Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| azure:az-500:manage_azure_active_directory_azure_ad_identities [2022/06/23 00:52] – [Managed Identity] mmuze | azure:az-500:manage_azure_active_directory_azure_ad_identities [2022/07/22 13:44] (current) – mmuze | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== § Manage Azure Active Directory (Azure AD) identities ====== | ====== § Manage Azure Active Directory (Azure AD) identities ====== | ||
| + | * [[azure: | ||
| + | * [[azure: | ||
| + | |||
| * Create and manage a managed identity for Azure resources | * Create and manage a managed identity for Azure resources | ||
| * Manage Azure AD groups | * Manage Azure AD groups | ||
| Line 6: | Line 9: | ||
| * Manage administrative units | * Manage administrative units | ||
| - | |||
| - | * [[azure: | ||
| - | * [[azure: | ||
| * AAD does not use Kerberos or NTLM like traditional on-prem AD, instead it uses protocols like, OAuth, SAML, OpenID and WS-Federation. | * AAD does not use Kerberos or NTLM like traditional on-prem AD, instead it uses protocols like, OAuth, SAML, OpenID and WS-Federation. | ||
| * Best Practice: Limit Global Administrator to 5 or less users in an organization. | * Best Practice: Limit Global Administrator to 5 or less users in an organization. | ||
| Line 17: | Line 17: | ||
| * Authentication is handled by the third-party provider and authorization is handled by the AAD that is granting access. | * Authentication is handled by the third-party provider and authorization is handled by the AAD that is granting access. | ||
| - | ===== Users & Groups ===== | + | ====== Users & Groups |
| * There are two group types in AAD | * There are two group types in AAD | ||
| - | * Security groups | + | |
| - | * Microsoft 365 groups | + | |
| + | * [[https:// | ||
| + | * The group' | ||
| + | * used for collaboration | ||
| ====== Managed Identity ====== | ====== Managed Identity ====== | ||
| * A **Managed Identity** is a way for a compute resource (e.g. VM, logic app, app service, function, etc) get access to credentials/ | * A **Managed Identity** is a way for a compute resource (e.g. VM, logic app, app service, function, etc) get access to credentials/ | ||
| + | * [[https:// | ||
| + | * There are **system assigned** managed identities and **user assigned** managed identities. | ||
| + | * With system assigned managed identity there is a one-to-one relationship between a resource that needs a security principle and the security principle. | ||
| + | * With a user assigned managed identity multiple resources (e.g. VMs in scale-set) can share a single security principle. | ||
| + | * A **Managed Identity** is a way of avoid embedding credentials in application code. | ||
| + | * This allows services, like virtual machines and app service web apps to acquire a token that is subsequently used to get a secret from key vault. And in turn access some resource using the secret. | ||
| ====== External Identities ====== | ====== External Identities ====== | ||
| * **External Identities** includes B2B Collaboration, | * **External Identities** includes B2B Collaboration, | ||
| * [[https:// | * [[https:// | ||
| + | |||
| + | ===== B2B Collaboration ===== | ||
| + | * B2B collaboration users are managed in the same directory as employees but are typically annotated as guest users. | ||
| ===== B2B direct connect ===== | ===== B2B direct connect ===== | ||
| * No user object is created in your Azure AD directory. | * No user object is created in your Azure AD directory. | ||
| - | ===== B2B Collaboration | + | {{ : |
| - | * B2B collaboration users are managed in the same directory as employees but are typically annotated as guest users. | + | |
| + | ====== B2C ====== | ||
| + | * [[https:// | ||
| + | |||
| + | > Azure Active Directory B2C provides business-to-customer identity | ||
| + | |||
| + | {{ : | ||
| ====== Administrative Unit ====== | ====== Administrative Unit ====== | ||
| - | * An [[https:// | + | * An [[https:// |
| > An administrative unit is an Azure AD resource that can be a container for other Azure AD resources. An administrative unit can contain only users, groups, or devices. | > An administrative unit is an Azure AD resource that can be a container for other Azure AD resources. An administrative unit can contain only users, groups, or devices. | ||
| Line 42: | Line 61: | ||
| * An **administrative unit** is similar in some ways to an **organization unit** in traditional AD. | * An **administrative unit** is similar in some ways to an **organization unit** in traditional AD. | ||
| * A AAD P1 license or better is required for each AU administrator, | * A AAD P1 license or better is required for each AU administrator, | ||
| - | + | * To create an Administrative Unit the user must be a Global Administrator or Privileged Role Administrator. | |
| - | | + | |
| ====== Roles ====== | ====== Roles ====== | ||
| * [[https:// | * [[https:// | ||
| - | ===== Hybrid Identity Authentication ===== | ||
| - | * [[https:// | ||
| - | * There are three options for hybrid authentication | ||
| - | * password hash sync | ||
| - | * pass-thru authentication | ||
| - | * federated authentication | ||
| - | * [[https:// | ||
| - | |||
| - | ===== Privileged Identity Management ===== | ||
| - | * **PIM** (Privilege Identity Management) allows access to be granted in a just-in-time manner. It can apply to AAD roles and general AD roles. | ||
| - | * [[https:// | ||
| - | * Requires an AAD P2 license or EMS E5 license | ||
| - | * [[https:// | ||
| - | |||
| - | ===== Managed Identities ===== | ||
| - | * [[https:// | ||
| - | * A **Managed Identity** is a way of avoid embedding credentials in application code. | ||
| - | * This allows services, like virtual machines and app service web apps to acquire a token that is subsequently used to get a secret from key vault. And in turn access some resource using the secret. | ||