Azure AD Application Proxy with a Claims Aware Web App – Part 6

Objective: Login with an Azure AD account

Test Login scenario with john@spb2b.onmicrosoft.com

Go to myapps.microsoft.com
Azure AD Azure Application Proxy with SharePoint Server 2013-2016 Blog Part 6-1

You will notice the published SharePoint site.Azure AD Azure Application Proxy with SharePoint Server 2013-2016 Blog Part 6-2

Click on Roy Kim’s SharePointAzure AD Azure Application Proxy with SharePoint Server 2013-2016 Blog Part 6-3

The user is authenticated but not authorized to the SharePoint site.

Azure AD Azure Application Proxy with SharePoint Server 2013-2016 Blog Part 6-4

So, what’s the issue?

The UPN has to be mapped between the Azure AD account and the on-premises AD account. The Azure AD account’s domain is spb2b.onmicrosoft.com. Ideally, you would go by the organization’s custom domain. Since my lab’s domain is contoso.com and I can’t take ownership of it and verify in Azure AD, I have to settle with spb2b.onmicrosoft.com

Azure AD Azure Application Proxy with SharePoint Server 2013-2016 Blog Part 6-5

I have also added Alternative UPN suffixes for rkim.ca for user accounts ending with @rkim.ca

Go to Active Directory Users and Computers
Find the user to login with and right click on its properties.
Change to the new UPN suffix.

Azure AD Azure Application Proxy with SharePoint Server 2013-2016 Blog Part 6-6

Attempt to sign in into SharePoint Application.
Go to: https://roykimspublishedsharepoint-spb2b.msappproxy.net
Get redirected to sign in page

Azure AD Azure Application Proxy with SharePoint Server 2013-2016 Blog Part 6-7

Login with john@spb2b.onmicrosoft.com

Azure AD Azure Application Proxy with SharePoint Server 2013-2016 Blog Part 6-8

Success!

Can user accounts get added into Azure AD that does NOT exist in the on-premises AD?

It is important to understand that Azure AD Connect synchronizes account only one way from AD to Azure AD. What I was hoping for from Azure AD Connect was some user write-back capability. The user writes back is not currently supported as noted in this article. It would have been nice if when I create a user account in Azure AD, then that account gets created in the on-premises AD. Then a SharePoint site admin can add the AD user to the site with appropriate permissions. But this is not a supported scenario.

To recap, I have demonstrated the authentication into SharePoint with an Azure AD Account. However, to add any external accounts, the caveat is to add the account into your on-premises AD with the supported alternate UPN suffix. This likely wouldn’t be practical in real-world enterprise scenarios, but maybe perhaps so in an isolated extranet environment.

I would recommend this type of solution if you want to simply publish on-premises applications such as SharePoint Server without the need of Windows Server WAP and ADFS.

I hope this blog series demonstrated my journey of configuration details and what works or wouldn’t work to support Azure AD login using Azure Application Proxy for an internet facing SharePoint site.

An alternative approach with some advantages would be SAML claims-based authentication with Azure AD. This can potentially be future blog article as I wait for SAML 1.1 support in Azure AD since Azure Control Services is deprecated as of summer 2017 which supported SAML 1.1 token conversion for SharePoint support.

References

https://docs.microsoft.com/en-us/azure/active-directory/application-proxy-enable-remote-access-sharepoint

https://blogs.technet.microsoft.com/applicationproxyblog/2016/04/06/enable-remote-access-to-sharepoint-2013-with-azure-ad-app-proxy/

Add User Principal Name Suffixes
https://technet.microsoft.com/en-us/library/cc772007(v=ws.11).aspx

Azure AD vs Azure AD B2C vs Azure AD B2B
https://stackoverflow.com/questions/39271230/azure-ad-vs-azure-ad-b2c-vs-azure-ad-b2b

What is the Access Panel?
https://docs.microsoft.com/en-us/azure/active-directory/active-directory-saas-access-panel-introduction

8 thoughts on “Azure AD Application Proxy with a Claims Aware Web App – Part 6

  1. Pingback: Azure AD Azure Application Proxy with SharePoint Server 2013/2016 Blog Part 5 – Roy Kim on SharePoint, Azure, BI, Office 365

  2. Pingback: Azure AD Azure Application Proxy with SharePoint Server 2013/2016 Blog Part 4 – Roy Kim on SharePoint, Azure, BI, Office 365

  3. Pingback: Azure AD Azure Application Proxy with SharePoint Server 2013/2016 Blog Part 3 – Roy Kim on SharePoint, Azure, BI, Office 365

  4. Pingback: Azure AD Azure Application Proxy with SharePoint Server 2013/2016 Blog Part 1 – Roy Kim on SharePoint, Azure, BI, Office 365

  5. Pingback: Azure AD Azure Application Proxy with SharePoint Server 2013/2016 Blog Part 2 – Roy Kim on SharePoint, Azure, BI, Office 365

  6. Nam Truong

    Hi Roy Kim,

    Thank you so much for your great articles. These are the most detailed and easy-to-understand documents regarding to AzureAD Application Proxy ever.
    What I have been expecting so far is that Azure AD Proxy could be a solution for customer access to On-Premise SharePoint Farm by using AzureAD accounts. Unfortunately, after reading through this part-6, we might need to consider finding some other solution. Our company policy requires that customer should not be provided accounts in Local AD-which Azure AD Application Proxy currently can not support.
    So do you have any suggestion for us?

    Your help would be greatly appreciated.

    Thank you so much.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s