03 - Azure Active Directory Retail Deployment Guide - Security
03 - Azure Active Directory Retail Deployment Guide - Security
03 - Azure Active Directory Retail Deployment Guide - Security
AD
Microsoft Azure™ Active Directory Deployment Guide
for Retail Industry Customers
Abstract
As a follow-on to configuring identities at scale, and enabling productivity, this guide helps you enable a holistic security
posture for information and kiosk workers.
Intended Audience
Identity Architects, Deployment Advisors, and System Integrators
Microsoft Corporation
Securing Your Identities with Azure AD
The information contained in this document represents the current view of Microsoft Corporation on the
issues discussed as of the date of publication. Because Microsoft must respond to changing market
conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft
cannot guarantee the accuracy of any information presented after the date of publication.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights
under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property
rights covering subject matter in this document. Except as expressly provided in any written license
agreement from Microsoft, the furnishing of this document does not give you any license to these
patents, trademarks, copyrights, or other intellectual property.
The descriptions of other companies’ products in this document, if any, are provided only as a
convenience to you. Any such references should not be considered an endorsement or support by
Microsoft. Microsoft cannot guarantee their accuracy, and the products may change over time. Also, the
descriptions are intended as brief highlights to aid understanding, rather than as thorough coverage. For
authoritative descriptions of these products, please consult their respective manufacturers.
© 2016 Microsoft Corporation. All rights reserved. Any use or distribution of these materials without
express authorization of Microsoft Corp. is strictly prohibited.
Microsoft and Windows are either registered trademarks of Microsoft Corporation in the United States
and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
Table of Contents
Overview ................................................................................................................................... 4
Prerequisites ............................................................................................................................. 8
Conclusion .............................................................................................................................. 23
Reference ................................................................................................................................ 24
Overview
Azure Active Directory (AD) Premium is a cloud-based identity and access management (IAM) system. The
Managing Identity Lifecycles at Scale guide addresses the onboarding and off-boarding processes for
workers in your organization. The Increasing Productivity with Azure AD guide addresses how to manage
applications and provide self service capabilities to those workers. The third deployment guide in this
series dedicated to customers in the Retail Industry focuses on security.
▪ Conditional Access allows you to configure access policies based on different criteria such as location,
device state and risk level.
▪ Administrative Roles allow you to perform administrative tasks with the minimum level of privileges
necessary, granted on demand and for a limited amount of time.
▪ Security Reporting gives you visibility into activity such as sign ins-and auditing.
Key Concepts
Multi-Factor Authentication (MFA)
The use of more than one verification method, which adds a layer of security to user sign-ins and
transactions. MFA works by requiring two or more of the following verification methods:
Privileged Identities
User accounts that have one or more administrative roles to manage, control, and monitor access to
resources in Azure AD as well as other Microsoft online services.
Just-Enough-Access (JEA)
Granting the minimum level of permissions required to accomplish a set of administrative tasks.
Conditional Access
Creating policies that grant access to resources based on the context of a request such as network
location (inside or outside the corporate network), device used (compliant or known), or risk level.
Machine Learning
A technique of data science that helps computers learn from existing data in order to forecast future
behaviors, outcomes, and trends. Azure AD uses machine learning techniques to assess risk events.
Learn More: What is Machine Learning? and Azure Active Directory Identity Protection
Risk Event
Logins flagged as suspicious by Azure AD Identity Protection, indicating that an identity might have been
compromised.
Learn More: Assign administrator roles in Azure Active Directory, Office 365, Azure AD Administrative
Units
Prerequisites
Review the following process for configuring prerequisites:
▪ MFA in the cloud: Suitable for Azure AD-protected resources such as Office 365, SaaS applications,
and internal applications published with Azure AD Application Proxy. Azure MFA in the cloud can also
be used with Windows Server 2016 for any claims-based applications that trust AD FS on-premises.
