Skip to content

Commit c018a14

Browse files
Merge pull request #54056 from ceperezb/CEPEREZB-sc900-describe-identity-concepts
module update
2 parents d706429 + 477145e commit c018a14

16 files changed

Lines changed: 299 additions & 97 deletions

learn-pr/wwl-sci/describe-identity-principles-concepts/1-introduction.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: "Introduction"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 1
11+
durationInMinutes: 2
1212
content: |
1313
[!include[](includes/1-introduction.md)]

learn-pr/wwl-sci/describe-identity-principles-concepts/2-define-authentication-authorization.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Define authentication and authorization
44
metadata:
55
title: Define authentication and authorization
66
description: "Define authentication and authorization"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 2
11+
durationInMinutes: 7
1212
content: |
1313
[!include[](includes/2-define-authentication-authorization.md)]

learn-pr/wwl-sci/describe-identity-principles-concepts/3-define-identity-primary-security-perimeter.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Define identity as the primary security perimeter
44
metadata:
55
title: Define identity as the primary security perimeter
66
description: "Define identity as the primary security perimeter"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 3
11+
durationInMinutes: 6
1212
content: |
1313
[!include[](includes/3-define-identity-primary-security-perimeter.md)]

learn-pr/wwl-sci/describe-identity-principles-concepts/4-describe-role-identity-provider.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe the role of the identity provider
44
metadata:
55
title: Describe the role of the identity provider
66
description: "Describe the role of the identity provider"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 7
11+
durationInMinutes: 6
1212
content: |
1313
[!include[](includes/4-describe-role-identity-provider.md)]

learn-pr/wwl-sci/describe-identity-principles-concepts/5-describe-concept-of-directory-services-active-directory.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe the concept of directory services and Active Directory
44
metadata:
55
title: Describe the concept of directory services and Active Directory
66
description: "Describe the concept of directory services and Active Directory"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 2
11+
durationInMinutes: 6
1212
content: |
1313
[!include[](includes/5-describe-concept-of-directory-services-active-directory.md)]

learn-pr/wwl-sci/describe-identity-principles-concepts/6-describe-concept-federation.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe the concept of federation
44
metadata:
55
title: Describe the concept of federation
66
description: "Describe the concept of federation"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 2
11+
durationInMinutes: 6
1212
content: |
1313
[!include[](includes/6-describe-concept-federation.md)]

learn-pr/wwl-sci/describe-identity-principles-concepts/7-knowledge-check.yml

Lines changed: 25 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,12 @@ title: Module assessment
44
metadata:
55
title: Module assessment
66
description: "Knowledge check"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
1111
module_assessment: true
12-
durationInMinutes: 2
12+
durationInMinutes: 3
1313
content: |
1414
[!include[](includes/7-knowledge-check.md)]
1515
quiz:
@@ -47,4 +47,26 @@ quiz:
4747
explanation: "Incorrect. The process of tracking who does what, where, when, and how is auditing, not authentication."
4848
- content: "Enabling federated services."
4949
isCorrect: false
50-
explanation: "Incorrect. Authentication doesn't enable federated services."
50+
explanation: "Incorrect. Authentication doesn't enable federated services."
51+
- content: "Why is identity described as the new security perimeter?"
52+
choices:
53+
- content: "Because users can only access resources from within the corporate network."
54+
isCorrect: false
55+
explanation: "Incorrect. Users now access resources from many locations outside the corporate network, which is why the network perimeter alone is no longer sufficient."
56+
- content: "Because verifying who or what is requesting access—regardless of network location—has become the primary way organizations control access to resources."
57+
isCorrect: true
58+
explanation: "Correct. As work happens from anywhere on any device, identity verification has replaced the network perimeter as the central security boundary."
59+
- content: "Because firewalls and VPNs have been replaced entirely by biometric authentication."
60+
isCorrect: false
61+
explanation: "Incorrect. While strong authentication is important, the concept of identity as the security perimeter reflects a broader shift in how access decisions are made—not the replacement of all network controls."
62+
- content: "An organization needs to manage identities for employees who use both on-premises applications and cloud-based SaaS services. Which solution is designed to support both scenarios?"
63+
choices:
64+
- content: "Active Directory Domain Services (AD DS)"
65+
isCorrect: false
66+
explanation: "Incorrect. AD DS was designed for on-premises networks and doesn't natively support cloud-based SaaS applications or modern authentication protocols."
67+
- content: "A domain controller (DC)"
68+
isCorrect: false
69+
explanation: "Incorrect. A domain controller is a server that runs AD DS. It doesn't natively support cloud-based SaaS services or modern authentication."
70+
- content: "Microsoft Entra ID"
71+
isCorrect: true
72+
explanation: "Correct. Microsoft Entra ID is a cloud-based identity and access management service that supports both cloud and on-premises scenarios, including hybrid identity configurations where identities are synchronized between AD DS and the cloud."

