MasterClass: Microsoft Identity solutions with Azure Active Directory and on-premises AD with John Craddock
Come to this Masterclass written and delivered by John Craddock. Discover how the identity solutions offered by Azure Active Directory and on-premises AD will help you build identity systems for the future using protocols that include OpenID Connect and OAuth 2.0. In the Masterclass you will learn how to authenticate and provide authorization factors to applications that can be located on-premises or in the cloud. The source of identity of the users could be from you own corporate network, your Azure AD domain, a partner organization and/or a social identity provider such as Facebook or Google.
About John Craddock
John Craddock is an internationally acknowledged master of identity management. John is Microsoft MVP and has been involved in Microsoft solutions since the early days of Windows and Windows NT. John spoke on Active Directory at the Windows 2000 launch events and has focused on identity solutions since the first release of AD FS for Windows Server 2003. His role as an identity and security architect has seen him involved in many IT projects for industry leaders including Microsoft, the UK Government and multi-nationals. He is an international speaker who has featured at many events throughout the world.
What to expect
The Masterclass is a high-energy, action packed event, crammed with solid information and tips. During the 5-days John Craddock will help build your knowledge and consolidate your new skills with over 37 hands-on labs.
The class provides detailed learning through the extensive use of hands-on labs. Attendees will not only learn the fundamentals and principles, but also learn how-to deploy and troubleshoot the solutions. In-depth learning will be gained through the use tools, such as Fiddler, to analyse and understand the protocol flows.
The class is primarily aimed at IT professionals. However, application developers who are tasked with integrating authentication and authorization with Microsoft Azure AD and/or on-premises AD will significantly benefit from the detailed coverage. Code development is not included in the class, but you will learn about all of the configuration requirements.
The Masterclass is designed to teach you how to solve all the challenging aspects of securing apps in Azure AD and providing an optimal SSO experience for your users.
To attend the Masterclass, you need to be a confident IT administrator with a thirst for knowledge. The Masterclass doesn’t teach basic Azure AD administration, but because of the extensive hands-on, you can come to this class with no prior knowledge of Azure AD. You will pick up the basics as we focus on the more challenging topics.
To gain the maximum from this class and the hands-on labs, you will need hands-on system administrator’s skills. For example, you will need to know how to:
- Create and manage groups, OUs and group policies in an on-premises AD
- Perform basic server/DC troubleshooting (for example check if a service is running, and restart it)
- Add a DNS record
- Add a URL to a browser’s Intranet zone
Course materials and lab environment
Both the hands-on manual and slides will be available in pdf format. You will also receive a copy build guide, which details how to set up the hands-on virtual environments, and copies of all the scripts and demo websites.
The hands-on labs are all run in a cloud-based virtual environment that will be available to you after the course is completed. The labs are available for 60 days from the course start date. This will allow you to do the labs again and test out other ideas.
Course content and agenda
After a comprehensive introduction to today’s identity challenges and solutions, you will learn the details of the authentication protocols. This in-depth coverage of the protocols will allow you to troubleshoot any problems you may encounter when deploying solutions. As we go through the hands-on labs, you will be expected to troubleshoot any issues you may encounter during the Masterclass. Of course, John will be there if you need help.
Day 1 hands-on labs include:
- Creating an Azure Active Directory
- Capturing and analysing HTTP/HTTPS sessions using Fiddler
- Enabling Kerberos on a website
- Troubleshooting Kerberos network traffic using Wireshark
- Tracing the WS-federation protocol
After completing our investigation of the protocols, you will learn how to configure the Azure Active Directory to meet your requirements. You'll discover how to manage the Azure AD through the Azure Portal, using PowerShell and the GraphAPIs. After adding custom domains and branding to your Azure AD, you will see how to enhance security and the user experience using self-service password resets, and MFA.
Day 2 hands-on labs include:
- Investigating OpenID Connect
- Adding custom domains to Azure AD
- Managing Azure AD with PowerShell
- Using Graph Explorer
- Self-service password resets
- Enabling Multi-Factor Authentication
You will start the day by deploying Azure AD Connect to synchronize on-premises AD users to Azure AD. We will then investigate pass-through authentication and the new SSO capabilities provided by Azure AD Connect. You will learn about the SSO capabilities of Windows 10 when it is joined to Azure AD and how Windows Hello, the authenticator app and FIDO 2 keys can eliminate the need for passwords.
At this stage, you will have created a reliable identity infrastructure, and now it's time to make applications available to our users.
You will start by deploying a SaaS app to your users; configuring groups, assignments and self-service application management. You will then learn how to register your own applications into Azure AD.
Day 3 hands-on labs include:
- Installing and configuring synchronization with Azure AD Connect
- Investigating pass-through authentication and SSO
- Working with SaaS applications
- Self-service application management
- Configuring a WS-Federation App with Azure AD
The day starts with configuring an Open ID Connect / OAuth 2.0 app. We then dive deeper into the application model and learning about managing permissions, roles, groups, delegation, APIs and consent. You will discover how to turn your application into a multi-tenant app and make it available to all users from all Azure AD tenants.
Day 4 hands-on labs include:
- Configuring an Open ID Connect / OAuth 2.0 app with Azure AD
- Managing permission roles and groups
- Defining WebAPI permissions
- Investigating consent
- Deploying a V2 app and testing consent
- Multi-tenant applications
The day starts with configuring the Azure AD application proxy to publish both claims and Windows auth applications using Kerberos constrained delegation. We will then look at the features offered by on-premises AD FS and how they can integrate with Azure AD. The labs support three optional hands-on with AD FS, however due to time constraints these will need to be done outside of class hours. We will stretch our boundaries and see how Azure AD can open access to consumers (B2C) and businesses (B2B).
Day 5 hands-on labs include:
- Publishing an applications using the Azure AD Application Proxy
- Enabling Windows Authentication via Kerberos Constrained Delegation
- Optional to be done outside class hours
- Configuring AD FS
- Enabling Federated SSO
- Installing and configuring an OpenID Connect app on AD FS
- Multi-tenant versus federated applications
- Managing B2B invitations and guest users
- Taking over an unmanaged tenant