Saturday 9 December 2017

Azure Active Directory App Authentications

Azure AD App registrations provides ways for authenticating or authorizing the user custom applications which uses Azure AD, to access the data available on the Microsoft products/services.

Why Azure AD App Registration? You might have already worked with custom applications that uses Azure Control Service, which provides way for authenticating users to gain access to web applications and services. As ACS is getting deprecated, Microsoft provides ways for authenticating the applications and provides way for enabling permissions for users to access the data. 

(Source: https://cloudblogs.microsoft.com/enterprisemobility/2013/06/22/azure-active-directory-is-the-future-of-acs/)


The following method is one way for registering the custom built applications and authenticating users for accessing Microsoft services.

1. Azure AD has options for registering the user custom applications, where users can provide the app details like app name, application type (web or native app) and sign-on page URL. This helps authenticating users for accessing the application data.


2. Then navigate to the required permissions option. Select the required API and add the necessary permissions and save it. After saving, click on grant permissions for enabling users to access the data.


3. Navigate to the reply URLs option and add your custom application URLs. The reply URLs are used as callbacks. The tokens from the Azure AD will be passed to the applications using query parameters in the reply URLs.

On Azure AD, necessary permissions are given. Next, the custom applications can initiate the calls for authentications and access the data available on Microsoft services like graph API, outlook, calendars, etc. The following post describes one such authentication method to access the calendar events of user from outlook using graph API and outlook API.

The following Microsoft article describes more about authentication mechanisms using Azure AD.