Using Azure AD as an identity provider
In the new cloud era, the externalization and consumerization of IT is playing a main role. Users need to access all their data and resources from many different places and devices without thinking about where the application is actually installed. SaaS applications are very useful for meeting this demand. Here enters another issue, however, because purchasing and using SaaS applications is easier than ever and various departments are bypassing their IT departments. Shadow IT is born - application usage without central management. This trend called Shadow IT will be seen more often as more companies try to adopt cloud-based SaaS apps.
Typical questions we hear in our projects are as follows:
- How can I arrange collaboration without managing foreign users? (management)
- How do I monitor the usage of these applications? (management)
- How do I enforce the correct set of permissions to these applications? (access control)
- How do I ensure that only legitimate...