Exam Notes
Policies are additive - if any policy blocks, access is blocked. If multiple policies grant with different requirements, all requirements must be met. Always exclude break-glass accounts from blocking policies.
Identity & Authentication
Identity is the foundation of Azure security. Microsoft Entra ID (formerly Azure AD) provides identity services for authentication, authorization, and identity governance across cloud and hybrid environments.
Microsoft Entra ID is Microsoft's cloud-based identity and access management service. It's the backbone of identity for Microsoft 365, Azure, and thousands of SaaS applications.
Core Capabilities
License Tiers
Hybrid Identity
Authentication Methods
B2B collaboration enables secure sharing with external partners, suppliers, and vendors. Guest users authenticate with their own identity provider but access your resources.
How B2B Works
Identity Providers
Cross-Tenant Access
B2B Direct Connect
Azure AD B2C is a customer identity and access management (CIAM) solution for consumer-facing applications. It handles millions of users and billions of authentications daily.
B2C vs B2B
| B2B | B2C | |
|---|---|---|
| Users | Partners, suppliers | Consumers, customers |
| Scale | Thousands | Millions |
| Tenant | Your Entra tenant | Separate B2C tenant |
| Branding | Limited | Fully customizable |
User Flows & Custom Policies
Social Identity Providers
Key Features
Conditional Access is the Zero Trust policy engine. It evaluates signals (user, device, location, risk) and enforces access decisions (allow, block, require MFA) for every authentication.
Assignments (IF)
Conditions
Access Controls (THEN)
Identity Protection uses Microsoft's threat intelligence to detect identity-based risks in real-time and enables automated responses to protect users.
User Risk
Risk that an account has been compromised.
Remediation: Force password change
Sign-in Risk
Risk that a sign-in attempt is not legitimate.
Remediation: Require MFA
| Risk Level | Description | Recommended Action |
|---|---|---|
| High | Strong indicators of compromise | Block or require password change |
| Medium | Moderate risk indicators | Require MFA |
| Low | Minor anomalies detected | Allow or require MFA |
| None | No risk detected | Allow |
Access Reviews enable periodic verification of user access rights. Reviewers confirm whether users still need access, helping maintain least-privilege principles.
What Can Be Reviewed
Reviewer Options
Review Settings
A service principal is an identity for an application. It defines what the application can access and is used for automated authentication (no human involved).
App Registration vs Service Principal
Authentication Options
Managed identities eliminate the need for developers to manage credentials. Azure automatically manages the identity and provides tokens for Azure resource authentication.
System-Assigned
User-Assigned
Azure Key Vault safeguards cryptographic keys, secrets, and certificates. It provides centralized secrets management with access policies and audit logging.
Keys
RSA/EC keys for encryption, signing. HSM-backed available.
Secrets
Connection strings, passwords, API keys. Versioned.
Certificates
X.509 certificates. Auto-renewal with CAs.
Access Control
Tiers
| Concept | Purpose | Key Points |
|---|---|---|
| Entra ID | Cloud identity provider | SSO, MFA, hybrid sync |
| B2B | External collaboration | Guest users, cross-tenant access |
| B2C | Customer identity | Consumer scale, social login, custom flows |
| Conditional Access | Zero Trust policies | Signals → Decisions (if/then) |
| Identity Protection | Risk detection | User risk, sign-in risk, auto-remediate |
| Access Reviews | Periodic attestation | Verify continued access need |
| Service Principals | App identities | Secrets, certificates, federated |
| Managed Identities | No-secrets auth | System-assigned or user-assigned |
| Key Vault | Secrets management | Keys, secrets, certificates, HSM |