{"id":348,"date":"2023-03-20T09:40:42","date_gmt":"2023-03-20T16:40:42","guid":{"rendered":"https:\/\/devblogs.microsoft.com\/identity\/?p=348"},"modified":"2024-02-20T08:48:23","modified_gmt":"2024-02-20T16:48:23","slug":"how-the-microsoft-identity-platform-helps-developers-manage-identity-risk","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/identity\/how-the-microsoft-identity-platform-helps-developers-manage-identity-risk\/","title":{"rendered":"How the Microsoft identity platform helps developers manage identity risk"},"content":{"rendered":"<p>Our vision for the Microsoft identity platform is to create a thriving developer and app ecosystem that makes securing identities easy. In fact, over <a href=\"https:\/\/developer.microsoft.com\/identity\">one million applications<\/a> use our platform, performing over eight billion authentications per day. We combine this with the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/?p=125648\">65 trillion signals<\/a> that Microsoft Security processes each day to help us identify risky users, risky sign ins and risky workload identities \u2013 and we use this data to make your applications more secure.<\/p>\n<p>In this blog I share how our platform enables developers to protect their users and apps without being identity or security experts. I will also share how developers can take advantage of our identity protection APIs to enhance their own product.<\/p>\n<h2>An overview of identity risk in your applications<\/h2>\n<p>A strong identity platform should help developers minimize identity and access management related vulnerabilities and respond to suspicious user account activity, for example, by alerting you if a user account is likely compromised. Identity related attacks are common &#8211; Microsoft sees <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2023\/01\/09\/microsoft-entra-5-identity-priorities-for-2023\/\">1,287 password attacks every second<\/a>.<\/p>\n<p>On our Identity platform, one way we deal with identity risk is through <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/identity-protection\/concept-identity-protection-risks\">Azure AD Identity Protection<\/a>, which draws upon the wealth of signals and intelligence we collect to detect and remediate risk. As depicted in the infographic below, the heart of identity protection is the aggregation of signals that power our risk engine. Our data science team creates heuristic-based detections that integrate into our machine learning models for best-in-class risk detection. We also integrate signals from security researchers within Microsoft, our customers, partners, and law enforcement.<\/p>\n<p>For example, if a user logs in from a new IP address we can check if that IP address is associated with any known attackers, or if the location is suspiciously far away from previous login locations (atypical travel), the account will be flagged. These are just a couple examples of the many types of <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/identity-protection\/concept-identity-protection-risks#risk-types-and-detection\">risk detections<\/a>.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/azure-ad-identity-protection.png\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/azure-ad-identity-protection.png\" alt=\"Image azure ad identity protection\" width=\"936\" height=\"509\" class=\"alignnone size-full wp-image-379\" srcset=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/azure-ad-identity-protection.png 936w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/azure-ad-identity-protection-300x163.png 300w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/azure-ad-identity-protection-768x418.png 768w\" sizes=\"(max-width: 936px) 100vw, 936px\" \/><\/a><\/p>\n<h2>The Microsoft authentication library (MSAL) makes identity protection easy<\/h2>\n<p>The core of our developer platform is the <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/develop\/msal-overview\">Microsoft Authentication Library<\/a> (MSAL). The Microsoft Authentication Library (MSAL) enables developers to implement user sign-in and protect sensitive resources. To sign a user in, your application will ask Azure AD for a security token which it will then use to access resources. As part of this process, Azure AD will check to see if there is any risk related to this user and can require extra steps or block authentication if necessary.<\/p>\n<p>That means that our platform\u2019s Identity risk protections are built in to our developer tooling. To minimize your Identity risk, you can use our latest <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/develop\/reference-v2-libraries\">MSAL libraries<\/a> to implement authentication and authorization. That\u2019s it. We have made using identity protection as simple as possible.