Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| azure:az-104_2024:identity_and_access_management [2024/10/09 18:24] – [User Profile Attributes] mmuze | azure:az-104_2024:identity_and_access_management [2025/11/29 17:48] (current) – mmuze | ||
|---|---|---|---|
| Line 5: | Line 5: | ||
| * **Microsoft 365 groups**: Provides collaboration opportunities by giving group members access to a shared mailbox, calendar, files, SharePoint sites, and more. | * **Microsoft 365 groups**: Provides collaboration opportunities by giving group members access to a shared mailbox, calendar, files, SharePoint sites, and more. | ||
| * [[https:// | * [[https:// | ||
| - | * M365 can be setup to expire after a specified period of time | + | * M365 groups |
| * [[https:// | * [[https:// | ||
| * When a group expires, almost all of its associated services (the mailbox, Planner, SharePoint site, team, etc.) are also deleted. | * When a group expires, almost all of its associated services (the mailbox, Planner, SharePoint site, team, etc.) are also deleted. | ||
| Line 11: | Line 11: | ||
| * Expiration policies are only supported for dynamic groups. | * Expiration policies are only supported for dynamic groups. | ||
| * <color :# | * <color :# | ||
| + | * <color :# | ||
| + | * Using this feature requires a Microsoft Entra ID P1/P2 license. | ||
| ====== Azure Organization/ | ====== Azure Organization/ | ||
| Line 24: | Line 26: | ||
| ---- | ---- | ||
| ===== Administrative Units ===== | ===== Administrative Units ===== | ||
| - | * // | + | * // |
| * Adding a group to an administrative unit brings the group itself into the management scope of the administrative unit, but not the members of the group. | * Adding a group to an administrative unit brings the group itself into the management scope of the administrative unit, but not the members of the group. | ||
| * AUs cannot be nested. | * AUs cannot be nested. | ||
| Line 56: | Line 58: | ||
| * Examples of Entra ID roles: | * Examples of Entra ID roles: | ||
| * Global Admin | * Global Admin | ||
| + | * When you create a new Microsoft Entra tenant, you are automatically assigned the Global Administrator role | ||
| * Application Admin | * Application Admin | ||
| * Application Developer | * Application Developer | ||
| Line 65: | Line 68: | ||
| * <color :# | * <color :# | ||
| + | |||
| + | ==== Role Assignments ==== | ||
| + | * An <color :# | ||
| + | |||
| ====== Administrative Units ====== | ====== Administrative Units ====== | ||
| * The default scope for Entra Id roles is global (the entire tenant) | * The default scope for Entra Id roles is global (the entire tenant) | ||
| Line 100: | Line 107: | ||
| </ | </ | ||
| * **Attribute Assignment Administrator role** - Users with this role can assign and remove custom security attribute keys and values for supported Microsoft Entra objects such as users, service principals, and devices. | * **Attribute Assignment Administrator role** - Users with this role can assign and remove custom security attribute keys and values for supported Microsoft Entra objects such as users, service principals, and devices. | ||
| + | |||
| + | ---- | ||
| + | Attributes can be assigned to the following entities: | ||
| + | * Users: Attributes like name, email, job title, department, location, etc. | ||
| + | * Groups: Attributes like description, | ||
| + | * Applications: | ||
| + | * Devices: Attributes like device type, operating system, serial number, etc. | ||
| + | * Service Principals: Attributes like display name, description, | ||
| + | |||
| + | ====== Licensing ====== | ||
| + | * Not all Microsoft services are available in all locations. Before a license can be assigned to a group, you must specify the Usage location for all members. You can set this value in Microsoft Entra by going to Identity > Users > All users > select a user > Properties. | ||
| + | * When you assign licenses to a group or you make bulk updates, such as disabling the synchronization status for the organization, | ||
| + | |||
| + | ====== Global Admin Elevated Access ====== | ||
| + | * [[https:// | ||
| + | * As a Global Administrator in Microsoft Entra ID, you might not have access to all subscriptions and management groups in your directory. | ||
| + | * There is a setting on the Entra Id tenant/ | ||
| + | * This setting gives the user the User Access Administrator role for the root scope that is inherited by all management groups/ | ||
| + | * Although it's a per-user settings it is enabled from the tenant blade, not the user properties blade. | ||
| + | * Also, it results in an Azure role being assigned to the user, not a Entra Id/ | ||
| + | |||
| + | ====== Multi-factor Authentication (MFA) ====== | ||
| + | * Conditional Access based MFA is also call Per-Authentication MFA in contrast to Per-User MFA. | ||
| + | |||
| + | ====== Conditional Access ====== | ||
| + | * [[https:// | ||