Azure AD and Identity Fundamentals
Azure Active Directory (Azure AD), now called Microsoft Entra ID, is the foundation of identity management in Azure. It's a cloud-based identity and access management service that enables organizations to manage user identities and access to resources across cloud and on-premises environments.
Authentication Methods in Azure AD
Azure AD supports multiple authentication methods including username and password, multi-factor authentication (MFA), and passwordless sign-in options. Passwordless options include Windows Hello and FIDO2 security keys, which provide superior security without traditional passwords.
Key Azure AD Concepts
The service uses the concept of tenants, which represent a dedicated instance of Azure AD for your organization. Each tenant has its own directory of users, groups, and applications.
Understanding the differences between three key services is crucial for Azure administrators:
- Azure AD: Cloud-native identity service ideal for SaaS applications
- Active Directory Domain Services (AD DS): Traditional on-premises directory service
- Azure AD B2C: Consumer identity management for customer-facing applications
Managing User Identities
Key concepts include user accounts (cloud-only or directory-synchronized), guest accounts for external collaboration, and managed identities for applications to authenticate without storing credentials in code. Administrators must understand how to create and manage users, reset passwords, and enforce security policies through Azure AD.
Authentication Methods and Multi-Factor Authentication
Authentication is the process of verifying a user's identity, and Azure provides multiple methods to accomplish this securely. Multi-Factor Authentication (MFA) requires users to provide two or more verification methods, significantly increasing security.
MFA Options and Implementation
Azure supports various MFA options. The Microsoft Authenticator app is particularly powerful because it supports push notifications for approval, passwordless phone sign-in, and biometric/PIN verification. OATH tokens generate time-based one-time passwords compatible with many authenticator applications. SMS verification sends codes via text message, though it's considered less secure than app-based methods.
Conditional Access Policies
Conditional Access policies allow administrators to apply MFA based on specific conditions. You can require MFA only when users sign in from unfamiliar locations or using non-compliant devices. This approach balances security with user experience by applying stricter requirements only when needed.
Passwordless Authentication
Passwordless authentication is increasingly important and includes Windows Hello for Business, FIDO2 security keys, and phone sign-in. These methods eliminate the vulnerability of password reuse and phishing while providing better user experience.
Administrators must configure and enforce appropriate authentication methods based on organizational security requirements and risk tolerance.
Role-Based Access Control (RBAC) and Authorization
Role-Based Access Control is the mechanism through which Azure administrators grant permissions to users, groups, and service principals. RBAC operates on the principle of least privilege, meaning users receive only the minimum permissions necessary for their job functions.
RBAC Components
Azure uses three key components for RBAC. A security principal is who gets access (users, groups, service principals, managed identities). A role definition is what permissions are granted. Scope determines where the access applies (management group, subscription, resource group, individual resource).
Azure provides built-in roles like Owner, Contributor, Reader, and specialized roles for specific services. Custom roles allow organizations to define roles tailored to specific needs.
Scope and Role Assignment Strategy
A user assigned the Contributor role at the subscription level has Contributor permissions across all resources in that subscription. The same role at the resource group level limits permissions to that specific group. Understanding the Azure resource hierarchy is essential for properly implementing RBAC.
Service Principals and Managed Identities
Service principals are non-human identities used by applications and automated processes to authenticate and access resources. Managed identities eliminate the need to manage credentials by creating automatically managed identities in Azure AD. System-assigned managed identities are tied to a specific resource's lifecycle. User-assigned managed identities can be shared across multiple resources.
Proper RBAC implementation prevents unauthorized access and limits the blast radius of potential security breaches.
Hybrid Identity and Synchronization
Many organizations operate hybrid environments with both on-premises Active Directory and Azure AD. Azure AD Connect is the primary tool for synchronizing identities between these environments. Synchronization keeps user accounts, group memberships, and contact information consistent across both systems.
Synchronization Modes
Azure AD Connect supports two primary synchronization modes. Password hash synchronization syncs hashed versions of user passwords to Azure AD, allowing users to sign in to cloud applications using the same credentials as on-premises. This is the most commonly implemented method because it's highly available and doesn't require additional servers.
Pass-through authentication validates user passwords directly against on-premises AD DS by installing agents on on-premises servers. This provides real-time password policy enforcement but requires more infrastructure.
Hybrid Identity Scenarios
Hybrid identity enables several advanced scenarios including conditional access that considers on-premises device compliance, single sign-on (SSO) for seamless access to cloud and on-premises applications, and federated identity through Active Directory Federation Services (AD FS).
Monitoring and Configuration
Azure AD Connect Health monitors the synchronization process and alerts administrators to issues like connectivity problems or failed synchronizations. The synchronization process typically runs every 30 minutes by default but can be configured differently. Organizations must plan their hybrid identity strategy carefully, considering network connectivity, disaster recovery, and compliance requirements.
Conditional Access and Identity Protection
Conditional Access allows Azure administrators to enforce access policies based on multiple conditions and risk assessments. Policies evaluate signals such as user identity, device identity, location, application being accessed, and real-time risk calculations. Based on these signals, policies can grant full access, require MFA, require device compliance, restrict access, or block access entirely.
Building Conditional Access Policies
Conditional Access policies are built using if-then logic. If a user is accessing a sensitive application from an unfamiliar location, then require MFA. Policies can target specific users, groups, applications, and conditions, allowing fine-grained access control without blocking legitimate user productivity.
Identity Protection and Risk Detection
Azure AD Identity Protection automatically detects and remediates identity-based risks. It identifies risk events such as unfamiliar sign-in properties, impossible travel, atypical token characteristics, and credentials leaked in dark web marketplaces.
Identity Protection assigns risk levels to users and sign-ins based on detected events. User risk indicates the probability that an identity has been compromised. Sign-in risk indicates the probability that a specific authentication request wasn't authorized by the account owner.
Risk-Based Response
Risk-based policies automatically respond to detected risks by requiring password changes, enabling MFA, or blocking access. Administrators can also manually investigate risk events and dismiss false positives. Starting with report-only mode allows testing policies before enforcement.
These controls significantly enhance security posture by adapting access requirements based on real-time risk assessments rather than applying uniform rules to all access attempts.
