Friday, April 18, 2014

How to enable Azure Multi-Factor Authentication for a specific tenant ID?

What is that for and what is the need ?

Philippe Guedez and I had the need to highly secure the access of a Web application that was developed on Microsoft Azure. To do so, we have used the Azure Multi-Factor Authentication (MFA) as part of the AAD (Azure Active Directory).

Not only the login page is going to ask you your login/password as usual, it is going to send you a text message on your mobile phone with an additional code. You could also configure MFA to use other secure ways to authenticate.

If you have an application, with a tenant id of say, 1477db05-0f2c-8924-904b-c87e8f0e928f, you’ll access to your configuration page by the following actions, which leads you to the URL (for example): https://account.activedirectory.windowsazure.com/usermanagement/multifactorverification.aspx?tenantid=1477db05-0f2c-8924-904b-c87e8f0e928f&culture=en-US

MFA will enforce compliancy to rules and regulations that requires high auditing standards, such as NIST 800-63 level 3, HIPAA, PCI DSS.

The various steps:
STEP 1 : ACTIVATING MFA
STEP 2 : ADD NEW MFA USER AND PASSWORD
STEP 3 : LETS CONFIGURE THE ACCOUNT AS A NEW USER RECEIVING THE EMAIL
STEP 4 : LET’S use the multi-factor authentication that is going to send me a text message

APPENDIX 1 : Windows Azure MFA Admin portal (formally PhoneFactor)

APPENDIX 2 : ALTERNATIVES: OLD FASHION RSA-SecurID way

You could activate MFA for Azure or for Office 365: http://blogs.technet.com/b/ad/archive/2014/02/11/mfa-for-office-365-and-mfa-for-azure.aspx

=====================

  STEP 1 : ACTIVATING MFA

clip_image002

You could exclude the constraints of MFA when the user is within the company given an IP range (it is in preview) :

image

The various roles that you could filter by:

image

To enable MFA:

clip_image006

clip_image008

clip_image010

 

  STEP 2 : ADD NEW MFA USER AND PASSWORD

You could add new users by activating the “Enable Multi-Factor Authentication” option.

image

image

image

Provide an email so that the end user could receive this temporary password, for first login.

image

 

STEP 3 : LETS CONFIGURE THE ACCOUNT AS A NEW USER RECEIVING THE EMAIL

Enter the new account (use your temporary password):

image

Then, you’ll be forced to choose a proper and strong password

image 

image image

Set-up the MFA that will use, for instance Mobile phones:

image

If you really don’t know what to do, you have a video to help you: http://channel9.msdn.com/posts/Multi-Factor-Account-Setup

image

image

image

Instantaneously, you will receive a text message “your Microsoft sign in verification code is above. Type this code into your application to continue.” with your code.

image

If you wait too long like me, when writing this blog! you’ll get this error message and ask you to resend a text message Clignement d'œil

imageimage

So let me start all over again ! and here are the next steps:

image

image

Assume you want to generate for many apps: “Generate app password”

app1: image other apps: image

 

 

  STEP 4 : LET’S use the multi-factor authentication that is going to send me a text message:

Add your new AAD user as a co-administrator (see potential error messages)

image

log-out, and sign in with this new co-administrator, with the temporary password previously generated.

image

Enter the code sent to your mobile phone… then tada ! you start to log into your application with your new MFA !

image

THAT’S ALL ! Now you can clean up all Microsoft Account (LiveID) so that ONLY people managed in AAD (with all advantages) could connect your Azure developer Portal.

image

============== T H E  E N D  ==============

 

============== A P P E N D I  C E S  ==============

More information here: http://technet.microsoft.com/library/en-us/dn249471

APPENDIX1 : Windows Azure MFA portal (formally PhoneFactor)

image

Where you could administer and configure the MFA. For instance here you could see a report that can be downloaded.or download the SDK corresponding to your programming language.

image imageimage

ALTERNATIVES: OLD FASHION RSA-SecurID way

MFA supports token sent to your mobile phone. You could also use alternatively the "old fashion" way, if you want to secure via VPN and securID,

image image image

you could set-up a Azure VM protected by VPN, where have stored the login/password of your Web Application in the browser, or better in a secured safe.

 

Note : you could change the Global administrator of your Microsoft Azure

image

 

============== S O M E   E R R O R   M E S S A G E S  ==============

Setting up AAD-MFA for Azure Administrators is relatively straight forward Joy of some errors:

https://activedirectory.windowsazure.com/Interrupts/SignInAccessDenied.aspx

image

 

image

image

image

 

Some links on a given user may result in this:

image

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.