<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Modern Authentication in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/15023#M483</link>
    <description>Nice post about authentication for Office 365 services.&lt;BR /&gt;&lt;BR /&gt;I was also against the app passwords which would get saved as it would be to had for someone to remember them.&lt;BR /&gt;&lt;BR /&gt;Though, even on Office 2016 with modern authentication I having some issues with some accounts that keeps asking for authentication. Working with Microsoft at the moment trying to figure out why.</description>
    <pubDate>Thu, 27 Sep 2018 12:52:29 GMT</pubDate>
    <dc:creator>ccorrea</dc:creator>
    <dc:date>2018-09-27T12:52:29Z</dc:date>
    <item>
      <title>Modern Authentication</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/14899#M478</link>
      <description>&lt;P&gt;&lt;STRONG&gt;The Primitive Issue…&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The Microsoft’s Office client applications, since its birth has been using the traditional username and password based authentication. Either we enter the password each time or we cache it, it always needed the password. The problem persisted for a long time even after the companies started using Azure Active Directory or O365 on cloud.&lt;/P&gt;&lt;P&gt;This defeated the whole purpose of attaining Single Sign On (via ADFS or any SAML or OAuth based IDPs) with Outlook client. There was no support for using smart card or certificate-based authentication. The privileged users couldn’t use the Multifactor authentication (MFA) in order to securely access the mail via outlook client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Time to go Modern…&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Better late than never, Microsoft recently introduced Modern Authentication to the rescue. It works based on ADAL (Active Directory Authentication Library) and enable features like MFA, SAML-based third-party Identity Providers with Office client applications. Once MA is enabled, Office client will behave exactly as a Web Browser when authenticating.&amp;nbsp; That is exactly similar to Azure AD sign-in experience into browser-based clients including the MFA experience. Modern Authentication in Office 365 helps desktop applications to user ADAL-based authentication and eliminates the need to memorize randomly generated app passwords.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Access and Refresh….&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The Access Token is a short-lived token, valid for about an hour and is used to gain access to the Office 365 services.&amp;nbsp;The Refresh Token is longer-lived (default 14 days), when the Access Token expires the Office client will present the Refresh Token to Azure Active Directory and request a new Access Token to continue using the service.&amp;nbsp;Conditional Access Policies (including MFA) may force users to provide authentication details again even though the Refresh Token is still valid. This eliminates the username and password completely.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;How to go Modern?&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Office 2016 Client : Works by default&lt;/LI&gt;&lt;LI&gt;Office 2013: Needs registry key changes on client machine. Can be pushed via GPOs.&lt;/LI&gt;&lt;LI&gt;MAPI over HTTP Protocol : RPC is deprecating and isn’t supported. Hence client must be using MAPI protocol.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;HKEY_CURRENT_USER &amp;gt; Software &amp;gt; Microsoft &amp;gt; Exchange. Check for "MapiHttpDisabled". If present, make it 0.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Office 365 Exchange Online is&amp;nbsp;off&amp;nbsp;by default. Run the below command as admin to set it on&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Set-OrganizationConfig -OAuth2ClientProfileEnabled $true&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;SharePoint Online is&amp;nbsp;on&amp;nbsp;by default.&lt;/LI&gt;&lt;LI&gt;Skype for Business Online is&amp;nbsp;off&amp;nbsp;by default. Run the below command as admin to set it on&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Set-CsOAuthConfiguration -ClientAdalAuthOverride Allowed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Advantages:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Single Sign on for Microsoft Office.&lt;/P&gt;&lt;P&gt;Multiple Factor Authentication for Office clients.&lt;/P&gt;&lt;P&gt;Ideal for Remote Desktop/Citrix clients&lt;/P&gt;&lt;P&gt;Seamless migration onto Office365 without passwords&lt;/P&gt;</description>
      <pubDate>Mon, 24 Sep 2018 14:28:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/14899#M478</guid>
      <dc:creator>ritesh2017</dc:creator>
      <dc:date>2018-09-24T14:28:01Z</dc:date>
    </item>
    <item>
      <title>Re: Modern Authentication</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/15023#M483</link>
      <description>Nice post about authentication for Office 365 services.&lt;BR /&gt;&lt;BR /&gt;I was also against the app passwords which would get saved as it would be to had for someone to remember them.&lt;BR /&gt;&lt;BR /&gt;Though, even on Office 2016 with modern authentication I having some issues with some accounts that keeps asking for authentication. Working with Microsoft at the moment trying to figure out why.</description>
      <pubDate>Thu, 27 Sep 2018 12:52:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/15023#M483</guid>
      <dc:creator>ccorrea</dc:creator>
      <dc:date>2018-09-27T12:52:29Z</dc:date>
    </item>
    <item>
      <title>Re: Modern Authentication</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/15339#M508</link>
      <description>Thanks ccorrea!&lt;BR /&gt;Moreover, the app passwords were so complicated, that you definitely will save it. this defies the purpose of having a password.</description>
      <pubDate>Mon, 08 Oct 2018 15:13:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/15339#M508</guid>
      <dc:creator>ritesh2017</dc:creator>
      <dc:date>2018-10-08T15:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: Modern Authentication</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/15358#M514</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/840089755"&gt;@ccorrea&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;I was also against the app passwords which would get saved as it would be too hard for someone to remember them.&lt;/BLOCKQUOTE&gt;&lt;P&gt;There is no need to write it&amp;nbsp;down or remember it.&amp;nbsp;&amp;nbsp;Ideally one only uses an app password in scenarios where one would normally store a password, such as the email app on your phone or an imap client on your PC.&amp;nbsp; Once stored, you simply "forget" the password.&amp;nbsp;&amp;nbsp;When it comes time to&lt;SPAN&gt;&amp;nbsp;reinstall the app, you delete the old app password and create a new one.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once freed from the need to remember a password, one can easily geek out on making it hard to brute-force.&amp;nbsp; For example, here is one I just generated but did not use (because it was just posted to a public forum&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.isc2.org/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; ).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;MDZtPS!tVrY1^UAtsu#o0sED*H@y277cL$gS#c7oDl4G$$Hd^!xzr%OKlSGRYL4&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&amp;nbsp;goal behind app passwords is&amp;nbsp;to ensure that "legacy"&amp;nbsp;apps&amp;nbsp;do not prevent you from using more "modern" security strategies, such as SAML or MFA for your interactive logins.&amp;nbsp; This is&amp;nbsp;an example of&amp;nbsp;&lt;A href="https://en.wikipedia.org/wiki/Perfect_is_the_enemy_of_good" target="_blank"&gt;don't let perfect be the enemy of good&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Oct 2018 22:25:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/15358#M514</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2018-10-08T22:25:09Z</dc:date>