learn-pr/wwl-sci/describe-identity-principles-concepts/8-summary-resources.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Summary and resources
44
metadata:
55
title: Summary and resources
66
description: "Summary and resources"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 1
11+
durationInMinutes: 3
1212
content: |
1313
[!include[](includes/8-summary-resources.md)]
Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,12 @@
11

2-
Everyone, and every device, has an identity that can be used to access resources. Identity is the way in which people and things are identified on your corporate network, and in the cloud. Being certain about who or what is accessing your organization’s data and other resources is a fundamental part of securing your environment.
2+
Identity is how people, devices, and applications prove who or what they are when accessing digital resources. In a world where work happens from anywhere and data spans cloud and on-premises systems, identity has become the central security control organizations rely on.
33

4-
In this module, you'll learn about the key concepts of authentication and authorization and why identity is important in securing corporate resources. You'll also learn about some identity related services.
4+
This module introduces the foundational identity concepts that underpin the Microsoft security, compliance, and identity portfolio. It starts with authentication and authorization—the processes of proving identity and determining access. From there, it explores why identity has replaced the network perimeter as the primary security boundary, and why this matters for every organization. It covers how identity providers enable modern, centralized authentication and single sign-on, then looks at how directory services—from traditional Active Directory to cloud-based Microsoft Entra ID—store and manage identity information at scale. Finally, it covers how federation extends trust across organizational boundaries so users can access resources in different domains without separate accounts.
55

66
After completing this module, you'll be able to:
77

8-
- Understand the difference between authentication and authorization.
9-
- Describe the concept of identity as a security perimeter.
10-
- Describe identity-related services.
8+
- Define authentication and authorization and explain how they work together to control access.
9+
- Describe identity as the primary security perimeter and explain the four pillars of an identity infrastructure.
10+
- Describe the role of an identity provider and how modern authentication uses tokens and single sign-on.
11+
- Describe directory services, Active Directory Domain Services, and Microsoft Entra ID as its cloud evolution.
12+
- Describe the concept of federation and how trust relationships enable cross-organizational access.

learn-pr/wwl-sci/describe-identity-principles-concepts/includes/2-define-authentication-authorization.md

Lines changed: 73 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,82 @@
11

2-
### Authentication
3-
Authentication is the process of proving that a person is who they say they are. When someone purchases an item with a credit card, they might be required to show another form of identification. This proves that they are the person whose name appears on the card. In this example, the user might show a driver’s license that serves as a form of authentication and proves their ID.
2+
<!-- markdownlint-disable MD041 -->
3+
Authentication and authorization are two fundamental concepts in identity and access management. Together, they ensure that only the right people—and only what they need—can access organizational resources.
44

5-
When you want to access a computer or device, you encounter a similar type of authentication. You might get asked to enter a username and password. The username states who you are, but by itself isn't enough to grant you access. When combined with the password, which only that user should know, it allows access to your systems. The username and password, together, are a form of authentication. Authentication is sometimes shortened to AuthN.
5+
## Authentication
66

7-
### Authorization
8-
Once you authenticate a user, you need to decide where they can go, and what they're allowed to see and touch. This process is called authorization.
7+
Authentication is the process of proving that you are who you say you are. Every time you sign in to an application, unlock your phone, or access a company system, authentication is happening. The system challenges you to provide proof of your identity, and then verifies that proof before deciding whether to allow access.
98

10-
Suppose you want to spend the night in a hotel. The first thing you do is go to reception to start the "authentication process." After the receptionist has verified who you are, you're given a keycard and can go to your room. Think of the keycard as the authorization process. The keycard lets you open only the doors and elevators you're permitted to access, such as for your hotel room.
9+
Authentication is sometimes shortened to *AuthN*. The goal of authentication is to answer the question: *Who are you?*
1110

12-
In cybersecurity terms, authorization determines the level of access or the permissions an authenticated person has to your data and resources. Authorization is sometimes shortened to AuthZ.
11+
### How authentication works
1312

14-
### Multifactor authentication (MFA) and passwordless
15-
Using a username and password is a common way to authenticate, but passwords are a frequent target for attackers.
13+
Authentication requires *credentials*—evidence that verifies your identity. Common types of credentials include:
1614