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/conceptual-conditional-access-process-flow.png\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/conceptual-conditional-access-process-flow.png\" alt=\"Conceptual Conditional Access process flow\" width=\"884\" height=\"359\" class=\"size-full wp-image-349\" srcset=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/conceptual-conditional-access-process-flow.png 884w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/conceptual-conditional-access-process-flow-300x122.png 300w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/conceptual-conditional-access-process-flow-768x312.png 768w\" sizes=\"(max-width: 884px) 100vw, 884px\" \/><\/a><\/p>\n<h2>Using Microsoft Graph for deeper integrations<\/h2>\n<p>In addition to the built in capabilities that you get automatically, we have made it easy to programmatically interface with Azure AD via <a href=\"https:\/\/learn.microsoft.com\/graph\/overview\">Microsoft Graph<\/a> for more in-depth integration with risk. The <a href=\"https:\/\/learn.microsoft.com\/graph\/api\/resources\/identityprotection-overview?view=graph-rest-1.0\">Microsoft Graph Identity Protection APIs<\/a> can be used to analyze user risk, identify risk anomalies, and contribute to creating a secure ecosystem by sharing risk intelligence between Microsoft and your own application. You can try out the APIs for yourself using the <a href=\"https:\/\/developer.microsoft.com\/graph\/graph-explorer\">Graph Explorer<\/a> tool.<\/p>\n<p>Independent security vendors are already making use of these APIs to enhance the value of their products by consuming and sharing risk signals from our Identity platform. For example, some of the vendors that have integrated with our Identity Protection APIs are shown below:<\/p>\n<div class=\"container\">\n<div class=\"row h-100\">\n<div class=\"col-4 align-self-center\">\n      <a href=\"https:\/\/www.authomize.com\/partners\/strategic-partners\/microsoft-authomize\/\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/shape-description-automatically-generated.png\" alt=\"Authomize logo\" width=\"150\" height=\"122\" class=\"size-full wp-image-350\" \/><\/a>\n    <\/div>\n<div class=\"col-4 align-self-center\">\n      <a href=\"https:\/\/developers.cloudflare.com\/cloudflare-one\/tutorials\/azuread-risky-users\/\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/a-picture-containing-text-clipart-description-au.jpeg\" alt=\"Cloudflare logo\" width=\"428\" height=\"62\" class=\"size-full wp-image-403\" srcset=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/a-picture-containing-text-clipart-description-au.jpeg 428w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/a-picture-containing-text-clipart-description-au-300x43.jpeg 300w\" sizes=\"(max-width: 428px) 100vw, 428px\" \/><\/a>\n    <\/div>\n<div class=\"col-4 align-self-center\">\n      <a href=\"https:\/\/support.knowbe4.com\/hc\/en-us\/articles\/9743544197395-Microsoft-Azure-Active-Directory-Identity-Protection-Integration-Guide-for-SecurityCoach\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-5.png\" alt=\"KnowBe4 Logo\" width=\"367\" height=\"137\" class=\"size-full wp-image-352\" srcset=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-5.png 367w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-5-300x112.png 300w\" sizes=\"(max-width: 367px) 100vw, 367px\" \/><\/a>\n    <\/div>\n<\/p><\/div>\n<div class=\"row h-100\">\n<div class=\"col-4 align-self-center\">\n      <a href=\"https:\/\/oort.io\/technology-partners\/azure-ad?hsCtaTracking=fd0a7afd-9829-431f-a238-eaabfc8c89d7%7Cece3a071-96eb-4e66-8e01-f4799a4c9bd3\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/logo-icon-description-automatically-generated.png\" alt=\"Oort logo\" width=\"306\" height=\"118\" class=\"size-full wp-image-353\" srcset=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/logo-icon-description-automatically-generated.png 306w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/logo-icon-description-automatically-generated-300x116.png 300w\" sizes=\"(max-width: 306px) 100vw, 306px\" \/><\/a>\n    <\/div>\n<div class=\"col-4 align-self-center\">\n      <a href=\"https:\/\/www.redvector.ai\/about\/pr-docs\/press-release-101222-Final.pdf\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-7.png\" alt=\"Red Vector Logo\" width=\"456\" height=\"113\" class=\"size-full wp-image-354\" srcset=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-7.png 