▪ MFA Server: Best for scenarios that span beyond Azure AD, such as VPN, Legacy LDAP applications, or
stand-alone usage through the SDK.
We recommend using MFA in the cloud unless it does not support the desired scenarios. When examining
on-premises resources, consider the decision from the broader toolset perspective to determine whether
a cloud-based solution will meet your requirements. A few examples:
▪ An on-premises IIS server can be published via Azure AD application proxy and use MFA in the cloud.
▪ An AD FS application can be moved to Azure AD for SSO and use MFA in the cloud.
As a cloud service, Azure AD is constantly evolving and incorporating new functionality. As a result, the
gap between the cloud-based MFA and on-premises MFA Server will reduce over time.
Software on mobile devices (smartphone or wearable) use cryptographic algorithms to prove identity.
Advantages Tradeoffs
▪ Mobile applications can leverage computing power in the ▪ Dependency on availability of the device (battery, data
device to enable additional techniques, including Time- plan, Wi-Fi, etc.)
based One-time Password (TOTP), HMAC-based One-time ▪ Higher learning curve for users who are not tech savvy.
Password (HOTP), etc. ▪ More overhead in the onboarding process, since the
▪ More flexible authentication experiences. mobile device needs to be configured for use as a second
▪ Software can be updated on a regular basis, which enables factor.
future innovation, patching, leveraging of security ▪ Depending on the authentication method used, end-users
capabilities in the mobile platform (e.g., fingerprint may incur data costs when using their device to
readers), etc. authenticate.
▪ Users don’t need to carry another device beyond their
smartphone.
Hardware Tokens
A dedicated hardware token (Smart Card, USB dongle, or key fob) serves as a second factor.
Advantages Tradeoffs
▪ If your enterprise already uses hardware tokens, Azure AD ▪ Overhead of procuring and tracking hardware tokens.
can be integrated with these existing investments. ▪ Unlike phones, users only carry hardware tokens to
▪ Can work in harsher environments than a smartphone can. perform authentications, and are therefore more likely
▪ Less dependency on availability of network, battery, Wi-Fi, forget or lose the device.
etc. ▪ Hardware tokens are not easy to update, putting limits on
the ability to update or upgrade their crypto algorithms.
▪ As of August 2016, using hardware tokens requires
deploying on-premises components.
Learn more: Getting started with the Azure Multi-Factor Authentication Server
Advantages Tradeoffs
▪ Low friction onboarding of users. The vast majority of users ▪ Phone and SMS systems have limitations, such as phone
have a mobile phone for receiving calls and text messages. reception and signal strength, the handling of tone dials by
▪ Turnkey authentication experience. Users can quickly the local PBX and phone network, interference on the line,
acknowledge the phone call or text message. background noise on the call, and more.
▪ Users are less likely to forget a phone and will take better ▪ Mobile phones are dependent on battery level, reception
care of it. Since mobile phones often contain personal level, etc.
information, users often take measures very quickly (report ▪ If the company does not provide a phone, then users need
to authorities, remote wipe, etc.) when they lose them. to disclose their personal phone number to the employer.
▪ Depending on the authentication method used, end-users
may incur costs when using their device (data, phone call,
SMS).
▪ Relies on the phone’s network infrastructure, which was
not designed for security. Thus, it is vulnerable to man-in-
the middle, fraud, phishing attacks, SIM cloning, etc.
Windows Hello
Windows Hello provides a secure way to authenticate to Windows 10 devices with biometric gestures or a
PIN. When Windows 10 devices are deployed with Azure AD Join, Azure AD can accept Windows Hello
logins as a second factor.
Advantages Tradeoffs
▪ A login with Windows Hello can be both secure and ▪ Only works on Windows 10 devices.
turnkey for end-user authentication: By signing into the ▪ Challenging to provision a large number of users onto
device, users can seamlessly and securely access Azure AD- shared devices.
protected resources.
