Even things like Exchange hybrid configurations and Exchange Web Services (EWS) can utilize OAuth today. And so they did and as of today most of the Microsoft cloud services including the browser based Office 365 workloads use OAuth today. Yammer which was acquired by Microsoft also used OAuth based authentication and still does this today.Īs you can see OAuth is the authorization standard when it comes to cloud services and it was therefore a natural move for Microsoft to start moving their cloud services to this standard as well. Actually, several of them used OAuth based authentication from the day they were born. More specifically service providers like Amazon, Facebook, LinkedIn, Google, Instagram, Foursquare, Twitter, DropBox and PayPal use OAuth and most of them have done so for many years. OAuth is used by most of the largest and popular service providers both in the consumer and enterprise space nowadays. OAuth (Open Authentication) is an open authorization standard that was born back in November 2006, so it is by no means a new standard. For those that are not familiar with OAuth, let me give you a short explanation. Over the last couple of years, the respective teams at Microsoft have worked on moving their cloud services (including the Office 365 workloads) to an OAuth based authentication model. Modern Authentication, ADAL and OAuth – What is it? We talked about the two major pain points seen from the end user/client perspective. In part 4 of this article series revolving around the available identity models and the authentication story for Exchange Online, our focus was on the Exchange Online authentication story as it was in the past up until now. Exchange Online Identity Models and Authentication Demystified (Part 7).Exchange Online Identity Models and Authentication Demystified (Part 6).Exchange Online Identity Models and Authentication Demystified (Part 4).Exchange Online Identity Models and Authentication Demystified (Part 3).
Exchange Online Identity Models and Authentication Demystified (Part 2).Exchange Online Identity Models and Authentication Demystified (Part 1).If you would like to read the other parts in this article series please go to: