Okta vs. Azure AD Identity Provider (IdP) The End-User Experience

Recently I’ve been working with several Office 365 customers who are considering Okta or they have already invested in Okta as their primary identity provider (IdP) solution. These customers have been asking questions like:

How does Okta compare to the Microsoft Azure Active Directory (AD) identity solution?
What is the end-user experience if I switch from Okta to Azure AD or vice versa?
What are the advantages or limitations one way or the other?

So, I decided to build out a lab environment with both solutions to gain a firsthand experience.  The following diagram represents this lab environment which simulates both an Okta federated domain, PCTGOKTADEV.US and an Azure AD managed domain, PCTGDEV.US.

Okta-AzureAD

In the video below, we will cover the following Office 365 end-user scenarios for both the Okta federated domain and Azure AD managed domain:

  • Initial sign-in to portal
  • Trusted sign-in to OWA
  • Non-trusted sign-in to OWA
  • Outlook profile configuration
  • Risky sign-in from Tor browser
  • Restricting applications to corporate owned-devices

 

Hopefully you find this information useful in understanding the difference between the Okta and Azure AD experiences for Office 365 users.

Thanks for tuning in and please comment and let me know if you would like to see other scenarios demonstrated.

Office 365 Groups Administration for the IT Pro

Office 365 Groups are rapidly gaining momentum especially with the popularity of apps such as Microsoft Teams. Office 365 Groups is the foundation for apps such as Microsoft Planner, Microsoft Teams, Power BI groups, etc. For example, when you create a Microsoft Team, an Office 365 Group is automatically created whether you are using all the features of the Office 365 Group or not.

The underlying foundation for an Office 365 Group consists of the following services and components:

  • Exchange shared mailbox
    • Mailbox to record conversations between members
    • Calendar to post events and appointments for the Group
  • SharePoint site collection
    • Document library for storing and synching files
    • OneNote Notebook for taking Group notes
    • All the features of a SharePoint team site and more
  • Microsoft Stream video portal
  • Microsoft Planner plan for tracking project tasks
  • Power BI workspace for creating dashboards and reports (requires a premium Power BI license for all members)

Before we go any further, let’s define some personas for this blog article. You’ll see these referenced throughout this article.

image001 Office 365 tenant administrator or “IT Pro”
image002 Internal Office 365 tenant users
image003 External Office 365 tenant guests

So what’s the problem?

image001As an IT Pro, you might be thinking, “All Office 365 Groups contain an Exchange shared mailbox, a SharePoint site collection with a document library, OneNote notebook and a Stream video portal?”  That’s correct, and users can create Office 365 Groups by default. Microsoft doesn’t waste anytime promoting this functionality and encouraging self-service provisioning and management of Office 365 Groups and related applications.  This can cause what I’ve heard called digital debris in your Office 365 tenant and on-premises Exchange organization if you have a hybrid deployment.

So what administrative options are available to IT Pros to have better control of Office 365 Groups?  In this article, we will cover administration, securing external access, and other methods to control digital debris for Office 365 Groups. So, let’s get to it!

Controlling who can create Office 365 groups

image005By default, all Office 365 users can create Office 365 Groups. In this example, a regular Office 365 user is creating an Office 365 group named “Office 365 Group”.  Yeah, this is a very generic name, know try to imagine what group names users might come up with. How would other users know the purpose of the group? Additionally, the user can establish the privacy for the group and allow all members including external users to email the group.

image006

image001

As an IT Pro, you may want to control who can create Office 365 Groups so they don’t spread wildly throughout your organization. You can limit who can create Office 365 Groups to say the IT department or maybe business unit leads to provide another management layer. This configuration requires you create a security group for this purpose and PowerShell for configuration. In the following example, only members of the “O365 Group Creators” security group can create Office 365 Groups (see screenshot below).

image007

image005

Office 365 users who are not a member of the “O365 Group Owners” security group are not allowed to create Office 365 groups in all Office 365 services that use groups including Outlook, Planner, SharePoint, Yammer, and Microsoft Teams. The Office 365 user experience in this scenario is display below when trying to create an Office 365 Group or Microsoft Teams team.

image008

image009

image001

For detailed instructions on managing who can create Office 365 Groups, Planner plans and Microsoft teams, please visit:
https://support.office.com/en-us/article/Manage-who-can-create-Office-365-Groups-4c46c8cb-17d0-44b5-9776-005fced8e618?ui=en-US&rs=en-US&ad=US

