Table of Contents

Identity and Access Management

Azure AD

Security Principle

Security principal: An Azure security principal is a security identity that user-created apps, services, and automation tools use to access specific Azure resources. Think of it as a “user identity” (username and password or certificate) with a specific role, and tightly controlled permissions. A security principal should only need to do specific things, unlike a general user identity. It improves security if you grant it only the minimum permission level that it needs to perform its management tasks. A security principal used with an application or service is called a service principal.

Authentication Methods

Azure AD Pass-through Authentication (PTA)

Using PTA AAD passes authentication attempts to an agent running on an on-prem server that passes it to an on-prem Windows Server AD.

Provides a simple password validation for Azure AD authentication services by using a software agent that runs on one or more on-premises servers. The servers validate the users directly with your on-premises Active Directory, which ensures that the password validation doesn't happen in the cloud. Companies with a security requirement to immediately enforce on-premises user account states, password policies, and sign-in hours might use this authentication method.

Azure AD password hash synchronization

Password hash sync works by running the Azure AD Connect service on a server on-prem that syncs user and password hashes to AAD.

The simplest way to enable authentication for on-premises directory objects in Azure AD. Users can use the same username and password that they use on-premises without having to deploy any additional infrastructure. Some premium features of Azure AD, like Identity Protection and Azure AD Domain Services, require password hash synchronization, no matter which authentication method you choose.

AAD Roles

The Account Administrator is the user that initially signed up for the Azure subscription, and is responsible as the billing owner of the subscription.
Only the Billing Administrator of an account can transfer ownership of a subscription.

Conditional Access

Examples of conditions

Control user access based on session controls to enable limited experiences within specific cloud applications. As an example, Conditional Access App Control uses signals from Microsoft Defender for Cloud Apps to block the download, cut, copy, and print capabilities for sensitive documents, or to require labeling of sensitive files. Other session controls include sign-in frequency and application enforced restrictions that, for selected applications, use the device information to provide users with a limited or full experience, depending on the device state.

Reference

App Identity

When you have applications, hosted services, or automated tools that needs to access or modify resources, you can create an identity for the app. This identity is known as a service principal.

For services that support Managed Identities they should be used instead of service principles.

Managed Identities

Types

Examples of System-assigned

Terminology

Administrative Units

An administrative unit is an Azure AD resource that can be a container for other Azure AD resources. An administrative unit can contain only users, groups, or devices.

Applications and Permissions

Access Reviews

Microsoft Entra Verified ID

Passwordless authentication

User Management

Guest Access

Related