17-
**Multifactor authentication (MFA)** strengthens authentication by requiring more than one proof, such as:
15+
- A username and password
16+
- A fingerprint or facial scan (biometrics)
17+
- A one-time code sent to your phone
18+
- A hardware security key
19+
20+
A username alone doesn't prove identity—it can be known or guessed by others. Adding a password (something only the legitimate user should know) gives a system confidence that the right person is signing in. Adding a biometric or physical device raises that confidence further.
21+
22+
Modern authentication systems also evaluate *contextual signals*: where the sign-in request originates, what device is being used, the time of day, and whether behavior matches typical patterns. These signals help systems detect suspicious sign-in attempts even when the correct credentials are presented.
23+
24+
### Passwordless authentication
25+
26+
*Passwordless* authentication removes the reliance on passwords by using stronger alternatives—such as biometrics, hardware security keys, or device-based credentials—to verify identity. Because there's no password to steal, reuse, or guess, passwordless methods reduce many of the risks associated with traditional password-based sign-in.
27+
28+
### Multifactor authentication
29+
30+
A username and password alone are often insufficient protection. Passwords are frequently stolen through phishing attacks, data breaches, and credential-stuffing attacks. *Multifactor authentication (MFA)* strengthens authentication by requiring more than one type of proof, drawn from different categories:
31+
32+
- **Something you know**—a password or PIN
33+
- **Something you have**—a phone, a hardware security key, or a smart card
34+
- **Something you are**—a biometric, such as a fingerprint or facial scan
35+
36+
When MFA is enabled, stealing a password alone isn't enough to compromise an account. An attacker would also need to physically possess the user's device or replicate their biometrics. This extra layer of verification dramatically reduces the risk of account takeover.
37+
38+
## Authorization
39+
40+
Once your identity is confirmed through authentication, the next question is: *What are you allowed to do?*
41+
42+
Authorization is the process of determining what an authenticated user has permission to access and what actions they can perform. Knowing who you are isn't enough—the system also needs to determine what you're entitled to.
43+
44+
Authorization is sometimes shortened to *AuthZ*.
45+
46+
### The hotel analogy
47+
48+
A useful way to think about authentication and authorization is to imagine checking into a hotel.
49+
50+
When you arrive, you go to the reception desk and present your passport or driver's license. The receptionist checks your identification against your reservation to confirm who you are. That's *authentication*.
51+
52+
Once verified, you're given a keycard programmed to open specific doors: your assigned room, the fitness center, or the pool—but not other guests' rooms, the staff areas, or the kitchen. When you use the keycard, the door sensor checks your permissions and grants or denies access accordingly. That's *authorization*.
53+
54+
In digital systems:
55+
- The credentials you provide (username, password, biometrics) are like your passport—they prove who you are.
56+
- The permissions assigned to your account—which applications, files, and actions you can access—are like the keycard.
57+
58+
### How authorization is managed
59+
60+
Authorization is typically managed through *roles* and *permissions*. Rather than assigning access rights individually to every user, systems group permissions into named roles, and then assign users to those roles.
61+
62+
For example:
63+
- A *help desk technician* role might allow viewing user account status but not resetting passwords.
64+
- A *security administrator* role might allow resetting passwords and reviewing sign-in logs.
65+
- A *global administrator* role might have full control over all settings and users.
66+
67+
This model is called *role-based access control (RBAC)*. When the permissions of a role change, every user assigned to that role is automatically affected. RBAC makes managing access across large organizations scalable and consistent.
68+
69+
Authorization decisions can also be dynamic. A user might be authorized to access a sensitive application under normal circumstances—but if they sign in from an unexpected location or an unrecognized device, a risk-based policy might step up the authentication requirement or restrict access until the risk is resolved.
70+
71+
## Authentication and authorization work together
72+
73+
Authentication and authorization are distinct processes, but they work together to protect resources. They always occur in a specific order:
74+
75+
1. **Authentication**—the system verifies who you are.
76+
2. **Authorization**—the system determines what you're allowed to do.
77+
78+
Authorization can only happen after successful authentication. You can't determine what someone is permitted to do without first confirming their identity. And confirming identity alone—without checking permissions—leaves resources exposed.
79+
80+
Together, authentication and authorization form the foundation of access management across all Microsoft security, compliance, and identity solutions.
1881

19-
- Something you know (password or PIN)
20-
- Something you have (phone, security key)
21-
- Something you are (biometrics)
2282

23-
**Passwordless** authentication reduces reliance on passwords by using stronger alternatives (for example, passkeys or Windows Hello for Business). Many passwordless methods are **phishing-resistant**, meaning they help protect users even if they're tricked into visiting a fake sign-in page.

0 commit comments

Comments
 (0)