You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- content: "Which Microsoft Entra tool can vary the credentials needed to log in based on signals, such as where the user is located?"
21
-
choices:
22
-
- content: "Conditional Access"
23
-
isCorrect: true
24
-
explanation: "Conditional Access is a tool that Microsoft Entra ID uses to allow (or deny) access to resources based on identity signals. Conditional Access might challenge you for a second authentication factor if your sign-in signals are unusual or from an unexpected location."
25
-
- content: "Guest access"
26
-
isCorrect: false
27
-
explanation: "Guest access is an access method that helps enable collaboration across organizational boundaries, but isn’t an authentication method or a tool to help with authentication."
28
-
- content: "Passwordless"
29
-
isCorrect: false
30
-
explanation: "Passwordless is an authentication method that relies on something you have; plus something you are or something you know. For example, Windows Hello is a passwordless authentication method."
31
-
- content: "Which security model assumes the worst-case security scenario, and protects resources accordingly?"
32
-
choices:
33
-
- content: "Zero Trust"
34
-
isCorrect: true
35
-
explanation: "Zero Trust is a security model that assumes the worst case scenario and protects resources with that expectation."
36
-
- content: "Defense-in-depth"
37
-
isCorrect: false
38
-
explanation: "Defense-in-depth is focused on setting up a system that prevents access to information by unauthorized parties. It’s a proactive model and builds layer upon layer to protect information."
39
-
- content: "Role-based access control"
40
-
isCorrect: false
41
-
explanation: "Role-based access control provides the ability to grant or deny access based on a user or services assigned role."
42
-
- content: "A user is simultaneously assigned multiple roles that use role-based access control. What are their actual permissions? The role permissions are: Role 1 - read || Role 2 - write || Role 3 - read and write."
43
-
choices:
44
-
- content: "Read only"
45
-
isCorrect: false
46
-
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
47
-
- content: "Write only"
48
-
isCorrect: false
49
-
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
50
-
- content: "Read and write"
51
-
isCorrect: true
52
-
explanation: "Role-based access control, using an allow model, grants all of the permissions assigned in all of the assigned roles."
- content: "Which Microsoft Entra tool can vary the credentials needed to log in based on signals, such as where the user is located?"
21
+
choices:
22
+
- content: "Conditional Access"
23
+
isCorrect: true
24
+
explanation: "Conditional Access is a tool that Microsoft Entra ID uses to allow (or deny) access to resources based on identity signals. Conditional Access might challenge you for a second authentication factor if your sign-in signals are unusual or from an unexpected location."
25
+
- content: "Guest access"
26
+
isCorrect: false
27
+
explanation: "Guest access is an access method that helps enable collaboration across organizational boundaries, but isn’t an authentication method or a tool to help with authentication."
28
+
- content: "Passwordless"
29
+
isCorrect: false
30
+
explanation: "Passwordless is an authentication method that relies on something you have; plus something you are or something you know. For example, Windows Hello is a passwordless authentication method."
31
+
- content: "Which security model assumes the worst-case security scenario, and protects resources accordingly?"
32
+
choices:
33
+
- content: "Zero Trust"
34
+
isCorrect: true
35
+
explanation: "Zero Trust is a security model that assumes the worst case scenario and protects resources with that expectation."
36
+
- content: "Defense-in-depth"
37
+
isCorrect: false
38
+
explanation: "Defense-in-depth is focused on setting up a system that prevents access to information by unauthorized parties. It’s a proactive model and builds layer upon layer to protect information."
39
+
- content: "Role-based access control"
40
+
isCorrect: false
41
+
explanation: "Role-based access control provides the ability to grant or deny access based on a user or services assigned role."
42
+
- content: "A user is simultaneously assigned multiple roles that use role-based access control. What are their actual permissions? The role permissions are: Role 1 - read || Role 2 - write || Role 3 - read and write."
43
+
choices:
44
+
- content: "Read only"
45
+
isCorrect: false
46
+
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
47
+
- content: "Write only"
48
+
isCorrect: false
49
+
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
50
+
- content: "Read and write"
51
+
isCorrect: true
52
+
explanation: "Role-based access control, using an allow model, grants all of the permissions assigned in all of the assigned roles."
53
+
- content: "Which Azure service is designed to securely store secrets, certificates, and encryption keys for your applications?"
54
+
choices:
55
+
- content: "Azure Key Vault"
56
+
isCorrect: true
57
+
explanation: "Azure Key Vault is used to securely store and manage secrets, certificates, and keys."
58
+
- content: "Azure Policy"
59
+
isCorrect: false
60
+
explanation: "Azure Policy helps enforce governance rules, but it doesn't store application secrets or encryption keys."