Controlling External Sharing

image005

By default, guest access is enabled for Office 365 Groups. This means users external to your organization can be added to an Office 365 Group and collaborate with internal users.  Office 365 Group owners and Office 365 Global Admins can add guests to Office 365 Groups. Consider the following default scenario, internal users can create an Office 365 Group where as an owner they can add external users. These external users would have the ability to collaborate with internal users in your organization including sharing content such as emails, OneNote notebooks and files stored in SharePoint document libraries. Below is the default experience for an Office 365 Group owner.

image010

image003

External users can collaborate with internal users in your organization including sharing content such as emails, OneNote notebooks and files stored in SharePoint document libraries. When invited to join an Office 365 Group, external users would receive a welcome email to share messages and files with other users in your internal Office 365 organization (see screenshot below).

image011

Where the concept of self-service and adoption of Office 365 workloads is appealing, there is still a delicate balance between productivity and security. The good news is Microsoft provides several ways for you to control external access. We will cover several of these methods including:

  • Disable external sharing for the Office 365 tenant
  • Disable external sharing for an individual Office 365 Group
  • Restrict external sharing based upon security groups
  • Restrict external sharing using allow/block domain lists

Disable external sharing using the SharePoint admin center

image001

There are several ways to disable sharing at the Office 365 tenant level via the SharePoint Online admin center. In the screenshot below, we have selected the option to “Don’t allowing sharing outside your organization”. This setting would not allow external sharing and hold true for all Office 365 groups and SharePoint sites as this is a SharePoint admin center configuration (see screenshot below).

image013

image005

With external sharing disabled, Office 365 users would not be able share with an external user. When attempting to share a document via the sharing dialog, internal Office 365 users would receive a similar message to the one displayed in the example.

image014

image003

If an external user attempted to access a SharePoint Online resource when external sharing was disabled, they would receive the following message.

image015

Additional Tenant-Level Settings

SharePoint Online has both global (tenant-wide) and site collection settings for external sharing. The tenant-level settings override any settings at the site collection level.

For your SharePoint Online tenant and for each individual site collection, you can choose from the following basic sharing options:

  • No external sharing – sites and documents can only be shared with internal users in your Office 365 subscription.
  • Sharing only with external users in your directory – sites, folders, and documents can only be shared with external users who are already in your Office 365 user directory. For example, users who have previously accepted a sharing invitation or users who you have imported from another Office 365 or Azure Active Directory tenant.
  • Sharing with authenticated external users – sites, folders, and documents can be shared with external users who have a Microsoft account or a work or school account from another Office 365 subscription or an Azure Active Directory subscription. This is the default setting for Office 365 tenants which allows for Office 365 Group guest access.
  • Sharing with anonymous users – documents and folders (but not sites) can be shared via an anonymous link where anyone with the link can view or edit the document, or upload to the folder.

The list above is in the order of most to least restrictive. Whichever option you choose, the more restrictive functionality is still available to you. For example, if you choose to allow sharing with anonymous users, you can still share with authenticated external users and users already in your directory, including internal users.

For more details, please visit https://support.office.com/en-ie/article/Turn-external-sharing-on-or-off-for-SharePoint-Online-6288296a-b6b7-4ea4-b4ed-c297bf833e30#ID0EAABAAA&ID0EAABAAA.

Disable adding organization guests using the Office 365 admin center

image001

You can also control if Office 365 users can add new guests to Office 365 groups and SharePoint Online in the organization. This would disable the ability for group owners or administrators to add new guests to Office 365 groups. This configuration is possible via the Office 365 Admin Center under Settings à Security & privacy -> Sharing (see screenshot below).

image017

image005

With this setting configured in the Office 365 admin center, the following message would be displayed for users trying to add an external user to an Office 365 group.

image019

Disable adding Office 365 Group guests in the Office 365 admin center

image001

You can allow administrators to add external users and disable the ability for Office 365 group owners to add external users. This configuration is possible via the Office 365 Admin Center under Settings -> Services & add-ins -> Office 365 Groups (see screenshot below). NOTE: This configuration only affects newly created Office 365 Groups. Owners of existing groups will not be restricted from adding external users. Likewise, if this setting is reversed, only newly created Office 365 Groups are affected.

