Effective July 1, 2018, all new applications and major upgrades to existing applications must implement modern authentication.
End-user authentication via Single Sign-On (SSO):
Additional Clarifications
Additional guidance (not mandated) for authenticating Service-to-Service integrations is described below.
Service-to-Service integrations (in order of preference):
--- BELOW SHOULD BE AVOIDED FOR HIGH RISK APPLICATIONS ---
Additional Clarifications
To enable SSO access to the Cloud (IaaS, PaaS, SaaS), we need to use SSO protocols and tokens that can work across security domains. The general term for cross-security domain SSO is “identity federation.” Identity federation is achieved via a technical trust relationship, based on public key cryptography, between the identity provider and the service provider(s).
The bottom line is that the Windows-based SSO protocols we use for our internal security domain are not used nor understood by the cloud. As a consequence, applications that use those SSO protocols are not Cloud-ready. To address this, all applications (whether on-prem or in the Cloud) must use modern cross-domain SSO protocols to ensure that the authentication for the application is Cloud-ready. If we don’t do this, we will continue to build “technical debt” that must eventually be dealt with as we migrate applications and services to the Cloud.
Other benefits to using modern single sign-on authentication:
The following resources are available to start learning about building modern authentication protocols into a solution.
Still need help? Get answers on HiveMind
The Public Cloud Team supports and operates Azure AD and ADFS while the Gateway / Authentication Team is responsible for consulting on modern authentication using Azure AD and ADFS. To request a consult, send an email to the Modern Auth Consulting shared mailbox.