Tuesday, July 12, 2022

 

This is a continuation of series of articles on hosting solutions and services on Azure public cloud with the most recent discussion on Multitenancy here This article discusses the identity and group management considerations for multitenant solutions.

A multitenant application does not control how many tenants or the direct ownership of a resource to its tenant. The customer has the complete say in this. They may want to reassign a resource to another tenant. For example, if they decide to join a machine to a different tenant, they need to disconnect from the first tenant and then register again with the new tenant.  The single sign-on (SSO) option for password hash synchronization and pass-through authentication can be used with only one Azure AD tenant.

When resource and users proliferate, groups come in handy to organize them and manage actions against many users. The Azure AD can use groups to assign access to a SaaS application that’s integrated with AD. A security group can be used to secure access to a resource. Members can be added or removed from the security group without changing the security model of the resource access control. This capability can be added to hundreds of resources across the application.

The role assignment for a group can be done directly with the Azure AD admin center and this can be added from the application gallery. Users and groups can be selected and then users can be added to a role. The users or groups can be assigned to the multitenant application or a resource within the application. Both app and resource access can be managed this way.

Azure AD gives access to the organization’s resources by providing access rights to a single user or an entire Azure AD group. Nested groups and users can inherit permissions which saves the effort of adding permissions one by one. There are four ways of assigning access rights and permissions. Rights can be directly accessed assigned to the user. They can be assigned to a group instead. There can be assignment based on rules where the rule defines how users are assigned to resources. Access can be granted from an external source such as an on-premise directory or the multitenant application.

 A resource owner creates a group and assigns the group to the resource. The group owner assigns users to the group who become members of the group and gain access to the resource. The group owner can let the users find their groups to join, instead of assigning them. The owner can also setup the group to automatically accept all users that join to or require approval. When a user requests to join a group, the request is forwarded to a group owner. If it is required, the owner can approve the request and the user can be notified but if there are multiple owners and one of them disapproves, the user is notified but isn’t added to the group. Automatic approval eliminates the onus on the group owner.sw

Azure resources are deployed and managed through a hierarchy. Most resources are deployed into resource groups which are contained in subscriptions. This hierarchy pertains to a tenant. When we deploy the resources, we have the option to isolate them at different levels. Different models can be used in different components of the same solution.  Groups can be used to secure the appropriate level.

Reference: Multitenancy: https://1drv.ms/w/s!Ashlm-Nw-wnWhLMfc6pdJbQZ6XiPWA?e=fBoKcN        

 

 

 

No comments:

Post a Comment