{"id":2471,"date":"2015-03-18T16:51:00","date_gmt":"2015-03-18T16:51:00","guid":{"rendered":"https:\/\/thebeagle.itgroove.net\/?p=2119"},"modified":"2023-02-24T21:39:46","modified_gmt":"2023-02-24T21:39:46","slug":"office-365-identity-management-an-introduction-for-the-layman","status":"publish","type":"post","link":"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/","title":{"rendered":"Office 365 \u2013 Identity Management (an introduction for the layman)"},"content":{"rendered":"<p>It seems like the new buzzword or catchphrase is \u201cIdentity Management\u201d.\u00a0 Vendors everywhere are falling all over themselves to get on the bandwagon to provide tools that manage identities across many platforms.\u00a0 That\u2019s all well and good but for the average O365 user and\/or the average small business owner, the concept may be pretty vague or non-existent.\u00a0 So what the heck is it, anyway?<\/p>\n<p>In very simple terms, Identity Management is the process that positively identifies who you are (authentication) and then assigns specific rights to you (authorization) based on the fact that you are, in fact, who you claim to be.\u00a0 Of course this is an oversimplification of the process but it does cover the critical basics \u2013 authentication and authorization.<\/p>\n<p>All of us are familiar with authentication and authorization because all of us use these things everyday.\u00a0 We login to email, our PC\u2019s, websites, Office 365, you name it; we are all used to <em>authenticating<\/em> ourselves to systems.\u00a0 At the same time we are also being <em>authorized<\/em> as our logins grant us access to our email, our PC\u2019s, websites, Office 365 and a whole bunch of other things.\u00a0 So, if we are doing this all the time, what\u2019s the big deal and why is it such a hot topic?\u00a0 Simple, we are now in a world of \u201csingle sign-on\u201d, where we have inter-linked and inter-dependent systems that talk to each other and that pass information about <em>us<\/em> between them.\u00a0 This implies that one system needs to trust another system and, more importantly, that systems have to <em>trust implicitly<\/em> the quality of the initial authentication of the user.\u00a0 In other words, if I\u2019m going to let you into my system based on a trust relationship with your system then I had better be 100% sure that your system is authenticating and authorizing users correctly.\u00a0 That is the crux of the whole Identity Management frenzy.<\/p>\n<p>Office 365 and local Active Directory use pretty similar and standard authentication mechanisms:\u00a0 you have a login (your identity), a password that goes along with your identity and rights that are assigned to your identity in the \u201cback end\u201d.\u00a0 In a local Active Directory you may be assigned to certain Security Groups that grant you access to certain internal resources such as files shares; in Office 365 it might come down to what you can access in SharePoint (the Sites).\u00a0 In either case your login and password authenticate you and your rights authorize you.\u00a0 But Office 365 is Cloud based which means, by definition, that security might (should) be stronger than what you have on a LAN based domain just to make it harder for the \u201cbad guys\u201d to hack into your account.\u00a0 Office 365 does this by making two-factor authentication available.\u00a0 Two-factor authentication means you authenticate yourself to the system with two pieces of information, generally with something you \u201cknow\u201d (password) along with something you \u201chave\u201d (biometric scan such as a fingerprint, a code sent you your phone, a onetime code displayed on a token).\u00a0 In the case of Office 365 it is a one-time code sent to your phone.\u00a0 So, to authenticate, you have to provide both your password AND the code that is sent to your phone.\u00a0 The idea behind this is that only you should be in possession of the password and the phone.<\/p>\n<p>As you might imagine, the more \u201csecure\u201d and in-depth the authentication process is the better the chances are that the person authenticating as \u201cyou\u201d is, in fact, you!<\/p>\n<p>And that really is the basis of the inter-system Identity Management trust that is being built up out there on the Interwebs.\u00a0 In the case of Office 365 it is the basis of the ability you have to grant \u201cauthenticated external users\u201d access to your SharePoint sites, to your OneDrive for Business and, to a lesser extent, your personal OneDrive.\u00a0 Using SharePoint as a specific example, you can invite external users that have set up a Microsoft Live account that is actually authenticated via a Gmail account; you can also grant access to users that have an Office 365 identity in another Office 365 tenancy.\u00a0 The reason you can do this is because Office 365 \u201ctrusts\u201d the authentication mechanisms of the external provider to ensure that you are really \u201cyou\u201d; and, yes, other O365 tenancies are \u201cexternal\u201d as far as your tenancy is concerned.<\/p>\n<p>Identity Management is driving all sorts of development all over the place because it is only going to get more complicated going forward.\u00a0 Microsoft, as an example, is working on all sorts of future security mechanisms that will allow for transparent yet rigidly enforced separation of \u201cprivate\u201d data (your own private data) from \u201ccorporate\u201d data (your work information) on the devices you use; other vendors are doing similar things.\u00a0 It becomes critically important that there is no \u201cfuzziness\u201d in identity in this type of situation.<\/p>\n<p>So there you have it, Identity Management for the layman.\u00a0 So don\u2019t complain when your Office 365 admin insists that you use two-factor authentication, you now know why it is important!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It seems like the new buzzword or catchphrase is \u201cIdentity Management\u201d.\u00a0 Vendors everywhere are falling all over themselves to get on the bandwagon to provide tools that manage identities across many platforms.\u00a0 That\u2019s all well and good but for the average O365 user and\/or the average small business owner, the concept may be pretty vague &hellip; <a href=\"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/\"><\/a><\/p>\n","protected":false},"author":10,"featured_media":2223,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[247],"tags":[422,610],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Office 365 \u2013 Identity Management (an introduction for the layman) - Archive<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Office 365 \u2013 Identity Management (an introduction for the layman) - Archive\" \/>\n<meta property=\"og:description\" content=\"It seems like the new buzzword or catchphrase is \u201cIdentity Management\u201d.