456w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-7-300x74.png 300w\" sizes=\"(max-width: 456px) 100vw, 456px\" \/><\/a>\n    <\/div>\n<div class=\"col-4 align-self-center\">\n      <a href=\"https:\/\/www.sailpoint.com\/identity-library\/sailpoint-microsoft-azure-ad-high-risk-user-integration\/\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-8.png\" alt=\"SailPoint Logo\" width=\"264\" height=\"94\" class=\"size-full wp-image-355\" \/><\/a>\n    <\/div>\n<\/p><\/div>\n<div class=\"row h-100\">\n<div class=\"col-4 align-self-center\">\n      <a href=\"https:\/\/saviynt.com\/achieving-zero-trust-in-a-multi-dimensional-risk-environment\/\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-9.png\" alt=\"Saviynt logo\" width=\"291\" height=\"93\" class=\"size-full wp-image-356\" \/><\/a>\n    <\/div>\n<div class=\"col-4 align-self-center\">\n      <a href=\"https:\/\/www.tanium.com\/resources\/tanium-and-azure-active-directory-integration\/\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/logo-company-name-description-automatically-gene.png\" alt=\"Tanium logo\" width=\"482\" height=\"271\" class=\"size-full wp-image-358\" srcset=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/logo-company-name-description-automatically-gene.png 482w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/logo-company-name-description-automatically-gene-300x169.png 300w\" sizes=\"(max-width: 482px) 100vw, 482px\" \/><\/a>\n    <\/div>\n<div class=\"col-4 align-self-center\">\n      <a href=\"https:\/\/docs.netskope.com\/en\/azure-ad-plugin-for-user-risk-exchange.html\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-11.png\" alt=\"Netskope logo\" width=\"2500\" height=\"392\" class=\"size-full wp-image-410\" srcset=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-11.png 2500w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-11-300x47.png 300w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-11-1024x161.png 1024w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-11-768x120.png 768w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-11-1536x241.png 1536w, https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2023\/03\/word-image-348-11-2048x321.png 2048w\" sizes=\"(max-width: 2500px) 100vw, 2500px\" \/><\/a>\n    <\/div>\n<\/p><\/div>\n<\/div>\n<p>\u00a0<\/p>\n<h2>Conclusion<\/h2>\n<p>We know cybersecurity is a tricky business. Typically, developers are not trained as security experts, and yet they are responsible for building secure, resilient and robust applications and services that protect their company and their users. By developing with our SDKs and using Azure AD Identity Protection, you will be able to leverage our learnings and increase the ability of your application to detect and remediate compromised identities. Together we can reduce the impact of bad actors on all of our businesses.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our vision for the Microsoft identity platform is to create a thriving developer and app ecosystem that makes securing identities easy. In fact, over one million applications use our platform, performing over eight billion authentications per day. We combine this with the 65 trillion signals that Microsoft Security processes each day to help us identify [&hellip;]<\/p>\n","protected":false},"author":114481,"featured_media":379,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[40],"tags":[17,16,47,50,5,4],"class_list":["post-348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","tag-customer-identity","tag-entra","tag-external-id","tag-identity","tag-identity-protection","tag-security"],"acf":[],"blog_post_summary":"<p>Our vision for the Microsoft identity platform is to create a thriving developer and app ecosystem that makes securing identities easy. In fact, over one million applications use our platform, performing over eight billion authentications per day. We combine this with the 65 trillion signals that Microsoft Security processes each day to help us identify [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/posts\/348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/users\/114481"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/comments?post=348"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/posts\/348\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/media\/379"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/media?parent=348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/categories?post=348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/tags?post=348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}