Learn more: What is Windows Hello?, Extending cloud capabilities to Windows 10 devices through Azure
Active Directory Join
If your enterprise has already invested in a third-party solution for MFA (e.g., RSA SecurID, Vasco, etc.), it is
possible to integrate it with Azure AD on federated domains.
Advantages Tradeoffs
▪ Preserves existing investments ▪ Requires on-premises infrastructure (an identity provider
such as AD FS, and the MFA provider)
▪ Azure MFA can reuse an office phone number as “pre-filled” information. However, users must go
through the process to complete their enrollment fully.
▪ Azure AD Identity Protection provides Cloud MFA registration as a policy, which can be scoped,
enabled, and tracked within the Azure management portal.
Advantages Tradeoffs
▪ Simple to deploy. ▪ Lack of flexibility, since it applies to all applications.
▪ Simple to communicate to users. ▪ High friction for end-users.
▪ Consistent behavior across all applications.
Recommendation
▪ Use this option if the long term security posture is: “All users must do MFA when outside the corporate
network.” While this is a good place to start, most customers refine this posture over time to strike a
balance between security and usability for end users.
▪ Consider using this policy to enforce MFA for high privileged accounts such as global administrators.
(You can find more information on privileged accounts in the section Assigning Administrative Roles
below.)
▪ An on-premises identity provider (such as AD FS) provides a claim that indicates the network location.
This is the recommended approach for federated customers.
▪ Azure AD receives the list of IP addresses that constitute the internal network. This is the only option
when using password hash sync or cloud-only identities.
To capture the location effectively, it is important to understand the retail store’s network infrastructure. A
store network may be part of the corporate network, or it may be connected via a VPN link enabled by
third-party internet access (either a public ISP or a “store within a store”). This will determine which of the
above options you must use, or if a combination is required.
Authentication Experience
Location-based access policies for applications can be configured to deliver one of the following
authentication experiences:
▪ Require MFA always. Always require the user to perform MFA when accessing this application,
regardless of their access location
▪ Require MFA when not at work. If the user is accessing the application from a network location that
is outside your internal network (as defined above), require MFA before allowing access
▪ Block access when not at work. Do not allow access to the application from a network location that is
outside your internal network.
Advantages Tradeoffs
▪ Easy to deploy. ▪ For large customers, it is challenging to assess and
▪ Easy to communicate to customers. maintain the list of internal IP Addresses, especially when
▪ Granularity makes it possible to enable this policy for a the network and directory are managed separately.
subset of applications. ▪ The authentication experience for users such as field
representatives and store associates, who sign in on a
regular basis from outside the corporate network, will have
friction.
▪ Configuration required when onboarding each application.
Recommendation
▪ Use this policy if you have identified low-impact applications that don’t require multifactor
authentication (e.g., bulletin board)
▪ Use this policy to lock down access to applications that you do not expect to be used outside the
corporate network. (e.g., clock in/out applications)
NOTE: While Microsoft Intune is required to enable device compliance policies for iOS and Android devices, Windows 10
devices can be integrated with third-party MDM solutions such as MobileIron and Airwatch.
Authentication Experience
Device-based access policies for applications can be configured to deliver one of the following
authentication experiences:
▪ All devices must be compliant. Require that all device types need to be compliant in order to access
the application
▪ Only selected platforms must be compliant. Restrict compliance requirement for the application to
specific device types.
Advantages Tradeoffs
▪ Enforcing device health provides much better protection ▪ Enrolling personal devices for some compliance criteria
against malware, device loss, minimum mobile OS version such as complex pins or potential remote wipe creates
accepted, etc. friction. To mitigate this, Microsoft Intune provides per-
application policies without requiring MDM enrollment.
Learn more: Protect app data using MAM policies
▪ Managing the Intune infrastructure requires additional IT
resources.
Recommendation
▪ If your organization has acquired Windows Intune, then we highly recommend incorporating device
health into your security strategy through MAM, MDM, or a combination.