\u00a0 Vendors everywhere are falling all over themselves to get on the bandwagon to provide tools that manage identities across many platforms.\u00a0 That\u2019s all well and good but for the average O365 user and\/or the average small business owner, the concept may be pretty vague &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/\" \/>\n<meta property=\"og:site_name\" content=\"Archive\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-18T16:51:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-24T21:39:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2015\/03\/lockkey.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"92\" \/>\n\t<meta property=\"og:image:height\" content=\"92\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sean Wallbridge\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sean Wallbridge\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/\",\"url\":\"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/\",\"name\":\"Office 365 \u2013 Identity Management (an introduction for the layman) - Archive\",\"isPartOf\":{\"@id\":\"https:\/\/regroove.ca\/archive\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2015\/03\/lockkey.jpg\",\"datePublished\":\"2015-03-18T16:51:00+00:00\",\"dateModified\":\"2023-02-24T21:39:46+00:00\",\"author\":{\"@id\":\"https:\/\/regroove.ca\/archive\/#\/schema\/person\/74e1c0def190f181c1394c2b6d883e77\"},\"breadcrumb\":{\"@id\":\"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/#primaryimage\",\"url\":\"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2015\/03\/lockkey.jpg\",\"contentUrl\":\"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2015\/03\/lockkey.jpg\",\"width\":92,\"height\":92},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog Archive\",\"item\":\"https:\/\/regroove.ca\/archive\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Office 365 \u2013 Identity Management (an introduction for the layman)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/regroove.ca\/archive\/#website\",\"url\":\"https:\/\/regroove.ca\/archive\/\",\"name\":\"Archive\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/regroove.ca\/archive\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/regroove.ca\/archive\/#\/schema\/person\/74e1c0def190f181c1394c2b6d883e77\",\"name\":\"Sean Wallbridge\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/regroove.ca\/archive\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adf8cea6291c39d166616f2148d919a6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adf8cea6291c39d166616f2148d919a6?s=96&d=mm&r=g\",\"caption\":\"Sean Wallbridge\"},\"url\":\"https:\/\/regroove.ca\/archive\/author\/swallbridge\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Office 365 \u2013 Identity Management (an introduction for the layman) - Archive","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/","og_locale":"en_US","og_type":"article","og_title":"Office 365 \u2013 Identity Management (an introduction for the layman) - Archive","og_description":"It seems like the new buzzword or catchphrase is \u201cIdentity Management\u201d.\u00a0 Vendors everywhere are falling all over themselves to get on the bandwagon to provide tools that manage identities across many platforms.\u00a0 That\u2019s all well and good but for the average O365 user and\/or the average small business owner, the concept may be pretty vague &hellip;","og_url":"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/","og_site_name":"Archive","article_published_time":"2015-03-18T16:51:00+00:00","article_modified_time":"2023-02-24T21:39:46+00:00","og_image":[{"width":92,"height":92,"url":"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2015\/03\/lockkey.jpg","type":"image\/jpeg"}],"author":"Sean Wallbridge","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sean Wallbridge","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/","url":"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/","name":"Office 365 \u2013 Identity Management (an introduction for the layman) - Archive","isPartOf":{"@id":"https:\/\/regroove.ca\/archive\/#website"},"primaryImageOfPage":{"@id":"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/#primaryimage"},"image":{"@id":"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/#primaryimage"},"thumbnailUrl":"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2015\/03\/lockkey.jpg","datePublished":"2015-03-18T16:51:00+00:00","dateModified":"2023-02-24T21:39:46+00:00","author":{"@id":"https:\/\/regroove.ca\/archive\/#\/schema\/person\/74e1c0def190f181c1394c2b6d883e77"},"breadcrumb":{"@id":"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/#primaryimage","url":"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2015\/03\/lockkey.jpg","contentUrl":"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2015\/03\/lockkey.jpg","width":92,"height":92},{"@type":"BreadcrumbList","@id":"https:\/\/regroove.ca\/archive\/2015\/03\/18\/office-365-identity-management-an-introduction-for-the-layman\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog Archive","item":"https:\/\/regroove.ca\/archive\/"},{"@type":"ListItem","position":2,"name":"Office 365 \u2013 Identity Management (an introduction for the layman)"}]},{"@type":"WebSite","@id":"https:\/\/regroove.ca\/archive\/#website","url":"https:\/\/regroove.ca\/archive\/","name":"Archive","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/regroove.ca\/archive\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/regroove.ca\/archive\/#\/schema\/person\/74e1c0def190f181c1394c2b6d883e77","name":"Sean Wallbridge","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/regroove.ca\/archive\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adf8cea6291c39d166616f2148d919a6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adf8cea6291c39d166616f2148d919a6?s=96&d=mm&r=g","caption":"Sean Wallbridge"},"url":"https:\/\/regroove.ca\/archive\/author\/swallbridge\/"}]}},"_links":{"self":[{"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/posts\/2471"}],"collection":[{"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/comments?post=2471"}],"version-history":[{"count":1,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/posts\/2471\/revisions"}],"predecessor-version":[{"id":2818,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/posts\/2471\/revisions\/2818"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/media\/2223"}],"wp:attachment":[{"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/media?parent=2471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/categories?post=2471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/tags?post=2471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}