    </item>
    <item>
      <title>Re: Modern Authentication</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/15467#M531</link>
      <description>&lt;P&gt;However, when you are dealing with healthcare IoT devices, and PII we need to think outside the box, and thinking about DeIdentified Identifiers or DD's for instance.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.evernym.com/wp-content/uploads/2017/07/The-Technical-Foundations-of-Sovrin.pdf" target="_blank"&gt;https://www.evernym.com/wp-content/uploads/2017/07/The-Technical-Foundations-of-Sovrin.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 20:03:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/15467#M531</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-10-11T20:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: Modern Authentication</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/15791#M545</link>
      <description>&lt;P&gt;Hi Ritesh,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for sharing it.We have all devices with office 2016 client, however, it still asks for app password. Not sure if there is some setting in office 365 needs to be changed to push for ADAL. I guess the question goes to office 365 but if you have faced the situation and are aware with resolution, please let me know.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/292422283"&gt;@ritesh2017&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;STRONG&gt;The Primitive Issue…&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The Microsoft’s Office client applications, since its birth has been using the traditional username and password based authentication. Either we enter the password each time or we cache it, it always needed the password. The problem persisted for a long time even after the companies started using Azure Active Directory or O365 on cloud.&lt;/P&gt;&lt;P&gt;This defeated the whole purpose of attaining Single Sign On (via ADFS or any SAML or OAuth based IDPs) with Outlook client. There was no support for using smart card or certificate-based authentication. The privileged users couldn’t use the Multifactor authentication (MFA) in order to securely access the mail via outlook client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Time to go Modern…&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Better late than never, Microsoft recently introduced Modern Authentication to the rescue. It works based on ADAL (Active Directory Authentication Library) and enable features like MFA, SAML-based third-party Identity Providers with Office client applications. Once MA is enabled, Office client will behave exactly as a Web Browser when authenticating.&amp;nbsp; That is exactly similar to Azure AD sign-in experience into browser-based clients including the MFA experience. Modern Authentication in Office 365 helps desktop applications to user ADAL-based authentication and eliminates the need to memorize randomly generated app passwords.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Access and Refresh….&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The Access Token is a short-lived token, valid for about an hour and is used to gain access to the Office 365 services.&amp;nbsp;The Refresh Token is longer-lived (default 14 days), when the Access Token expires the Office client will present the Refresh Token to Azure Active Directory and request a new Access Token to continue using the service.&amp;nbsp;Conditional Access Policies (including MFA) may force users to provide authentication details again even though the Refresh Token is still valid. This eliminates the username and password completely.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;How to go Modern?&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Office 2016 Client : Works by default&lt;/LI&gt;&lt;LI&gt;Office 2013: Needs registry key changes on client machine. Can be pushed via GPOs.&lt;/LI&gt;&lt;LI&gt;MAPI over HTTP Protocol : RPC is deprecating and isn’t supported. Hence client must be using MAPI protocol.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;HKEY_CURRENT_USER &amp;gt; Software &amp;gt; Microsoft &amp;gt; Exchange. Check for "MapiHttpDisabled". If present, make it 0.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Office 365 Exchange Online is&amp;nbsp;off&amp;nbsp;by default. Run the below command as admin to set it on&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Set-OrganizationConfig -OAuth2ClientProfileEnabled $true&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;SharePoint Online is&amp;nbsp;on&amp;nbsp;by default.&lt;/LI&gt;&lt;LI&gt;Skype for Business Online is&amp;nbsp;off&amp;nbsp;by default. Run the below command as admin to set it on&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Set-CsOAuthConfiguration -ClientAdalAuthOverride Allowed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Advantages:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Single Sign on for Microsoft Office.&lt;/P&gt;&lt;P&gt;Multiple Factor Authentication for Office clients.&lt;/P&gt;&lt;P&gt;Ideal for Remote Desktop/Citrix clients&lt;/P&gt;&lt;P&gt;Seamless migration onto Office365 without passwords&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 00:54:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/15791#M545</guid>
      <dc:creator>rajsrajput18</dc:creator>
      <dc:date>2018-10-24T00:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: Modern Authentication</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/15792#M546</link>
      <description>&lt;P&gt;just reviewed this article and you have already mentioned the Powershell commands.&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.office.com/en-gb/article/enable-or-disable-modern-authentication-in-exchange-online-58018196-f918-49cd-8238-56f57f38d662" target="_blank"&gt;https://support.office.com/en-gb/article/enable-or-disable-modern-authentication-in-exchange-online-58018196-f918-49cd-8238-56f57f38d662&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 00:58:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Modern-Authentication/m-p/15792#M546</guid>
      <dc:creator>rajsrajput18</dc:creator>
      <dc:date>2018-10-24T00:58:19Z</dc:date>
    </item>
  </channel>
</rss>