image020

image005

Once this configuration is in place, Office 365 Group owners will receive the following message when trying to add external users to their Office 365 group.

image021

Disable external access to Office 365 Group content in the Office 365 admin center

image001

Another Office 365 tenant-level configuration is the ability to restrict external users from accessing Office 356 Group content and receiving emails. This basically disables the ability for all external users to access Office 365 group content, UNLESS there is a specific file or folder shared with them. This configuration is possible via the Office 365 Admin Center under Settings -> Services & add-ins -> Office 365 Groups (see screenshot below). NOTE: This configuration only affects newly created Office 365 Groups. Owners of existing groups will not be restricted from adding external users. Likewise, if this setting is reversed, only newly created Office 365 Groups are affected.

image022

image003

If an external user attempted to access an Office 365 Group resource when external sharing was disabled, they would receive the following message.

image023

image003

This screenshot is proof the “Let members outside the organization access group content” does not affect standard SharePoint Online sites only Office 365 group sites and their content.

image025

Disable external access to Office 365 Group using PowerShell

image001

As an IT Pro, you can control per-Office 365 Group sharing settings. In the following PowerShell example, we have update the default value of “ExternalUserSharingOnly” to “Disabled”. This is the equivalent of configuring the “Don’t allow access outside the organization” setting in the SharePoint Online admin center for tenant-level configuration. In this case, it only affects the individual Office 365 Group. For more information on how this configuration is possible, please visit the following link:
https://support.office.com/en-ie/article/Turn-external-sharing-on-or-off-for-SharePoint-Online-6288296a-b6b7-4ea4-b4ed-c297bf833e30#ID0EAABAAA=Office_365_Groups

image026

image003

If an external user attempted to access the Office 365 Group when external sharing was disabled, they would receive the following message.

image023

Restricting who can share outside the organization using the SharePoint admin center

image001

As an IT Pro, you can control who can share outside the organization with authenticated external users to an Office 365 security group using the SharePoint admin center. This configuration setting is located under “sharing” in the SharePoint admin center in Office 365. In the example below, Office 365 users in the O365-ShareExternalAuthenticated security group can share content outside the organization.

image028

image005

With this configuration in place, Office 365 users who are not a member of the O365-ShareExternalAuthenticated security group would receive the following message when trying to share content with external users.

image029

Restricting who can share anonymous links using the SharePoint admin center

image001

As an IT Pro, you can control who can share outside the organization with authenticated external users AND using anonymous links to an Office 365 security group using the SharePoint admin center. This configuration setting is located under “sharing” in the SharePoint admin center in Office 365. In the example below, Office 365 users in the O365-ShareExternalAuthenticatedAnonymous security group can share content outside the organization including sharing anonymous links.

image030

image005

With this configuration in place, Office 365 users who are not a member of the O365-ShareExternalAuthenticatedAnonymous security group would not be able to share with external users OR select “Anyone” to send anonymous links. The “Anyone” option is grayed out in the screenshot to the right.

image031

image001

You can use Get-SPOSite | ft URL,Sharing* cmdlet to review the external sharing configuration for each Office 365 Group. Remember each Office 365 Group has an underlying SharePoint site collection which has individual configuration settings. In the lab, the Office 365 Group I was using for testing was configured for the default “ExistingExternalUserSharingOnly”.  To allow for anonymous links sharing, the Set-SPOSite cmdlet was used to update the sharing capability of the individual Office 365 Group or the SharePoint site collection (see screenshot below).

image032

Restricting guest access to external domains using PowerShell

image001

As an IT Pro, you can allow or block guest users from a specific external domain. For example, let’s say your business (Contoso) has a partnership with another business (Fabrikam). You can add Fabrikam to the allow list so your users can add those guests to their groups. Or, let’s say you want to block personal email address domains. You can set up a block list that contains domains like Gmail.com or Yahoo.com.  In the example below, a guest with a @yahoo.com email address cannot be added to Office 365 Groups. NOTE: This list doesn’t apply to already added guest members, this will be enforced for all the guests added after the list is setup. However, you can remove them through the script.

image033

image005

Using the Office 365 Group block list, Office 365 users would not be able to add a guest user with a @yahoo.com email address as indicated in the screenshot below.

