Something that perhaps isn’t common knowledge in the SharePoint world, is that every Office 365 tenant has an Azure instance behind it – and that if you’re doing some types of Azure stuff, sometimes you *must* use this instance. I’ve spent the last few months doing Office 365 development with some use of Azure, and this only became clear to me fairly recently. When I’ve mentioned it to other people, most have been completely unaware, and I’m not surprised when you consider that:
- There is no link from Office 365 to the Azure instance (e.g. in the Office 365 tenant admin screens)
- If you try to log-in to Azure as an Office 365 user, you initially get presented with a screen that makes you think you’ve done something wrong (as at spring 2014 time anyway)
Scenarios where you NEED to use this Azure instance
For many Azure usages (e.g. “externalizing” assets such as CSS/JS files like my team do, Azure Service Bus, Azure CDN etc.) it doesn’t matter which Azure instance you use. The most natural thing is to go the Azure Portal (https://manage.windowsazure.com) and sign-up if you don’t have a subscription already. Of course, this creates you a brand new Azure instance – and that works great for these types of scenarios. However, you’d need to use the “integrated” Azure instance for anything which needs to work with the directory of Azure AD/Office 365 users for your tenant. This could be things like:
- Implementing Azure AD authentication on an external application (e.g. a provider-hosted app, or other website), where you are aiming for some kind of Single Sign-On
- Working with some aspects of Office 365 users (e.g. the Azure AD profile which is “behind” the SharePoint Online user profile) via the Azure Graph API
- Integrating a 3rd party application which is able to use Azure AD authentication/have SSO (e.g. salesforce.com, Dynamics CRM, Dropbox for Business etc.)
- ..and many other scenarios involving identity
Accessing the Azure instance behind your Office 365 tenant
So let’s say one day you think, “I wonder how I’d get to this magical Azure instance?” Well, if you go to the Azure Portal, you’ll either see a sign-in screen asking you to enter a username to continue, or you might be auto-logged in if you have previously signed-in to the Microsoft gateway – for example, you’re already logged-in to Office 365. If you did that (even as an Office 365 tenant administrator) you’ll see this:
I don’t know about you, but my immediate reaction to that is “Whoah, obviously I shouldn’t be here logged-in as this user!” However, now is the time be brave and not flinch! Sometimes in life, it takes a valiant act of courage to push through the terrifying situations that can befall a modern-day I.T. warrior! The thing to do now is actually to click:
“Sign up for Windows Azure”
Yes, it’s counter-intuitive. As I mentioned earlier, the Azure instance already exists so why do we need to “sign-up”? Well, you just do - for now at least. I did hear a Microsoft speaker at SPC mention this experience as a side-note, and that they will probably improve things soon. The main thing to understand is that you have to supply payment details before this Azure instance can be accessed – because then it becomes a true pay-as-you-go instance.
Viewing the Azure AD directory behind your Office 365 tenant
Once you’ve gone though the sign-up process, you should be able to go into the Azure Portal (https://manage.windowsazure.com, or the new preview version https://portal.azure.com). Here, out of the all the things you can use in Azure, you’ll probably have just one thing – a Directory:
..and if you go into the Directory, you should see all your Office 365 users (including those synchronized by DirSync, if configured):
Apps which integrate with Azure AD
As I mentioned earlier, you mind yourself creating some kind of app which needs to work with Azure AD (e.g. for authentication/SSO, or some usage of the Azure AD Graph API for user records perhaps). The first step in many of these cases is to register the app in your Azure AD directory – this is done in the “Applications” area of the directory:
Other scenarios around Azure subscriptions and identities
It turns out there are quite a few permutations of starting an Azure subscription, or joining up to an existing one. One reason for this is that in the new world of Microsoft identities, it’s possible to use a Microsoft account (formerly Live ID) OR an “Organizational Account”. If you’re an Office 365 user, your Azure AD record is an Organizational Account. Personally I’m still getting my head around some of the nuances here, but Microsoft recently released this video which talks through various Azure sign-up scenarios – if you want further information, I think it’s helpful:
Using a existing Windows Azure AD Tenant with Windows Azure
2 comments:
Hi Chris, thanks for the insights on this. I went this same way a few weeks ago and also heard some side notes at SPC. We used BizTalk 2013 on premise and the SharePoint connector in order to store documents in SharePoint Online. This SharePoint connector has the option to specify ACS for authentication. You have to specify a url, client id, etc. We signed up the way you did and try to register BizTalk as an external application within Azure. However we didn't manage to successfully authenticate this way. Have you got any more details on registering an application in Azure or any other suggestions? Thanks in advance.
Robert Schouten
Wortell
Thanks for posting about this Chris. I asked our content team what exists to date on Microsoft sites and have listed some reading here for your blog readers:
Authentication and authorization using Common Consent Framework - nice explanation on how it all works
Enabling Microsoft Azure portal access to manage applications using the OAuth2 protocol - nice walk through of setup
Overview of Office 365 APIs Preview - these APIs really do make for some great new scenarios with AzureAD
Sign up for an Office 365 Developer Site - great page for getting started with Office 365 development
Again the team are looking for feedback so please feel free to reach out to them!
Post a Comment