Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| azure:az-500:alt:identity_and_access_management [2023/01/24 16:16] – [Azure AD] mmuze | azure:az-500:alt:identity_and_access_management [2023/02/11 21:02] (current) – [Identity and Access Management] mmuze | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Identity and Access Management ====== | ====== Identity and Access Management ====== | ||
| + | * [[https:// | ||
| * [[azure: | * [[azure: | ||
| * [[azure: | * [[azure: | ||
| Line 7: | Line 8: | ||
| * Because Azure AD is HTTP/HTTPS based, it does not use Kerberos authentication. Instead, it uses HTTP and HTTPS protocols such as SAML, WS-Federation, | * Because Azure AD is HTTP/HTTPS based, it does not use Kerberos authentication. Instead, it uses HTTP and HTTPS protocols such as SAML, WS-Federation, | ||
| * MFA is supported for free tier AAD by way of //Security Defaults//. | * MFA is supported for free tier AAD by way of //Security Defaults//. | ||
| - | * //Security Defaults// is a a built-in set of protections against identity based attacks. | + | * //Security Defaults// is a built-in set of protections against identity-based attacks. |
| + | * **// | ||
| + | |||
| + | |||
| + | ==== Security Principle ==== | ||
| + | > Security principal: An Azure security principal is a security identity that user-created apps, services, and automation tools use to access specific Azure resources. Think of it as a "user identity" | ||
| ===== Authentication Methods ===== | ===== Authentication Methods ===== | ||
| - | ===Azure AD Pass-through Authentication=== | + | ===Azure AD Pass-through Authentication |
| + | Using PTA AAD passes authentication attempts to an agent running on an on-prem server that passes it to an on-prem Windows Server AD. | ||
| > | > | ||
| + | |||
| + | === Azure AD password hash synchronization === | ||
| + | Password hash sync works by running the **Azure AD Connect** service on a server on-prem that syncs user and password hashes to AAD. | ||
| + | |||
| + | >The simplest way to enable authentication for on-premises directory objects in Azure AD. Users can use the same username and password that they use on-premises without having to deploy any additional infrastructure. Some premium features of Azure AD, like Identity Protection and Azure AD Domain Services, require password hash synchronization, | ||
| ====== AAD Roles ====== | ====== AAD Roles ====== | ||
| + | * AAD Roles are generally assigned to individual users, but some groups are given a special designation that allows roles to be assigned to them. | ||
| + | * These must be cloud groups created directly in AAD, **not** synced security groups from Windows AD. | ||
| + | * The members must be directly assigned to the group—not dynamic groups. | ||
| + | * AAD does not have organizational units (OUs)—it has a flat structure. But it does have **Administrative Units** that certain roles can be assigned to. | ||
| > The **Account Administrator** is the user that initially signed up for the Azure subscription, | > The **Account Administrator** is the user that initially signed up for the Azure subscription, | ||
| Line 52: | Line 70: | ||
| ==== Types ==== | ==== Types ==== | ||
| - | * **System-assigned.** Some Azure services allow you to enable a managed identity directly on a service instance. When you enable a system-assigned managed identity, an identity is created in Azure AD. The identity is tied to the lifecycle of that service instance. When the resource is deleted, Azure automatically deletes the identity for you. By design, only that Azure resource can use this identity to request tokens from Azure AD. | + | * **System-assigned.** Some Azure services allow you to enable a managed identity directly on a service instance. When you enable a system-assigned managed identity, an identity is created in Azure AD. The identity is tied to the lifecycle of that service instance. When the resource is deleted, Azure automatically deletes the identity for you. By design, only that Azure resource can use this identity to request tokens from Azure AD |
| * **User-assigned.** You may also create a managed identity as a standalone Azure resource. You can create a user-assigned managed identity and assign it to one or more instances of an Azure service. For user-assigned managed identities, the identity is managed separately from the resources that use it. | * **User-assigned.** You may also create a managed identity as a standalone Azure resource. You can create a user-assigned managed identity and assign it to one or more instances of an Azure service. For user-assigned managed identities, the identity is managed separately from the resources that use it. | ||
| + | |||
| + | === Examples of System-assigned === | ||
| + | * A VM accessing an Azure Key Vault | ||
| + | * A VM accessing Azure Storage | ||
| + | * A //Azure App Service// accessing an Azure Key Vault | ||
| Line 75: | Line 98: | ||
| * Application permissions are used by apps that run without a signed-in user present, for example, apps that run as background services or daemons. | * Application permissions are used by apps that run without a signed-in user present, for example, apps that run as background services or daemons. | ||
| + | ====== Access Reviews ====== | ||
| + | * Requires a P2 license | ||
| + | |||
| + | ====== Microsoft Entra Verified ID ====== | ||
| + | |||
| + | ====== Passwordless authentication ====== | ||
| + | |||
| + | ====== User Management ====== | ||
| + | * Deleted users and M365 groups can be restored (undeleted) for up to 30 days. | ||
| + | * Deleted Security Groups cannot be restored. | ||
| + | |||
| + | ====== Guest Access ====== | ||
| + | * The default user/guest collaboration settings allow any user (including B2B guest uers) to invite guest users. | ||
| + | * When inviting guests is limited to certain admin roles those roles include Global Administrator, | ||
| ====== Related ====== | ====== Related ====== | ||
| + | * [[azure: | ||
| * [[azure: | * [[azure: | ||