Skip to main content

Email one-time passcode (OTP) - Enable guest users without federation or registration

Nowadays, if you use Azure to run your business, there is an 80% chance of using Azure AD as the Identity and Access Management system. The strong integration with on-premises AD tenants, Google, Facebook and Azure AD B2B and Azure AD B2C makes our life much easier. 

What if you provide access to an external user that cannot be authenticated using AD, MSA (Microsoft Account) or social identity providers? Or you don't know what kind of IAM the user has.

OTP (Email one-time passcode) is your friend in this situation. The feature enables us to share resources or provide access to external users without requesting them to create an account. The only thing that the user needs is an email address and nothing more.

The one-time passcode is sent to their email address at the moment in time when they want to access the resource that you shared with them. The passcode is valid for 30 minutes and provides a valid session for the next 24 hours. If the passcode or session expires, there is no problem because the external user can request a new passcode again.


It's a great way to share resources with external users, especially when there is no federation or integration with their IAM system. The external user is added as guest to your Azure AD, and they are subject to Azure AD access policies (e.g. MFA) and can be managed directly by you. 

When OTP is active, there is a small trick. When you share a resource with an external user, you don't know if OTP will be used or not. The OTP is used if the user:

  • Don't have an MSA (Microsoft) account
  • Don't have an Azure AD account
  • No federation configured with their tenant
Because of this, when a user already used OTP and later gets an MSA, Azure AD or Ferederated account, they will still use OTP. From Azure AD, you will need to reset their redemption status to allow them to use another method. 

The excellent integration with OneDrive and SharePoint enables us to use OTP to share content with Guest users. Why? Because OneDrive and SharePoint are using Azure AD, the OTP is fully integrated (as long as your IT allows OTP (big smile).


Why you should use OPT (Email one-time passcode)?

A simple way to share content and provide access to your organization to external users that are not part of your tenant or a federated tenant. The access control it is fully managed by your organization and audited. Who, what and when can access is fully managed by IAM, as you would managed a guest user.  

Because of this, OTP can be used with success to share notes and materials after a meeting with external attendees. 



Comments

Popular posts from this blog

Windows Docker Containers can make WIN32 API calls, use COM and ASP.NET WebForms

After the last post , I received two interesting questions related to Docker and Windows. People were interested if we do Win32 API calls from a Docker container and if there is support for COM. WIN32 Support To test calls to WIN32 API, let’s try to populate SYSTEM_INFO class. [StructLayout(LayoutKind.Sequential)] public struct SYSTEM_INFO { public uint dwOemId; public uint dwPageSize; public uint lpMinimumApplicationAddress; public uint lpMaximumApplicationAddress; public uint dwActiveProcessorMask; public uint dwNumberOfProcessors; public uint dwProcessorType; public uint dwAllocationGranularity; public uint dwProcessorLevel; public uint dwProcessorRevision; } ... [DllImport("kernel32")] static extern void GetSystemInfo(ref SYSTEM_INFO pSI); ... SYSTEM_INFO pSI = new SYSTEM_INFO(

Azure AD and AWS Cognito side-by-side

In the last few weeks, I was involved in multiple opportunities on Microsoft Azure and Amazon, where we had to analyse AWS Cognito, Azure AD and other solutions that are available on the market. I decided to consolidate in one post all features and differences that I identified for both of them that we should need to take into account. Take into account that Azure AD is an identity and access management services well integrated with Microsoft stack. In comparison, AWS Cognito is just a user sign-up, sign-in and access control and nothing more. The focus is not on the main features, is more on small things that can make a difference when you want to decide where we want to store and manage our users.  This information might be useful in the future when we need to decide where we want to keep and manage our users.  Feature Azure AD (B2C, B2C) AWS Cognito Access token lifetime Default 1h – the value is configurable 1h – cannot be modified

ADO.NET provider with invariant name 'System.Data.SqlClient' could not be loaded

Today blog post will be started with the following error when running DB tests on the CI machine: threw exception: System.InvalidOperationException: The Entity Framework provider type 'System.Data.Entity.SqlServer.SqlProviderServices, EntityFramework.SqlServer' registered in the application config file for the ADO.NET provider with invariant name 'System.Data.SqlClient' could not be loaded. Make sure that the assembly-qualified name is used and that the assembly is available to the running application. See http://go.microsoft.com/fwlink/?LinkId=260882 for more information. at System.Data.Entity.Infrastructure.DependencyResolution.ProviderServicesFactory.GetInstance(String providerTypeName, String providerInvariantName) This error happened only on the Continuous Integration machine. On the devs machines, everything has fine. The classic problem – on my machine it’s working. The CI has the following configuration: TeamCity .NET 4.51 EF 6.0.2 VS2013 It see