▪ Using device state allows retail customers to create policies that enable access to a subset of well-
known devices in locations with restricted physical access, such as warehouses or behind the counter.
Examples of mitigations that can be part of a risk policy include the following:
▪ Require MFA.
▪ Require password reset.
▪ Block login.
Authentication Experience
▪ Users will attempt to sign-in. If a risk-based policy is triggered, then the users will be presented with a
message indicating abnormal behavior.
▪ Depending on sign-in risk policy configuration, a sign-in attempt can be blocked, or the user may be
prompted to perform MFA.
▪ Depending on the user risk policy configuration, a user can be blocked from signing in, or required to
reset her password.
Advantages Tradeoffs
▪ Users will only be prompted to do MFA if the sign-in is ▪ Users might not fully understand why they see different
deemed risky, which balances security and the user behavior, which might result in support incidents.
experience. Ideally, legitimate users will never see these ▪ Some models might result in false positives (e.g., familiar
prompts, while bad actors will be prevented from signing locations or impossible travel). Identifying and correcting
in. false positives might require multiple iterations.
Recommendations
▪ Good option for customers who are user experience focused and require minimal MFA prompts.
Learn more: User Risk Security Policy, Sing-in Risk Security Policy
Deployment considerations
▪ All the access policies described above can be scoped to a subset of users. We recommend rolling out
policies to a set of pilot users first so you can verify that user experience and security goals are met.
This is especially important when deploying multiple policies that can act simultaneously.
▪ Azure AD Identity Protection provides a view to quantify the estimated impact of rolling out risk
policies or MFA policies. Use this data to inform your rollout strategy and plan accordingly.
▪ We recommend educating users on what conditional access policies mean for them in terms of user
experience. Consider a communications campaign as part of your rollout process.
▪ You can follow the order described above to transition from a simple policy to a richer one over time.
Here’s an example of a typical journey to deploy access policies:
− Enable MFA to administrators only.
− Define MFA for all users when accessing resources from outside the corporate network.
− Define MFA only for high impact applications accessed from outside the corporate network.
− Incorporate mobile device state to streamline sign-in for users with compliant devices
− Incorporate policies to require MFA only in response to risky events.
Azure AD Administrative Units allow you to create subsets of users for roles specific to user management,
such as User Administrator or Helpdesk Administrator. Large organizations with regional helpdesk teams
can use this approach to further limit the privileges of Helpdesk operators.
NOTE: Azure AD will evolve roles over time. We recommend that you check the Enterprise Mobility and Security blog
on a regular basis to evaluate about new product capabilities and refine your roles accordingly. If you use Azure AD
Administrative Units to scope roles, executing operations available to each role requires using PowerShell.
Azure AD Privileged Identity Management provides JIT for Azure AD administration roles described above
this section, and Privileged Access Management (PAM) provides JIT to the on-premises Active Directory
infrastructure.
Learn More:
▪ Azure AD Identity Protection helps prevent the use of compromised accounts using industry leading
machine learning (ML) that processes login signals from multiple sources such as Office 365, Xbox Live,
Azure services, Outlook.com, etc. This login data is then combined with feeds from Microsoft’s Digital
Crimes Unit, Security Response Center, phishing attack data from Outlook.com, law enforcement,
academia, security researchers and partners to provide real-time detection of risky events and
vulnerabilities.
▪ Azure AD reporting APIs allow programmatic access that can facilitate integration with SIEM tools for
archiving/auditing and forensics.
▪ Azure AD Connect Health provides reports that can be used to investigate potential security
incidents and configuration vulnerabilities based on on-premises federated login activity.
▪ Advanced Threat Analytics provides additional visibility into potential vulnerabilities in on-premises
Active Directory.
The table below provides a summary of the scenarios that have available pre-defined reports:
Environment Vulnerabilities
▪ MFA registration is not configured: Reported when users who have not configured MFA are
detected. MFA login is a valuable tool for mitigating authentication attack vectors.
