Certified: March 15, 2018
When integrated, Microsoft Office 365 end users must authenticate with RSA SecurID Access to sign in. Microsoft Office 365 can integrate using WS-Federation SSO Agent, SAML SSO Agent, or SAML relying party.
The available features and limitations are dependent on the specific Office 365 application and on whether it is integrated using SAML (SSO Agent or relying party) or WSFederation.
|Client configuration required|
|Authentication not supported|
|Access policies and additional authentication supported|
|Access policies supported but additional authentication not supported|
SSO Agent integrations use SAML 2.0 or WS-Fed technologies to direct users’ web browsers to Cloud Authentication Service for authentication. SSO Agents also provide single sign-on to other applications using the RSA Application Portal.
Relying party integrations use SAML 2.0 to direct users’ web browsers to Cloud Authentication Service for authentication.
This section shows all of the supported features by integration type and by RSA SecurID Access component. Use this information to determine which integration type and which RSA SecurID Access component your deployment will use. The next section in this guide contains the steps to integrate RSA SecurID Access with Microsoft Office 365 for each integration type.
Microsoft Office 365 Integration with RSA Cloud Authentication Service
|Authentication Methods|| |
Microsoft Office 365 Integration with RSA Authentication Manager
|Authentication Methods|| |
|n/t||Not yet tested or documented, but may be possible|
The following links provide instructions on how to integrate Microsoft Office 365 with RSA SecurID Access.
This document is not intended to suggest optimum installations or configurations. It assumes that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products in order to install the required components. All RSA SecurID Access components must be installed and working prior to the integration.
The following links provide information on Office 365 prerequisites to integrate with RSA SecurID Access. Some or all of these prerequisites may already be met if your organization is already using Office 365.
- Enable Tenant for Modern Authentication
- Configure Office 365 with Federated Domain
- Configure Azure Active Directory Sync
WS-Fedederation SSO Agent
Allow or block clients that do not support modern authentication
Issue: Clients, such as Microsoft Office desktop applications that do not support modern authentication will fail authentication if using a policy that requires additional authentication.
Resolution: Configure and apply an access policy that allows or denies clients that does not support modern authentication and require additional authentication for clients that do.
The following clients will have MSOIDCRL in User Agent string:
The following clients will have null in User Agent string:
- Active Sync clients
This example policy allows access for all clients that do not support modern authentication, and requires additional authentication with low assurance level for clients that do.
Office 2013 rich clients do not prompt for credentials
Issue: A domain-joined user using a rich client will initially login, but if the user signs out of the rich client, they won’t get prompt to sign-in.
Resolution: Add a new DWORD value to the registry NoDomainUser and set the value to 1.
For full details, refer to the following link.
Sign-in error when identity routers are behind a load balancer
Issue: Error when accessing Office 365 applications:
Sorry but we're having trouble signing you in.
AADSTS20012: An error occurred when we tried to process a WS-Federation message. The message was invalid.
Cause: When multiple identity routers are configured behind a load balancer, internal identity router traffic can get sent to the load balancer and then on to a different identity router. This loss of session persistence can cause authentication failure.
Resolution: Create static DNS entries to map the load balancer hostname to each identity router proxy IP address:
For each identity router:
- Edit and go to the Settings tab.
- Create a static DNS entry specifying the identity router's proxy interface IP address and the load balancer's DNS hostname.
- Publish the changes.
Reference Step 13 of Add an Identity Router Using the Cloud Administration Console.
SAML SSO Agent
No known issues
SAML Relying Party
No known issues.