Back

Controlling access based on role and/or location with ADFS

Access is one of those words that sounds simple but carries such farreaching implications that it must be carefully considered planned for and ma...

3 min read
Published on Dec 16, 2015
Controlling access based on role and/or location with ADFS

“Access” is one of those words that sounds simple but carries such far-reaching implications that it must be carefully considered, planned for, and managed at all times.

Questions to Answer Before Granting Access With AD FS

When planning access to information resources, there are several questions you must answer every time someone requests access.

  • Who is requesting access?

Are you certain they are who they say they are? Many tools exist that can increase your certainty. Multi-factor Authentication (MFA) is the strategy most people often think of. Here, information received from the user’s device is added to that person’s ID and password to increase the difficulty of requesting access. The information, usually a multi-digit number, changes every minute, so the user must possess the device and be able to obtain the number when logging in.

  • What is this user’s role in the organization?

There’s more to who you are than just your name. Roles-Based Access Control (RBAC) determines what resources each user has the right to access, and whether they can just read, read and write, delete, create, and change conditions and contents of each resource. Users may inherit certain rights when they are assigned to specific groups that have specific rights assigned, making it far easier to manage more users faster and more easily.

  • Which device is this person using to access resources?

You may want to reduce or restrict user access to certain resources based on the fact that they are using a smartphone or a personally owned device.

  • Where are they physically located when trying to access resources?

Some organizations only allow people to access highly sensitive data when located within their own premises (and not from outside) or on their corporate network directly rather than connected via an external network.

  • When is the user attempting to access resources?

Some organizations restrict access to business-critical resources only during regular business hours.  Anyone trying to access those resources outside of those hours will be refused, and the attempt will be reported.

Why You Want So Much Control

There’s much more to manage than ever before, and so many bad actors trying to steal and/or damage your valuable data resources. Failure to implement granular control over who can access what, when, and from where is like giving everyone the master key to every door. You simply can’t afford to do that any longer. It’s no longer enough to simply protect at the main gate; you must protect at the door to every room in every building.

How This Control Is Provided

You exercise control over your resources through Active Directory, the core database developed by Microsoft to provide one place to identify all objects and their relationships to one another. To accommodate the growing number of organizations that want to be able to interoperate with other organizations and still maintain tight control, Microsoft added Active Directory Federation Services to enable entire domains to interact.

The key to success in managing Active Directory and its Federation Services is to exercise control at the most granular level possible while grouping objects as much as possible to achieve greater efficiency.

Active Directory Agility from Agile IT

This is one of the main reasons customers choose to partner with Agile IT. Our expertise and experience in managing Active Directory for organizations large and small enables us to deliver the kind of guidance you need when planning, executing, and managing your Active Directory environment. To learn more about controlling access to your resources based on role, location, and much more, contact Agile IT today!

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

Related Posts

Azure Migration vs AWS Migration Key Differences

Comparing Azure Migration and AWS Migration Key Differences in Cloud Strategy

Comparing Azure and AWS for cloud migration? Learn the key differences in pricing, security, tools, and performance to choose the right platform for your business.

Jun 18, 2025
8 min read
Benefits and Challenges of Azure Cloud Migration

Key Benefits and Challenges of Migrating to Microsoft Azure

Migrating to Microsoft Azure offers scalability and security, but it comes with challenges. Explore the key benefits and hurdles of Azure cloud migration.

Jun 17, 2025
10 min read
Who Needs to Comply with CMMC Regulations?

Who Needs to Follow DoD Cybersecurity Requirements for CMMC Compliance

CMMC regulations apply to defense contractors, subcontractors, and suppliers handling DoD information. Find out who must comply and what certification level is required.

Jun 17, 2025
6 min read
What’s the Real Cost of CMMC Compliance?

The Real Cost of CMMC: Catching Up on What You Were Already Supposed to Be Doing

CMMC isn’t introducing new rules, it’s enforcing what should already be in place. Learn what’s really driving the cost of CMMC compliance.

Jun 16, 2025
4 min read
How to Meet ITAR Compliance Requirements in Office 365

How to Meet ITAR Compliance Requirements in Office 365

Need to meet ITAR compliance in the Microsoft cloud? Learn why GCC High is required for Office 365, what the regulations demand, and how to secure export-controlled data.

Jun 12, 2025
6 min read
Are You Ready? Understanding CMMC Controls Prohibited from POA&Ms

Are You Ready? Understanding CMMC Controls Prohibited from POA&Ms

CMMC Level 2 requires full implementation of specific controls. Learn which ones cannot be deferred in a POA&M and how to prepare for assessment success.

Jun 11, 2025
7 min read

Ready to Secure and Defend Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don't want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122

Secure. Defend. Thrive.

Don't want to wait for us to get back to you?

Discover more about Agile IT's range of services by reaching out

Schedule a Free Consultation