 

image035

Hiding Office 365 Groups from the directory

image005

By default, Office 365 Groups include a shared Exchange Online mailbox which is visible in the Exchange Online Global Address List (GAL). Office 365 Group members can access their Office 365 Groups via Outlook on the Web. Additionally, all Office 365 Groups are displayed in the directory by default.

image037

 

image001

As an IT Pro, you can control which Office 365 Groups are displayed in the Exchange Online GAL. Since the Office 365 Group includes a shared mailbox, you can leverage the Get-UnifiedGroup cmdlet in Exchange Online PowerShell to hide certain Office 365 Groups from the directory. In the example, below the “Microsoft Planner plan” Office 365 Group has been hidden from the GAL.
NOTE: You should be cautious when leveraging this setting as you could affect mail delivery if Office 365 users are using the directory to address Office 365 Groups.

image039

image005

Office 365 Group members can still access their Office 365 Groups via Outlook on the Web, however the “Microsoft Planner plan” Office 365 group is hidden from the GAL.

 

image041

Office 365 Group Cleanup

There is a recently released feature called Office 365 Group expiration which provides administrators and users a way to clean up unused or “expired” groups. Expiration policies can help them remove inactive groups from their tenant automatically with an approval workflow. When a group expires it is “soft-deleted” which means it can still be recovered for up to 30 days. This feature is fairly new and a bit limited at this point in time. It would be nice if Microsoft would have the option to trigger expiration based upon inactivity.

O365GroupExpiration

You can find more information about the Office 365 Group expiration feature at:

https://support.office.com/en-us/article/Office-365-Group-Expiration-Policy-8d253fe5-0e09-4b3c-8b5e-f48def064733

However, I did find this useful script on the TechNet gallery which reports on inactivity of Office 365 Groups. The information provided in this report could be used to determine which Office 365 Groups are inactive and expire them using the Group expiration feature.

https://gallery.technet.microsoft.com/Check-for-obsolete-Office-c0020a42

Summary

In this article, we covered administration, securing external access, and other methods to control digital debris for Office 365 Groups. As you can see, IT Pros have some administrative options available for controlling Office 365 Groups. Microsoft continues to make improvements in the administrative options available for Office 365 Groups including the applications which leverage their foundation.

Microsoft is currently working on an Azure Active Directory Premium (P1) feature called Office 365 Groups Naming Policy which enables administrators to enforce a consistent naming strategy for O365 groups created by users in the organization. It helps identify the function or membership, geographic region, who created the group and helps categorize groups in GAL. Myself along with many of our customers are looking forward to this feature release.

For more information on Office 365 Groups Naming Policy, please visit:

https://support.office.com/en-us/article/Office-365-Groups-Naming-Policy-6ceca4d3-cad1-4532-9f0f-d469dfbbb552

Thanks for tuning in and please let me know if you have any questions, comments or if you would like more information on administration of Office 365 Groups. My next planned blog is on administration of Microsoft Teams so stayed tuned!

UPN != Email – Office 365 User Experience

Whether you are a customer who already has Office 365 workloads or you plan to introduce Office 365 workloads into your business, you may be faced with some questions surrounding the Office 365 login.

Are you planning to leverage directory synchronization to synchronize on-premises Active Directory with Office 365? Do you desire a hybrid configuration with either Exchange Online (EXO) or Skype for Business Online (SfBO)?

If you answered “Yes” to either of these questions, there is a more challenge dilemma for many customers using the User Principal Name (UPN) to authenticate to on-premises workloads. By default, the on-premises UPN determines the Office 365 login and SfBO SIP address.

Does the Office 365 login name need to match the primary email address for all users?

The answer is “it should” or you might introduce some heartache for yourself, IT and help desk staff and even worse, the end-user population. The Microsoft best practice can be summarized below for an optimal end-user experience:

– The Office 365 login or UPN should match the primary email address
– The SfBO login or SIP name should match the UPN

Thus, UPN = Email = SIP.

Here is a sample table of the optimal configuration:

2017-06-06 11_20_50-Office 365 UPN ne Email - The End-User Experience.htm - Word

Alright, I get the picture. But what if the on-premises UPN cannot be changed to match the primary SMTP address due to a technical limitation or integration with a third-party application?

