Microsoft Secures Azure With Multifactor Authentication

Microsoft’s cloud has become a little bit more secure for businesses that offer staff, partners and customers access to their Windows Azure Active Directory (AD) managed apps.

Microsoft announced Active Authentication, a new multifactor authentication offering based on the company’s PhoneFactor acquisition.

Cloud Authentication

Redmond bought the firm in October 2012 to add two-factor, mobile phone-based secure access capabilities to its growing cloud application portfolio. Following the deal, Bharat Shah, corporate vice president for the Server and Tools Division at Microsoft, said in a statement that the buy would “bring effective and easy-to-use multifactor authentication to our cloud services and on-premise applications.”

“In addition, PhoneFactor’s solutions will help Microsoft customers, partners and developers enhance the security of almost any authentication scenario,” added Shah. Windows Azure director, Sarah Fender, announced in a 12 June blog post that the company is making good on some of its promises.

“Starting today, companies can enable multi-factor authentication for Windows Azure Active Directory identities to help secure access to Office 365, Windows Azure, Windows Intune, Dynamics CRM Online and many other apps that are integrated with Windows Azure AD,” she wrote.

Active Authentication is also available for developers who are creating Azure-based apps, informed Fender. “Developers can also use the Active Authentication SDK to build multi-factor authentication into their custom applications and directories.”

Typical of multifactor authentication schemes, Active Authentication secures Azure apps and data by “adding an extra step to the sign in process.” In this case, a user is granted access by supplying a login ID and password and authenticating via the Active Authentication mobile app, an automated phone call or text message.

Alex Simons, director of Program Management for Active Directory, noted in an Active Directory Team Blog post that despite the extra precautions, users have some say in how they interact with the system.

“Of course, the app is my personal favourite but you might like receiving a phone call better and most of the folks on our team prefer the SMS messaging option. The great thing about the service is that your users can choose the method they like best and switch between methods without any additional configuration on your part,” wrote Simons.

Industry Norm?

Microsoft is offering two pricing models. Organisations can opt for per-user, per-month plans or a per-authentication option that is based on the total number of authentications that are performed each month. Before Active Authentication is officially made generally available, the company is offering the service at the discounted price $1.00 (£0.64) per user per month or $1.00 for every 10 authentications.

Active Authentication for Windows Azure arrives just as big tech companies are rushing to deploy two-factor and multifactor authentication systems to protect their users.

In May, Twitter rolled out two-factor authentication to improve security after a spate of high-profile breaches that compromised the accounts of media organisations, including the Financial Times and BBC, and Twitter itself. Google got an early start by offering two-factor authentication for Google Apps in 2010.

Are you a security guru? Try our quiz!

Originally published on eWeek.

Pedro Hernandez

Pedro Hernandez covers Microsoft products and services, such as Office, Windows, Windows Phone, Azure and Skype.

Recent Posts

Former Policy Boss At X Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

2 hours ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

3 hours ago

FTX Co-Founder Gary Wang Spared Prison

Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…

4 hours ago