▪ Unmanaged cloud apps: Reported when Azure AD Cloud App Discovery detects unsanctioned SaaS
applications.
Learn more: Finding unmanaged cloud applications with Cloud App Discovery.
▪ Security alerts from PIM: Generated when there are issues with privileged identities (e.g., too many
global administrators).
Learn more: How to configure security alerts in Azure AD Privileged Identity Management
ATA is an on-premises platform included in Azure AD Premium and EMS to help you protect your
enterprise from advanced targeted attacks by automatically analyzing, learning, and identifying normal
and abnormal entities (user, devices, and resources). This includes the following:
▪ Malicious attacks: ATA detects known malicious attacks such as Pass-the-Hash (PtH) and Pass-the-
ticket almost as instantly as they occur:
Reporting API
Azure AD provides a reporting API that allows you to build custom security reports based on business
needs. Examples include the following:
Recommendations
▪ Set up the Azure AD Identity Protection weekly email digest to be sent to your security team.
▪ Designate owner(s) who periodically remediate risk events so you can keep your assessment of the
user risk and policies current.
▪ Maintain your list of IP address to improve the effectiveness of location-based risk events, reports, and
vulnerabilities.
▪ Enable the MFA registration policy so users sign up as soon as possible. This way, you can safely
configure policies to remediate risk with high confidence that the second factor will be available when
most needed.
▪ Deploy Azure AD Connect Health and assign owners to review reports for bad passwords and NTLM
usage, as well as future reports.
▪ Deploy Advanced Threat Analytics and assign owners to review and address the findings on a regular
basis.
▪ Export Azure AD reports to any SIEM tools deployed in your organization.
Learn more:
▪ Azure AD Join. This feature enables single sign on to Azure AD resources such as SaaS applications,
Office 365 and LOB applications, access to Windows Store with Azure AD credentials, enterprise
roaming settings, and other capabilities. Additionally, a device can be joined to Azure AD and on-
premises Windows Server AD, providing a seamless experience across both cloud and on-premises
resources.
▪ Shared Devices Improvements. Azure AD Join reduces the time it takes to sign-in to a device the first
time from the minutes it takes with traditional on-premises AD join to seconds. This allows turnkey
provisioning of users in shared devices such as kiosks, warehouses, and points of sale.
▪ Windows Hello for Work. This provides enterprise-wide infrastructure to recognize a device user via
different biometric gestures, authenticating using industry standards such as FIDO.
▪ Add Azure AD account for BYOD. Users can add an Azure AD account to personally owned devices
to access work applications. This enables single sign on and MDM enrollment.
Learn more:
▪ Microsoft Cloud App Security provides visibility and controls for cloud applications, including
popular SaaS apps like Box, Salesforce, ServiceNow, and Office 365.
Learn more: Cloud App Security, Gain enhanced visibility and control with Office 365 Advanced
Security.
▪ Microsoft Azure Rights Management (Azure RMS) helps you protect your organization’s sensitive
information from unauthorized access and control how this information is used.
▪ Azure Information Protection combines classification and labeling with persistent data protection to
enable secure file sharing, internally and externally.
▪ Intune Mobile Application Management (MAM) helps you prevent data loss on mobile devices,
with the unique ability to manage the Office mobile apps without requiring device enrollment.
Conclusion
Azure AD Premium and EMS provide a comprehensive set of capabilities that enable your retail
organization to have a robust security posture for cloud and on-premises resources. As a cloud service,
Azure AD is constantly adding more capabilities and refined models/heuristics that will further strengthen
your security posture. Check the Enterprise Mobility and Security blog periodically to learn about new
product capabilities.
Reference
For more information about Azure Active Directory, see https://azure.microsoft.com/en-
gb/services/active-directory/
To stay informed on new capabilities, visit the Enterprise Mobility and Security blog.