Great question. Fortunately, there are some options. One of those options is Office 365 Alternate ID which is supported in hybrid configurations but not recommended. In this article, we will focus on the end-user experience when the on-premises UPN doesn’t match the primary email address in a standard hybrid configuration. This should help you understand the impact to the end-user population and whether you should consider other options. We’ll cover Office 365 Alternate ID in a future article.

For this simulated scenario, the following table represents the configuration:

2017-06-06 11_21_41-Office 365 UPN ne Email - The End-User Experience.htm - Word

All desktop application testing was conducted on a domain-joined workstation with the latest Office ProPlus applications. The on-premises Exchange and EXO were configured in a hybrid Exchange deployment. On-premises Lync/Skype was not included in this simulation. Azure AD Connect was configured for password synchronization. All mobile application testing was conducted on an iPhone (iOS device).

Office 365 ProPlus Sign-in and Activation

Office 365 ProPlus is a subscription-based license in Office 365 and requires the user provides their sign-in to activate the Office suite. This also provides access to Office files stored in their OneDrive for Business personal share or SharePoint Online.

The subscription-based activation process checks in with the Office licensing service daily which requires Internet connectivity. If a computer goes offline for more than 30 days, the activation process is triggered requiring the user to sign-in again to activate.

In the example below, the sign-in dialog asks the user for their email address.

image006

Here is the failed attempt to sign-in with the email address:

image007

Here is the second successful attempt where the user is required to change the email address to their Office 365 login:

image008

Office 365 End-User Impact: The initial dialog asks for the user’s email address to sign-in and activate Office. Users must be educated to recognize when to use their Office 365 login or their Office 365 email address.

Outlook Profile Creation

During the initial launch of Outlook on a fresh Windows profile, Outlook automatically configures the required settings to connect to the EXO mailbox. This requires authentication to EXO web services.

Typically, this is only required when on-boarding a new user or when the Outlook profile is recreated due to corruption, upgrade/swap out of computer.

The email address is automatically populated for a domain-joined workstation where a user is logged in.

image010

Since the user is logged into the workstation, the UPN is automatically populated but differs from the email address. Clicking Remember my credentials will suppress authentication prompts until the user’s password is changed.

image011

Office 365 End-User Impact: So long as the computer is domain-joined, the UPN should be populated automatically. In many cases, users are accustomed to the DOMAIN\Username format which won’t work for EXO mailboxes. Users must be educated to recognize when to use their Office 365 login or their Office 365 email address to login to their mailbox.

Skype for Business

By default, the primary SIP address for SfBO is the Office 365 UPN. The primary SIP address should match the primary SMTP address as this is the address users would want to use for federation.

Here is the failed attempt to sign-in with the email address:

image012

Here is the second successful attempt where the user is required to change the email address to their Office 365 login:

image013

image014

Office 365 End-User Impact: Once the user attempts to sign-in with their email address, the Skype for Business client stores the last username value so users must manually update the username to the Office 365 login under Options. Users must be educated to recognize when to use their Office 365 login or their Office 365 email address.

Office 365 Portal Login

When logging into the Office 365 portal, Outlook.com, and other Microsoft cloud workloads, the Office 365 login is required, not the email address.

In the example below, the sign-in dialog asks for the username in the format of someone@example.com:

image015

Here is the failed attempt to sign-in with the email address:

image016

Here is the second successful attempt where the user is required to change the email address to their Office 365 login:

image017

Office 365 End-User Impact: The initial dialog asks the user for a username in the format of someone@example.com which might be mistaken for the email address. Users must be educated to recognize when to use their Office 365 login or their Office 365 email address.

Exchange ActiveSync (EAS)

For mobile devices using native mail applications to connect to EXO via EAS, the auto-configure wizard normally completes when users specify their email address and password. Since the UPN is different from the email address, there would be an additional wizard screen which would ask for both the email address and the UPN or Username for EXO (see screenshots below):

image019

Office 365 End-User Impact: For EAS configuration, the wizard screen on the right above requires the user to provide both their Office 365 email address and login. Users must be educated to recognize when to use their Office 365 login or their Office 365 email address. Typically, this is only required when on-boarding a new user or when the EAS profile is recreated due to lost device, upgrade/swap-out of mobile device.

Mobile Office Applications

Office applications such as Outlook, Word, Excel, OneDrive, Skype for Business, PowerPoint, etc. are available as mobile applications. You must sign-in to these applications to access data in the Microsoft cloud.

