This website uses cookies to ensure you get the best experience on our website. Learn more
User management and authentication for O365: Microsoft or 3rd party?
Office 365 (O365) adoption is continuing across organizations, now with more than 100 million active users. These organizations will reap the benefits of a cloud service – freed up internal resources, and easy access to updates with minimal maintenance – but, they can’t ignore the inevitable complications of hybrid identities. Whether using the cloud, synchronized, or federated identity model, many find themselves in the middle of a hybrid identity game.
Creating an O365 account automatically creates a tenant in Azure AD, and introduces new authentication and user management processes for IT departments. Before embarking on the journey, they’ll need to answer:
- Where is it best to manage users (cloud or on-premises)?
- How should users authenticate to O365?
If your organization is regulated, you may not have much choice. You will need to integrate your on-premises directory to extend password policies, and other controls. You will also need to decide whether you’ll use Microsoft Azure AD Connect, or a 3rd party offering. Many organizations, regulated or not, connect their on-premises user directory (for the majority, this is Active Directory) with O365. This allows them to benefit from existing user management processes. Active Directory integration not only extends on premises security controls, but also eliminates redundancies in user management. However, it’s not without its own challenges.
Going hybrid using free Microsoft offerings, comes with complexity, added administration time, and the likelihood of end-user disruption. This post will discuss challenges associated with Azure AD Connect, to help you make an informed decision when choosing between Microsoft, and 3rd party offerings.
How do you want to create, and manage users?
First things first! Whether going cloud or hybrid, you’ll need to decide how and where you want to manage users. There are benefits and drawbacks to both, but if you want to extend on-premises controls to O365, you’ll need to connect to Active Directory. Remember that how you decide to manage users will affect authentication options. This will be detailed in the authentication section of the post.
Depending on your environment, and deployment goals, you will have to decide what makes the most sense for your organization. Industry analyst firms, such as Gartner, recommend integrating existing on-premises directories for truly integrated user management. The current state of your Active Directory environment will drive this decision as connecting to O365 requires preliminary work to ensure smooth migration. Microsoft offers some guidance, and a free tool (IdFix) to help. Unfortunately, it’s not all encompassing, and will require scripting to pin point errors outside of the tool’s scope.
To further guide your decision, the following table summarizes some of your options, as well as any considerations.
User Management | Outcome | Consideration |
---|---|---|
Cloud – O365 directly | Users are managed in O365. Accounts will need to be created, and maintained separately. | Depending on how many users need to be added, this can be time consuming. Since user management will be separate from the existing process, account deletions and updates will be manual. This can lead to orphaned accounts and errors related to permissions. |
Synchronized – Azure AD Connect Sync Services | Active Directory users and groups are synchronized to O365. | Requires high availability, extra servers on-premises, and scheduled sync cycles, as synchronization of Active Directory updates are not reflected automatically. Furthermore, license assignment can be a manual and time consuming process. |
Synchronized – 3rd party tool like Specops Authentication for O365 | Users are automatically created in O365. Updates are captured in real-time using Group Policy settings. | No sync cycles or additional server required. All sensitive information stays in Active Directory. A light agent is installed in Active Directory to obtain user and group membership information. When a user logs in to O365, their account is created and the appropriate license is assigned. |
Synchronized – 3rd party tool like Okta | Users are automatically created in O365. Updates in captured in real-time using Group Policy setting. | Same as above, however to provision users to O365, Active Directory user and group data gets duplicated to Okta’s cloud directory, from there the data is synced to O365. |
How do you want users to authenticate to O365?
How users are provisioned and managed will drive your authentication options. Because O365 is a valuable target for hackers, securing authentication by strengthening passwords, in combination with multi-factor authentication (MFA), is best practice.
Microsoft provides MFA for O365, both free and paid, via an Azure AD premium subscription. However, depending on your deployment mode there are a few key differences. Consider the following questions:
- Do you want to remove the use of passwords?
- Do you want to enable federated single sign-on (SSO)?
- Do you want to extend existing 3rd party MFA to O365?
- Do you want to rely only on phone-based factors?
The following table outlines Microsoft and 3rd party authentication options.
User Management | Sign in options | MFA | Considerations |
---|---|---|---|
Cloud – Office 365 directly | O365 Password | 0365 MFA or Azure AD MFA | - The O365 password is at play and IT loses control over policy complexity settings - The O365 password is used as the first authentication factor - MFA options are all phone-based with no support for 3rd party MFA |
Synchronized – Azure AD Connect Sync Services | Synchronized AD password | O365 MFA or Azure AD MFA | - AD password is stored in the cloud - The AD password is used as the first authentication factor - MFA options are all phone-based with no support for 3rd party MFA |
AD password relay via PassThrough | O365 MFA or Azure AD MFA | - AD password not stored in the cloud as delegated SSO is enabled - The AD password is used as the first authentication factor - MFA options are all phone-based with no support for 3rd party MFA |
|
Federated AD password via Active Directory Federation Services ADFS | MFA Server | - AD password is not stored in the cloud as federated SSO is enabled - Additional on-premises servers and complex configuration is required - The AD password is used as the first authentication factor - 3rd party identity providers are supported |
|
Synchronized – 3rd party tool like Specops Authentication for O365 | Federated AD password | Specops Dynamic MFA | - AD password and other sensitive information is stored in AD - Does not require additional servers - OOTB support for 3rd party identity providers - MFA does not require the AD password as the first authentication factor |
Synchronized – 3rd party tool like Okta | Federated AD password | Okta MFA | - Same as above except that MFA does not remove password as first factor |
The reality…
The adoption of O365 creates user management and authentication challenges, regardless of the deployment model. Many organizations prefer hybrid deployments that integrate O365 with Active Directory. However, as we’ve shown here, doing so with Microsoft provided tools has its drawbacks. If you want a hybrid O365 deployment, minus the extra administration time, and security compromise, consider evaluating a 3rd party provider.
(Last updated on October 8, 2024)
Related Articles
-
Why choose 3rd party MFA for O365?
The adoption of SaaS services requires organizations to house user data in the cloud. Without the right strategy in place, this can mean user management and authentication processes – outside the confines of IT. Take the move to O365, and its creation of a tenant in Azure AD. Maintaining it alongside the on-premises Active Directory…
Read More -
Press Release: Specops Software launches Multi-Factor Authentication for Office 365
Stockholm, Sweden – December 18, 2017. Specops Software announced today the launch of Specops Authentication for Office 365. This new software helps companies transition to Office 365 (O365) while keeping user data in their on premise Active Directory to take advantage of existing user management and authentication controls. Robust, dynamic multi-factor authentication (MFA) ensures users…
Read More -
Copying data from one attribute to another attribute in Active Directory
We often have customers that want to allow their users to use their mobile device as an identity service for our self-service solutions. By default, we use the ‘mobile’ attribute in AD as it automatically enrolls a user into the service if their mobile number exists in AD. Usually the attribute is pre-populated with company…
Read More