Skip to content

Commit b53255b

Browse files
committed
Fixed 4 bugs in 4 units across several modules
1 parent 78d48c0 commit b53255b

4 files changed

Lines changed: 641 additions & 598 deletions

File tree

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,35 +1,35 @@
1-
**Authentication** is validating the identity (user or app or device) is who they proclaim to be. Then also providing an appropriate level of validation and security throughout the authentication transaction. Identity authentication provides:
1+
**Authentication** is validating the identity (user or app or device) is who they proclaim to be. Then also providing an appropriate level of validation and security throughout the authentication transaction. Identity authentication provides:
22

33
- Flexible, standards compliant, authentication that integrates across organizations
44
- Integration of disparate sources, applications, and protocols
55
- Employs many different industry standard methods of validation and assurance
66

7-
Using an identity provider for authentication offers a way to ensure secure identities without limiting the capabilities of the users. You get convenience, multiple sources for validating identity, industry protocols, and assurance of the identity.
7+
Using an identity provider for authentication offers a way to ensure secure identities without limiting the capabilities of the users. You get convenience, multiple sources for validating identity, industry protocols, and assurance of the identity.
88

9-
**Convenience** - The convenience capability focuses on the end-users experience with how they are prompted for authentication credentials. Focus here is on the end-user experience. If something is not easy, users avoid it or complain about it.
9+
**Convenience** - The convenience capability focuses on the end-users experience with how they're prompted for authentication credentials. Focus here's on the end-user experience. If something isn't easy, users avoid it or complain about it.
1010

11-
**Sources** - The sources capability surrounds where the user obtains their authentication token from. Many organizations have what they believe is a centralized issuer (Microsoft Entra ID), but in reality most organizations also have other identity repositories. Federated identity is the most common other identity provider.
11+
**Sources** - The sources capability surrounds where the user obtains their authentication token from. Many organizations have what they believe is a centralized issuer (Microsoft Entra ID), but in reality most organizations also have other identity repositories. Federated identity is the most common other identity provider.
1212

13-
**Protocols** - Often, organizations have various authentication protocols in place that cause a deficient experience to both end-users and the organization. A focus area of this capability is to help an organization standardize on one, or more, modern and secure authentication protocols to accomplish their authentication goals.
13+
**Protocols** - Often, organizations have various authentication protocols in place that cause a deficient experience to both end-users and the organization. A focus area of this capability is to help an organization standardize on one, or more, modern, and secure authentication protocols to accomplish their authentication goals.
1414

1515
**Assurance** - Authentication assurance is the confidence an organization has that an individual accessing a resource is who they say they are. This capability talks about whether or not an organization uses shared accounts, if they use personalized accounts and if solutions such as multifactor authentication or risk-based authentication are in place.
1616

1717
### Federated identity
18-
Federation is a collection of domains that have established trust. The level of trust varies, but typically includes authentication and almost always includes authorization. This federation allows you to apply existing identities from trusted sources, like an existing on-premises active directory.
18+
Federation is a collection of domains with an established trust. The level of trust varies, but typically includes authentication and almost always includes authorization. This federation allows you to apply existing identities from trusted sources, like an existing on-premises active directory.
1919

2020
### Common communication protocols in identity
2121

2222
| Protocol | Description and usage |
2323
| :----- | :----- |
2424
| SAML - Security Assertion Markup Language | Open standard for exchanging authentication and authorization data between an identity provider and a service provider. Common SAML attributes: |
25-
| | Principal = generally a user or device, IdP = identity provider, SP = service provider |
25+
| | Principal = generally a user or device |
2626
| | IdP = identity provider |
2727
| | SP = service provider |
2828
| WS-Fed - Web Services Federation | An identity specification from Web Services Security framework to provide single-sign-on via external identity exchange and authentication. |
2929
| OIDC - OpenID Connect | OIDC extends the OAuth 2.0 authorization protocol for use as an authentication protocol, so that you can do single sign-on using OAuth. |
3030

3131
### OpenID Connect
32-
OpenID Connect (OIDC) is an authentication protocol built on OAuth 2.0. This protocol enables a user to securely sign in a user to an application. When you use the Microsoft identity platform's implementation of OpenID Connect, you can add sign-in and API access to your apps. OpenID Connect extends the OAuth 2.0 authorization protocol for use as an authentication protocol, so that you can do single sign-on using OAuth. OpenID Connect introduces the concept of an ID token, which is a security token that allows the client to verify the identity of the user. The ID token also gets basic profile information about the user. It also introduces the UserInfo endpoint, an API that returns information about the user.
32+
OpenID Connect (OIDC) is an authentication protocol built on OAuth 2.0. This protocol enables a user to securely sign in a user to an application. When you use the Microsoft identity platform's implementation of OpenID Connect, you can add sign-in and API access to your apps. OpenID Connect extends the OAuth 2.0 authorization protocol for use as an authentication protocol, so that you can do single sign-on using OAuth. OpenID Connect introduces the concept of an ID token, which is a security token that allows the client to verify the identity of the user. The ID token also gets basic profile information about the user. It also introduces the UserInfo endpoint, an API that returns information about the user.
3333

