Technical requirements
For this chapter, you are required to have a solid understanding of identity management and concepts such as Active Directory (AD), the Kerberos protocol, SAML versus OAuth 2.0, and MFA.
Following is a sample diagram which depicts the SAML authentication flow:
![Figure 5.1 – Example of the SAML authentication flow to the Office 365 service](https://static.packt-cdn.com/products/9781800569195/graphics/image/B16552_Figure_5.1.jpg)
Figure 5.1 – Example of the SAML authentication flow to the Office 365 service
Now that you are aware of the basic concepts needed for the chapter, let's dive into the details.