azure:az-104_2024:identity_and_access_management

This is an old revision of the document!


AZ-104 Study Guide 2024

Identity and Access Management

Users and Groups

Azure Organization/Structure/Scoping

  • Within the Azure ecosystem there are several organizational structures
  • Management groups provide a governance scope (for Azure Resources) above subscriptions.
  • By moving multiple subscriptions under a management group, you can create one Azure role assignment on the management group. The role will inherit that access to all the subscriptions.
  • A management group tree can support up to six levels of depth.


  • Administrative Units (AU) provide an administrative scope over a subset Entra ID users and groups.
  • Adding a group to an administrative unit brings the group itself into the management scope of the administrative unit, but not the members of the group.
  • AUs cannot be nested.

Microsoft Entra ID vs. Azure Roles

  • ARM (Azure Resource Manager)/Azure/RBAC roles are distinct from Azure Entra ID roles.
    • And Data Access roles/permissions are distinct from resource access roles/permissions. For example, having the Owner role for a storage account does not give a user access to the data in the storage account.
    • The control plane permissions are distinct from the data plane permissions.
  • Entra ID roles (sometimes referred to as Administrative Roles) are used for managing access to identity objects within the Entra ID tenant itself.
    • Although Microsoft Entra ID roles are typically set at a tenant level, you can make scope adjustments using administrative units.
  • Azure RBAC roles are used for managing access to resources in an Azure subscription
  • Examples of Azure roles:
    • Owner - this is role with the highest level of access, which includes the ability to grant users access to resources
    • Contributor - this role grants permissions for read/write access to the scope it's assigned to, but (unlike Owner) it does not grant the permissions needed to assign permissions to principles to access resources.
    • Reader
  • A role assignment is a combination of an identity, role (permissions), and scope.. This could be thought of as the who, what and where respectively (Is there a better way to say this?).
  • With a role there are control plane actions (just referred to as actions) and Data Actions, which are actions at the data plane layer. [Say more about this.]
  • The Activity Log shows only control plane logs.
  • Microsoft Entra Domain Services provides traditional AD functionality (as-a-service) in Azure. But there are no domain controllers to manage and maintain.
    • Supports LDAP, NTLM and Kerberos protocols
  • Privileged Roles and permissions can be used to delegate management of directory resources to other users, modify credentials, authentication or authorization policies, or access restricted data.
  • Examples of Entra ID roles:
    • Global Admin
    • Application Admin
    • Application Developer
    • Billing Admin
  • Owner vs. Contributor
    • Owner grants full access to manage all resources, including the ability to assign roles in Azure RBAC.
    • Contributor grants full access to manage all resources, but does not allow you to assign roles in Azure RBAC, manage assignments in Azure Blueprints, or share image galleries.
  • Azure Roles are additive, meaning when multiple roles are assigned to a user the user gets the sum of all permissions granted by all roles.

Administrative Units

  • The default scope for Entra Id roles is global (the entire tenant)
  • Administrative Units (AU) can be used to limit scope of Entra ID roles to a unit that is a subset of the tenant
  • AU's do not apply to resources, they only apply to tenant entities
    • Entra ID roles are also referred to as Administrative roles, hence the name Administrative Units
  • An administrative unit can contain only users, groups, or devices.
  • AU's are used to limit the scope of permissions (for Entra ID roles) to only the users, groups or devices that it contains.
  • An example usage would be, assigning someone the Password Administrator role at the AU level, so they can reset non-administrative passwords for only the users in the AU.
  • Other examples of permissions that can be assigned to AU's.
  • Nesting is not supported
  • ☝️Putting groups in an AU does not implicitly give the ability to access and change the attributes of the members of the group. The members must be explicitly added to the AU.

Management Groups

  • Management Groups can be used to apply budget, RBAC roles and policies at a scope above subscriptions.

Password Handling

  • ❓Does Microsoft 365 Business Standard License support password writeback? Answer: It does not support it. See Docs

Custom Domain Name

  • To add a custom domain name to an Entra ID tenant you must create either TXT or MX record for the domain name to verify ownership of the domain.

Microsoft Entra Connect

User Profile Attributes

By default, Global Administrator and other administrator roles do not have permissions to read, define, or assign custom security attributes.
  • azure/az-104_2024/identity_and_access_management.1728496535.txt.gz
  • Last modified: 2024/10/09 17:55
  • by mmuze