3434
### Claims-based identity in Microsoft Entra ID
3535
When a user signs in, Microsoft Entra ID sends an ID token that contains a set of claims about the user. A claim is simply a piece of information, expressed as a key/value pair. For example, email=[email protected]. Claims have an issuer (in this case, Microsoft Entra ID), which is the entity that authenticates the user and creates the claims. You trust the claims because you trust the issuer. (Conversely, if you don't trust the issuer, don't trust the claims!)
@@ -40,24 +40,24 @@ At a high level:
4040
3. The app normalizes or augments the claims (optional).
4141
4. The app uses the claims to make authorization decisions.
4242

43-
In OpenID Connect, the set of claims you get are controlled by the scope parameter of the authentication request. However, Microsoft Entra ID issues a limited set of claims through OpenID Connect via a security token; primarily using JSON Web Tokens. If you want more information about the user, you need to use the Graph API with Microsoft Entra ID.
43+
In OpenID Connect, the set of claims you get are controlled with a scope parameter of the authentication request. However, Microsoft Entra ID issues a limited set of claims through OpenID Connect via a security token; primarily using JSON Web Tokens. If you want more information about the user, you need to use the Graph API with Microsoft Entra ID.
4444

4545
### Security tokens
4646
The Microsoft identity platform authenticates users and provides security tokens, such as access tokens, refresh tokens, and ID tokens. Security tokens allow a client application to access protected resources on a resource server. There are three common types of tokens, Access tokens, Refresh tokens, and ID tokens.
47-
- **Access token** - An access token is a security token that's issued by an authorization server as part of an OAuth 2.0 flow. It contains information about the user and the resource for which the token is intended. The information can be used to access web APIs and other protected resources. Access tokens are validated by resources to grant access to a client app. To learn more about how the Microsoft identity platform issues access tokens, see Access tokens.
48-
- **Refresh token** - Because access tokens are valid for only a short period of time, authorization servers will sometimes issue a refresh token at the same time the access token is issued. The client application can then exchange this refresh token for a new access token when needed. To learn more about how the Microsoft identity platform uses refresh tokens to revoke permissions, see Refresh tokens.
47+
- **Access token** - An access token is a security token that's issued by an authorization server as part of an OAuth 2.0 flow. It contains information about the user and the resource for which the token is intended. The information can be used to access web APIs and other protected resources. Access tokens are validated resources to grant access to a client app. To learn more about how the Microsoft identity platform issues access tokens, see Access tokens.
48+
- **Refresh token** - Because access tokens are valid for only a short period of time, authorization servers issue a refresh token at the same time the access token is issued. The client application can then exchange this refresh token for a new access token when needed. To learn more about how the Microsoft identity platform uses refresh tokens to revoke permissions, see Refresh tokens.
4949
- **ID token** - ID tokens are sent to the client application as part of an OpenID Connect flow. They can be sent alongside or instead of an access token. ID tokens are used by the client to authenticate the user. To learn more about how the Microsoft identity platform issues ID tokens, see ID tokens.
5050

5151
### What is a JSON Web Token (JWT)?
52-
JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret or a public/private key pair. Although JWTs can be encrypted to also provide secrecy between parties, we focus on signed tokens. Signed tokens can verify the integrity of the claims contained within it, while encrypted tokens hide those claims from other parties. When tokens are signed using public/private key pairs, the signature also certifies that only the party holding the private key is the one that signed it.
52+
JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it's digitally signed. JWTs can be signed using a secret or a public/private key pair. Although JWTs can be encrypted to also provide secrecy between parties, we focus on signed tokens. Signed tokens can verify the integrity of the claims contained within it, while encrypted tokens hide those claims from other parties. When tokens are signed using public/private key pairs, the signature also certifies that only the party holding the private key is the one that signed it.
5353

5454
> [!Note]
5555
> Information provided from the JWT web-site - https://jwt.io/.
5656
5757
#### Definitions within claims-based identity
5858
There are some common terms used when discussing claims-based identity in Microsoft Entra ID.
5959

60-
- **Claim** - a value pair of data within a security token. There are multiple claims transferred within the token from the claim that defines the type of the token to the encryption method. Here is an example:
60+
- **Claim** - a value pair of data within a security token. There are multiple claims transferred within the token from the claim that defines the type of the token to the encryption method. Here's an example:
6161
```
6262
Header
6363
{
@@ -71,6 +71,6 @@ There are some common terms used when discussing claims-based identity in Micros
7171
"aud": "https://jwt.io"
7272
}
7373
```
74-
- **Assertion** - a package of data, usually in for form of token that share the identity and security information about a user or account across security domains.
74+
- **Assertion** - a package of data, usually in the form of token that shares the identity and security information about a user or account across security domains.
7575
- **Attribute** - a value pair of data within a token.
76-
- **Augmentation** - the process of adding other claims to the user token to provide extra detail about the user. This could include data from human resource (HR) systems, from an application like SharePoint, or other systems.
76+
- **Augmentation** - the process of adding other claims to the user token to provide extra detail about the user. Augmentation could include data from human resource (HR) systems, from an application like SharePoint, or other systems.

0 commit comments

Comments
 (0)