Extending SAML Authorization to Legacy Applications
Organizations using Azure Active Directory via SAML improve their security posture for access to cloud applications. But what about legacy applications that they have on premises or may have moved to hosting in the public cloud? Many of those applications do not support SAML based identity. They often rely on legacy NTLM or Kerberos authorization for user access. These methods authorize access for an extended period of time and do not enable Zero Trust access where authorization needs to be done on a least privileged basis.
Organizations also want to be able to apply conditional access policies for resource access based on device risk posture or threat level and take action on each request.
The challenge and solution look like this:
iboss Extends SAML Authorization to Legacy Applications
iboss forces SAML authentication to any non-SAML aware app resource by applying Azure
AD authorization on a per-request basis in compliance with Zero Trust principles.
iboss can apply different levels of authentication requirements for different
- iboss can perform SAML authentication (SAML/OIDC) on legacy applications and services that do not support SAML authentication.
- iboss can force SAML authentication for resources that require different identity providers.
- iboss can associate each resource policy with a different Identity Provider (IdP) that can be used for authenticating users.
Because access is granted to resources through the iboss Zero Trust Edge, iboss can force SAML authentication even in cases where the protected resources have no ability to do so. This is because the SAML authentication is performed between the user and the iboss Zero Trust Edge before the connection is granted to the resource. This allows legacy applications and services to be protected by SAML authentication and comply with Zero Trust principles.
Resource policies can also be configured to require that multi factor authentication (MFA) be used before access to a resource is granted. If the resource policy requires MFA, the iboss Zero Trust Edge confirms that MFA was validated during the login process.
Benefits of Microsoft Azure AD and iboss for Authorization to Legacy Applications
- Eliminates the need for legacy firewalls with shift to iboss Zero Trust Edge.
- Eliminates reliance on Kerberos authentication, with shift to SAML authentication.
- Lowers risk from reliance on legacy authorization’s lengthy session time outs which can result in high risk impact from unauthorized access.
- Enables Zero Trust compliance from forced authentication on every packet, regardless of application.
- Avoids the need to lift and shift legacy resources immediately in order to support Zero Trust Architecture.
- Provides granular per resource control around applications.
- Provides visibility into risk profile beyond just legacy user authentication.
View PDF Here