sure what you mean for 2nd, you mean saml maybe? There are lots of docs about this stuff, just search on ms. Good luck

    • @user-sc7ry7id9o
      @user-sc7ry7id9o 2 роки тому

      Overall, I was wondering if PRT and RT were the same thing. It sounds like PRT is ‘only’ a recommendation and only for making the SSO process more guaranteed? And, a RT is only if your AT expires after 60 minutes when trying to access a service?
      - In the video, I see you went from listing a “T” to a RT in the federated example. I was thinking that meant the “T” could be something different than an RT?

  • @brusslee1814
    @brusslee1814 Рік тому

    14:40 the federation server becomes a single point of failure when using federated authentication? if that on-premise server is down users won't be able to authenticate to anything?

  • @sharatbhaskar527
    @sharatbhaskar527 4 роки тому +1

    Hi John, please help me understand this. I have understood your token authentication concept. But when i go through the MS pages the authentication method is different from the token one, here is a link docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-pta-how-it-works. Please help me understand is token authentication different from Pass through/federation one etc?

    • @NTFAQGuy
      @NTFAQGuy  4 роки тому

      Federation just adds a step in the initial authentication but after you have the SAML from federation you then get the refresh token from AAD and it is then used for the access tokens used by services that trust AAD.

  • @1768ify
    @1768ify 4 роки тому

    Hi John, I'm confused about one point. In your first cloud transaction flow, the initial client request to exchange goes directly to the exchange server. However in your first client request to SharePoint, the request does not go to SharePoint. How does this happen? How does the browser "know" to send the refresh token to Azure? I am assuming that the user is requesting a SharePoint URL in the browser. Is this incorrect?

    • @NTFAQGuy
      @NTFAQGuy  4 роки тому

      The refresh token is issued by AAD and so its the target for the tokens.

    • @1768ify
      @1768ify 4 роки тому

      I'm not following. I understand that AAD issues the tokens. How does the user request access to SharePoint? How is the token involved before the browser connects to SharePoint? Are you simply short-cutting the initial connection to the SharePoint host in your diagram? Wouldn't a re-direct from the SharePoint server to the AAD server be necessary?

    • @NTFAQGuy
      @NTFAQGuy  4 роки тому

      right, sharepoint will ask for its token and redirect to AAD. I just sped up the flow :-)

    • @1768ify
      @1768ify 4 роки тому

      Got it! Thank you.

  • @hurrdurr4828
    @hurrdurr4828 2 роки тому

    Great video as always, even if it is an old one from you. But isnt the reality that refresh tokens and access tokens are for authorization and not authentication? Rather Azure AD uses OpenID Connect for authentication (ID token) and for authorization OAuth 2.0 is used (refresh and access token)?

    • @NTFAQGuy
      @NTFAQGuy  2 роки тому +1

      Yes Authz primarily

  • @9937595912
    @9937595912 4 роки тому

    i can easily add/register the app in azure AD for SAML based SSO... ADFS seems irrelevant...

  • @najimabdelwahad4579
    @najimabdelwahad4579 4 роки тому

    thx +++

  • @MYuen
    @MYuen 5 років тому

    Thank you, John, for the explanation of how Access and Refresh tokens work in relation to Cloud and ADFS-based architectures! It was really helpful while I am trying to understand the various Token properties (listed here: docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-configurable-token-lifetimes) to troubleshoot an issue.
    By the way, what happens to Access Token 1 after you've received AT2 from SharePoint? Does AT1 become invalid or does it continue getting a new one issued by Exchange with the updated Refresh Token received from SharePoint? Or... does trying to access Exchange again issue AT3 and invalidate AT1 and AT2 after the default 1 hour lifetime?

    • @NTFAQGuy
      @NTFAQGuy  5 років тому +1

      Access tokens remain valid for their lifetime and are app specific. The refresh token slides its window each time its used as an updated one is sent back.

    • @MYuen
      @MYuen 5 років тому

      @@NTFAQGuy Ah, so each time a New Refresh Token is issued, the same (renewed) RT is used to keep each AT (AT1/AT2) valid? Makes sense. Thank you!

  • @klausdim
    @klausdim 4 роки тому

    It is my understanding that PHS results in "almost SSO" in that it is necessary to re-authenticate when going to a new application, albeit with the same password. PTA, on the other hand, results in seamless SSO in which the new application comes up immediately without this re-authentication set. In the description of the token flow, I did not see why this would be the case. Nor did you mention this difference. Is my understanding of the "almost SSO" limitation of PHS incorrect?

    • @NTFAQGuy
      @NTFAQGuy  4 роки тому

      You can achieve seamless sign on with both PTA and PHS by enabling the seamless sign-on capability. The experience is the same as SSO with federation. If the client has line of sight to a DC they seamlessly connect.

    • @klausdim
      @klausdim 4 роки тому

      Thank you for the quick reply. I have PHS implemented, but I get a login screen even when I log into another Micosoft Cloud app. For example, I might be logged into office.com, but when I bring up Dynamics I get another login screen. When I bring up SalesForce, I get another. Is there an obvious configuration error that has been made?

    • @NTFAQGuy
      @NTFAQGuy  4 роки тому

      Seamless sign on is an additional step after PHS. Search on the Microsoft docs for seamless sign on and it will guide you through the additional settings on the clients.

  • @amlardhi
    @amlardhi 4 роки тому

    But, There are disadvantage of using PHS (Password hash synchronization) which exporting your identities password to the cloud and most organisation will not permit based on regulator instructions. PTA (Pass-thru Authentication) used for Azure Cloud Service but cant be used with other Services Provider. I see ADFS is the best Option in regards of security, usability and compatibility

    • @NTFAQGuy
      @NTFAQGuy  4 роки тому +1

      Well you are not exporting the password. its a hash of a hash that can't be reversed. In my experience many organizations ARE sending the hash of the hash as the benefits such as breach replay protection outweigh any perceived risk of hash of hash. Risk vs reward :-) ADFS has its own challenges maintaining, having internet facing, keeping updating and available or can't authenticate etc. Ultimately companies choice but most are moving away from federation. With cloud auth there is native protection from various types of attack just built in you don't get with ADFS on its own.

  • @vishaltekwani2281
    @vishaltekwani2281 5 років тому +1

    John SAML

  • @lenardbartha6722
    @lenardbartha6722 Рік тому

    Bring back the Surface Hub for new videos pleaseeeeeeeeeeee!

    • @NTFAQGuy
      @NTFAQGuy  Рік тому

      zero clue why you would care about the hardware I whiteboard on.

    • @lenardbartha6722
      @lenardbartha6722 Рік тому

      @@NTFAQGuyI love hardware, the Surface Hub looks more expensive and higher tech than dell or hp products, had one as well in the office, great product to look at...honestly good job at the videos they are great!

  • @RohitNaik
    @RohitNaik 4 роки тому

    JohnnY Sins?