Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| azure:az-500:alt:identity_and_access_management [2023/01/31 22:57] – [AAD Roles] mmuze | azure:az-500:alt:identity_and_access_management [2023/02/11 21:02] (current) – [Identity and Access Management] mmuze | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Identity and Access Management ====== | ====== Identity and Access Management ====== | ||
| + | * [[https:// | ||
| * [[azure: | * [[azure: | ||
| * [[azure: | * [[azure: | ||
| Line 7: | Line 8: | ||
| * Because Azure AD is HTTP/HTTPS based, it does not use Kerberos authentication. Instead, it uses HTTP and HTTPS protocols such as SAML, WS-Federation, | * Because Azure AD is HTTP/HTTPS based, it does not use Kerberos authentication. Instead, it uses HTTP and HTTPS protocols such as SAML, WS-Federation, | ||
| * MFA is supported for free tier AAD by way of //Security Defaults//. | * MFA is supported for free tier AAD by way of //Security Defaults//. | ||
| - | * //Security Defaults// is a a built-in set of protections against identity based attacks. | + | * //Security Defaults// is a built-in set of protections against identity-based attacks. |
| + | * **// | ||
| + | |||
| + | |||
| + | ==== Security Principle ==== | ||
| + | > Security principal: An Azure security principal is a security identity that user-created apps, services, and automation tools use to access specific Azure resources. Think of it as a "user identity" | ||
| ===== Authentication Methods ===== | ===== Authentication Methods ===== | ||
| Line 22: | Line 29: | ||
| * AAD Roles are generally assigned to individual users, but some groups are given a special designation that allows roles to be assigned to them. | * AAD Roles are generally assigned to individual users, but some groups are given a special designation that allows roles to be assigned to them. | ||
| * These must be cloud groups created directly in AAD, **not** synced security groups from Windows AD. | * These must be cloud groups created directly in AAD, **not** synced security groups from Windows AD. | ||
| + | * The members must be directly assigned to the group—not dynamic groups. | ||
| + | * AAD does not have organizational units (OUs)—it has a flat structure. But it does have **Administrative Units** that certain roles can be assigned to. | ||
| > The **Account Administrator** is the user that initially signed up for the Azure subscription, | > The **Account Administrator** is the user that initially signed up for the Azure subscription, | ||
| Line 92: | Line 101: | ||
| * Requires a P2 license | * Requires a P2 license | ||
| + | ====== Microsoft Entra Verified ID ====== | ||
| + | |||
| + | ====== Passwordless authentication ====== | ||
| + | |||
| + | ====== User Management ====== | ||
| + | * Deleted users and M365 groups can be restored (undeleted) for up to 30 days. | ||
| + | * Deleted Security Groups cannot be restored. | ||
| + | |||
| + | ====== Guest Access ====== | ||
| + | * The default user/guest collaboration settings allow any user (including B2B guest uers) to invite guest users. | ||
| + | * When inviting guests is limited to certain admin roles those roles include Global Administrator, | ||
| ====== Related ====== | ====== Related ====== | ||
| * [[azure: | * [[azure: | ||