Authentication
Authentication in Secure Contacts App (SCA)
Secure Contacts App (SCA) utilizes Microsoft Authentication Library (MSAL) to securely authenticate users via Azure Active Directory (AAD). This authentication framework ensures that only authorized users can access the app, safeguarding both personal and organizational contact data.
Enterprise Application in Your Tenant
SCA is registered and consented as an enterprise application in your Azure AD tenant. This configuration enables your organization to:
Control which users have access to the app
Manage permissions and access centrally
Enforce organizational security and compliance policies
Once the application is consented, user authentication is handled through your tenant, ensuring secure and controlled access.
For detailed guidance on registering and consenting the enterprise application, refer to the Enterprise Application documentation.
User Authentication
Authenticated users gain access to both personal and organizational contacts. MSAL facilitates secure communication between the app and Azure AD, providing a consistent login experience across platforms.
Security Enhancements
Conditional Access: Enforces requirements such as compliant devices or multi-factor authentication for secure access.
App Protection Policies (MAM): Protects organizational data on both managed and BYOD devices.
Platform Consistency
SCA employs the same authentication flow for iOS and Android, ensuring uniform security and functionality across devices.
Best Practices
Ensure the SCA enterprise application is properly registered and consented in your tenant.
Align Conditional Access and App Protection Policies with your organization’s security requirements.
Maintain consistent authentication configurations across all devices.
Monitor authentication logs to detect and address potential issues promptly.
Summary
Authentication in SCA combines the security of Azure AD, MSAL, and enterprise controls to protect access and data. Utilizing a registered and consented enterprise application ensures that your organization retains control over access, permissions, and compliance policies.
The following chapters will cover:
Last updated
Was this helpful?