In the example below, the sign-in dialog asks the user for their email address by default:

image020

Here is the failed attempt to sign-in with the email address:

image021

Here is the second successful attempt where the user is required to change the email address to their Office 365 login:

image022

Office 365 End-User Impact: The initial dialog asks for the user’s email address to sign-in to Office mobile applications. Users must be educated to recognize when to use their Office 365 login or their Office 365 email address. This becomes an on-going issue as these mobile applications authenticate via web services are more susceptible to time outs than their desktop counterparts.

Summary

Hopefully this helps shed more light on the challenges end-users might face when the Office 365 email address (primary SMTP address) doesn’t match the Office 365 login (UPN). The major areas of concern from the findings of this article summarized below:

  • Office subscription-based activation
    • Requires the end-user “knows” they should provide their UPN rather than their email address to authenticate
  • Skype for Business
    • Default SIP address is the UPN in Office 365 (this can be changed manually)
    • Requires the end-user “knows” they should provide the UPN to authenticate
  • Office 365 web portal
    • Requires the end-user “knows” they should provide their UPN rather than their email address to authenticate
  • Exchange ActiveSync (EAS)
    • Automatic configuration of EAS profile requires input on a second screen
    • Requires the end-user “knows” they should provide their UPN rather than their email address to authenticate
  • Office mobile applications
    • Requires the end-user “knows” they should provide their UPN rather than their email address to authenticate

If you have any questions about this article or would like to discuss other options such as Office 365 Alternate ID, please feel free to contact me here.

Same email address between Office 365 plans?

Do you have both an Office 365 personal and work account?  If you are using the same email address for both services, you are probably sick and tired of seeing the following dialog:

Blog1-1

 

Microsoft provides a link at the bottom of this dialog to “Rename your personal Microsoft account” but you might be asking yourself, how is it possible to have the same email address and why should I rename my personal Microsoft account?

Even though Office 365 for home and business share the same branding, they are actually completely different back end systems.  You are basically logging into and accessing data in two different systems.  The following table from Office support actually highlights some of the key differences between the Office 365 home and business plans:

Office 365 Home Plans

Office 365 Business Plans

Licensed for home use Licensed for business use
Fixed number of users and plans include:

·       Office 365 Home

·       Office 365 Personal

·       Office 365 University

Variable number of users depending upon your needs and plans include:

·       Office 365 Business plans

·       Office 365 Enterprise plan

Users sign in using a Microsoft account, such as sue@live.com or david@outlook.com. Users sign in with a user ID which is typically their work email address, such as sue@contoso.com.
Email is accessed using a Microsoft account. Email is stored in Exchange Online and is accessed using an Office 365 work or school account.
Files are stored in the OneDrive that’s associated with the user’s Microsoft account. Files are stored in OneDrive which is associated with the user’s work or school account used to sign into Office 365 for business.

You might be thinking, it’s getting a little clearer but you haven’t completely answered the original question.  How is it possible to have the same email address both services?

Like many other services, Office 365 uses an email address to identify users during login.  Office 365 home plans allow you to use an existing email address rather than creating a new Microsoft account (@Outlook.com).  During sign-up for Office 365 home plan, you provided the same email address you are using for your Office 365 business account.  This causes all sorts of confusion when signing into Office applications, synchronizing files with OneDrive, accessing data, etc.

Why should I rename my personal Microsoft account?

If you wish to keep both your Office 365 home plan and Office 365 business plan, you can simplify your interactions with Microsoft applications, products, and services by separating your work activities from your personal activities.

Please refer to the following article for further guidance on renaming your Microsoft account:

https://support.microsoft.com/en-us/help/11545/microsoft-account-rename-your-personal-account

What if I don’t want to keep my Office 365 home plan?

If you have upgraded from an Office 365 home plan to an Office 365 business plan and you want to consolidate data of the two accounts, you would need to migrate your Office 365 home data to the Office 365 business account.

Please refer to the following article for further guidance on migrating data from Office 365 home:

https://support.office.com/en-us/article/Upgrade-Office-365-for-home-to-a-business-subscription-9322ffb8-a35d-4407-8ebe-ed6ea0859b9f?ui=en-US&rs=en-US&ad=US&fromAR=1