Table of Contents
- 1.1 β Explain the identity landscape π
- 1.2 β Explore Zero Trust with identity π‘οΈ
- 1.3 β Discuss identity as a control plane ποΈ
- 1.4 β Explore why we have identity π€
- 1.5 β Define identity administration π οΈ
- 1.6 β Contrast decentralized identity with central identity systems π
- 1.7 β Discuss identity management solutions π§©
- 1.8 β Explain Microsoft Entra Business to Business π€
- 1.9 β Compare Microsoft identity providers π
- 1.10 β Define identity licensing π³
- 1.11 β Explore authentication π
- 1.12 β Discuss authorization π¦
- 1.13 β Explain auditing in identity π
1.1 β Explain the identity landscape π
Before diving into Microsoft Entra ID features, itβs important to understand how Microsoft views identity in modern security.
The Identity Lifecycle Model
Identity in Microsoft is built around five pillars:
1οΈβ£ Zero Trust β Verify Explicitly | Use Least Privilege | Assume Breach
2οΈβ£ Identity Sources β B2B, B2C, Verifiable Credentials
3οΈβ£ Actions β Authenticate (AuthN), Authorize (AuthZ), Administer, Audit
4οΈβ£ Usage β Access apps & data, security, licensing
5οΈβ£ Maintain β Protect β Detect β Respond
π The key message:
Never grant access just because it was granted yesterday β always confirm again.
Classic Identity vs Zero Trust π
| Classic Model β | Zero Trust Model β |
|---|---|
| Everything inside network is trusted | Nothing is trusted by default |
| One password = full access | Continuous verification |
| Firewall focused | Identity & policy focused |
In todayβs world, one stolen credential can destroy everything. Zero Trust protects assets anywhere with central policy.
1.2 β Explore Zero Trust with identity π‘οΈ
Organizations now work in hybrid and multicloud environments. Users connect from home, mobile, and unmanaged devices. Zero Trust assumes:
βNever trust, always verify.β
Three Core Principles
- β Verify Explicitly β identity, device, location, risk
- π Use Least Privilege β JIT & JEA access
- π₯ Assume Breach β limit blast radius
Six Pillars of Zero Trust
π§ Identity β’ π± Endpoints β’ π Data β’ π§© Apps β’ ποΈ Infrastructure β’ π Network
Identity is the control plane that decides access to all others.
Modern Architecture
- Policy engine makes dynamic decisions
- Signals like device health & sign-in risk
- SIEM + XDR for detection and response
- End-to-end protection
π― Goal: Only the right people get the right access at the right time.
1.3 β Discuss identity as a control plane ποΈ
A control plane decides how access flowsβjust like a traffic controller.
In modern IT:
π€ Identity is the common denominator.
Every user, device, app, and service has an identity.
If we donβt know who the user is β no other security matters.
Once verified, access can be enforced across:
- On-prem systems
- Cloud apps
- SaaS like Microsoft 365
1.4 β Explore why we have identity π€
Identity enables four major capabilities:
- π Authentication β prove who you are
- π¦ Authorization β what you can do
- π Auditing β track activity
- βοΈ Administration β manage lifecycle
What is an Identity Provider (IdP)?
An IdP is a trusted system that:
- Stores user identities
- Performs authentication
- Protects against attacks
- Enables Single Sign-On (SSO)
π Example: Microsoft Entra ID
Common Protocols
- OpenID Connect (OIDC)
- SAML
- OAuth 2.0
1.5 β Define identity administration π οΈ
Identity administration manages accounts from birth to retirement.
Real-World Risk Story π¨
Juan leaves company β account not removed β
password reused β phishing β breach using βvalidβ account!
Core Administration Tasks
- Provision / Deprovision
- Synchronization
- Password management
- Group management
- Entitlements
- Change control
Automation Options π€
- Azure CLI
- PowerShell
- Microsoft Graph API
π Microsoft Graph = single endpoint to manage identities programmatically.
1.6 β Contrast decentralized identity with central identity systems π
Centralized Identity π’
- One authority manages identities
- Credentials stored centrally
- Example: Microsoft Entra ID
Benefits:
- Adaptive access
- Unified management
- Governance & visibility
Decentralized Identity π
- User owns identity
- Based on DIDs & blockchain
- Data stored βoff-chainβ encrypted
- Greater privacy & control
1.7 β Discuss identity management solutions π§©
IAM controls:
- Who can sign in
- What they can access
- Lifecycle & governance
Key Microsoft Entra Terms
- Identity β object that authenticates
- User β personal identity
- Group β container for permissions
- Tenant β dedicated Entra instance
- Administrative Unit β boundary for admin
1.8 β Explain Microsoft Entra Business to Business π€
Microsoft Entra External Identities
Allows collaboration with partners using their own accounts.
B2B Collaboration
- Guests appear in your directory
- Use their own credentials
B2B Direct Connect
- Teams shared channels
- No guest object required
Microsoft Entra B2C π₯
- For customer-facing apps
- Social & local accounts
- CIAM platform at massive scale
1.9 β Compare Microsoft identity providers π
| Service | Purpose |
|---|---|
| Microsoft Entra ID | Cloud identity for SaaS |
| AD DS | On-prem directory |
| Entra Domain Services | Managed AD in Azure |
π Entra ID can sync with AD DS for hybrid identity.
1.10 β Define identity licensing π³
Important licenses:
- Entra ID P1/P2 β advanced security
- P2 required for PIM
- Microsoft 365 licenses
- MAU billing for external users
Subscription vs License
- Subscription = agreement
- License = per-user right to use
1.11 β Explore authentication π
Authentication validates identity with:
- Standards compliance
- Multiple sources
- Strong assurance
Federation
Use on-prem AD as trusted source.
Protocols
- SAML
- WS-Fed
- OIDC
Tokens ποΈ
- Access Token
- Refresh Token
- ID Token (JWT)
Claims = key/value info about user.
1.12 β Discuss authorization π¦
Authorization = what you can do.
Models
- ACL
- RBAC
- ABAC
- PBAC
New Feature
Authentication Context β require stronger controls for sensitive data.
1.13 β Explain auditing in identity π
Auditing helps:
- Detect attacks
- Compliance
- Troubleshooting
Logs
- Sign-in logs
- Audit logs
- Provisioning logs
Governance is Critical π§
Check:
- HR vs directory
- Last login
- Excess privileges
- MFA usage
Lifecycle: Join β Move β Leave β»οΈ
- Create identity
- Modify access
- Remove when gone
Monitoring Tools
- Azure Monitor
- Sentinel
- Resource Health
- Policy