Back

Controlling access based on role and/or location with ADFS

Access is one of those words that sounds simple but carries such farreaching implications that it must be carefully considered planned for and ma...

3 min read
Published on Dec 16, 2015
controlling-access-based-on-role-andor-location-with-adfs

“Access” is one of those words that sounds simple but carries such far-reaching implications that it must be carefully considered, planned for, and managed at all times.

Questions to Answer Before Granting Access With AD FS

When planning access to information resources, there are several questions you must answer every time someone requests access.

  • Who is requesting access?

Are you certain they are who they say they are? Many tools exist that can increase your certainty. Multi-factor Authentication (MFA) is the strategy most people often think of. Here, information received from the user’s device is added to that person’s ID and password to increase the difficulty of requesting access. The information, usually a multi-digit number, changes every minute, so the user must possess the device and be able to obtain the number when logging in.

  • What is this user’s role in the organization?

There’s more to who you are than just your name. Roles-Based Access Control (RBAC) determines what resources each user has the right to access, and whether they can just read, read and write, delete, create, and change conditions and contents of each resource. Users may inherit certain rights when they are assigned to specific groups that have specific rights assigned, making it far easier to manage more users faster and more easily.

  • Which device is this person using to access resources?

You may want to reduce or restrict user access to certain resources based on the fact that they are using a smartphone or a personally owned device.

  • Where are they physically located when trying to access resources?

Some organizations only allow people to access highly sensitive data when located within their own premises (and not from outside) or on their corporate network directly rather than connected via an external network.

  • When is the user attempting to access resources?

Some organizations restrict access to business-critical resources only during regular business hours.  Anyone trying to access those resources outside of those hours will be refused, and the attempt will be reported.

Why You Want So Much Control

There’s much more to manage than ever before, and so many bad actors trying to steal and/or damage your valuable data resources. Failure to implement granular control over who can access what, when, and from where is like giving everyone the master key to every door. You simply can’t afford to do that any longer. It’s no longer enough to simply protect at the main gate; you must protect at the door to every room in every building.

How This Control Is Provided

You exercise control over your resources through Active Directory, the core database developed by Microsoft to provide one place to identify all objects and their relationships to one another. To accommodate the growing number of organizations that want to be able to interoperate with other organizations and still maintain tight control, Microsoft added Active Directory Federation Services to enable entire domains to interact.

The key to success in managing Active Directory and its Federation Services is to exercise control at the most granular level possible while grouping objects as much as possible to achieve greater efficiency.

Active Directory Agility from Agile IT

This is one of the main reasons customers choose to partner with Agile IT. Our expertise and experience in managing Active Directory for organizations large and small enables us to deliver the kind of guidance you need when planning, executing, and managing your Active Directory environment. To learn more about controlling access to your resources based on role, location, and much more, contact Agile IT today!

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

Related Posts

Can You Meet CMMC with Google Workspace?

Can You Meet CMMC with Google Workspace?

Is Google Workspace CMMC compliant? Learn about its DFARS, NIST 800-171, and ITAR limitations and how migrating to GCC High ensures full compliance.

Mar 4, 2025
7 min read
Is Maintaining a GCC High Tenant Worth It for Non-Government

Evaluating the Need for a GCC High Tenant in Non-Government Organizations

Explore whether maintaining a GCC High tenant is necessary for organizations not involved in government work. Understand the pros and cons, costs, and compliance considerations.

Feb 25, 2025
7 min read
Top 10 Reasons to Partner with an MSP for Security and Compliance

Top 10 Reasons to Partner with an MSP for Security and Compliance

Discover why partnering with an MSP for security and compliance is critical for organizations navigating FAR CUI and CMMC requirements.

Feb 21, 2025
8 min read
DFARS Compliance in Office 365

DFARS Compliance in Office 365

Learn how Microsoft Office 365 GCC High and Azure Government help DOD contractors meet DFARS compliance. Discover the steps to protect CUI and ensure regulatory compliance with Agile IT's expertise.

Feb 13, 2025
7 min read
Understanding DFARS Compliance

DFARS Compliance: A Guide to Federal Cybersecurity Requirements

Learn about DFARS compliance and how it ensures the security of federal data. Explore key requirements, NIST 800-171 alignment, and tips for achieving compliance.

Feb 3, 2025
7 min read
Office 365 License Comparison: Business Plans Vs. E5, E3 and E1

Master Microsoft & CIS Benchmark Best Practices to Secure Your Environment

Discover how to implement Microsoft & CIS Benchmark best practices to strengthen your business security and protect your environment from evolving threats with expert guidance.

Jan 28, 2025
7 min read

Ready to Secure and Defend Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don't want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122

Secure. Defend. Thrive.

Don't want to wait for us to get back to you?

Discover more about Agile IT's range of services by reaching out

Schedule a Free Consultation