61
+
- content: "Azure Monitor"
62
+
isCorrect: false
63
+
explanation: "Azure Monitor provides telemetry and observability, not key and secret storage."
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/describe-azure-identity-access-security/includes/1-introduction.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
In this module, you’ll be introduced to the Azure identity, access, and security services and tools. You’ll learn about directory services in Azure, authentication methods, and access control. You’ll also cover things like Zero Trust and defense in depth, and how they keep your cloud safer. You’ll wrap up with an introduction to Microsoft Defender for Cloud.
1
+
In this module, you'll be introduced to the Azure identity, access, and security services and tools. You'll learn about directory services in Azure, authentication methods, and access control. You'll also cover Zero Trust, defense in depth, and how they keep your cloud safer. Finally, you'll review encryption concepts, key management with Azure Key Vault, and Microsoft Defender for Cloud.
2
2
3
3
## Learning objectives
4
4
@@ -11,4 +11,5 @@ After completing this module, you’ll be able to:
11
11
- Describe Azure Role Based Access Control (RBAC).
12
12
- Describe the concept of Zero Trust.
13
13
- Describe the purpose of the defense in depth model.
14
+
- Describe encryption concepts and key management options in Azure.
14
15
- Describe the purpose of Microsoft Defender for Cloud.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/describe-azure-identity-access-security/includes/11-summary.md
+13-1Lines changed: 13 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
In this module, you learned about Azure identity, access, and security services and tools. You covered authentication methods, including which ones are more secure. You learned about restricting access based on a role to help create a more secure environment. And, you learned about the Defense In Depth and Zero Trust models.
1
+
In this module, you learned about Azure identity, access, and security services and tools. You covered authentication methods, including which ones are more secure. You learned about restricting access based on a role to help create a more secure environment. You also reviewed encryption concepts and key management options in Azure. And, you learned about the Defense In Depth and Zero Trust models.
2
2
3
3
## Learning objectives
4
4
@@ -11,8 +11,20 @@ You should now be able to:
11
11
- Describe Azure Role Based Access Control (RBAC).
12
12
- Describe the concept of Zero Trust.
13
13
- Describe the purpose of the defense in depth model.
14
+
- Describe encryption concepts and key management options in Azure.
14
15
- Describe the purpose of Microsoft Defender for Cloud.
15
16
16
17
## Additional resources
17
18
18
19
The following resources provide more information on topics in this module or related to this module.<br>[Microsoft Certified: Security, Compliance, and Identity Fundamentals](/learn/certifications/security-compliance-and-identity-fundamentals/) is an entire certification, with associated training, dedicated to helping you better understand and manage Security, Compliance, and identity.
20
+
21
+
## Explore with Copilot
22
+
23
+
> [!TIP]
24
+
> Try one of these prompts in Copilot Chat:
25
+
>
26
+
> - "Use one end-to-end scenario to show how SSO, MFA, Conditional Access, and RBAC work together in a Zero Trust design."
27
+
> - "Explain the difference between Microsoft Entra ID, Microsoft Entra Domain Services, and external identities with practical examples."
28
+
> - "Simulate a security incident and show how encryption, key management, defense in depth, and Microsoft Defender for Cloud reduce risk."
Microsoft Entra ID is a directory service that enables you to sign in and access both Microsoft cloud applications and cloud applications that you develop. Microsoft Entra ID can also help you maintain your on-premises Active Directory deployment.
1
+
Microsoft Entra ID is Microsoft's cloud-based identity and access management service. It lets you sign in and access both Microsoft cloud applications and cloud applications that you develop.
2
2
3
-
For on-premises environments, Active Directory running on Windows Server provides an identity and access management service that's managed by your organization. Microsoft Entra ID is Microsoft's cloud-based identity and access management service. With Microsoft Entra ID, you control the identity accounts, but Microsoft ensures that the service is available globally. If you've worked with Active Directory, Microsoft Entra ID will be familiar to you.
3
+
If you've worked with on-premises Active Directory, Microsoft Entra ID will feel familiar. The key difference is that you control the identity accounts while Microsoft ensures the service is available globally.
4
4
5
-
When you secure identities on-premises with Active Directory, Microsoft doesn't monitor sign-in attempts. When you connect Active Directory with Microsoft Entra ID, Microsoft can help protect you by detecting suspicious sign-in attempts at no extra cost. For example, Microsoft Entra ID can detect sign-in attempts from unexpected locations or unknown devices.
5
+
Connecting the two unlocks extra protection. On its own, on-premises Active Directorydoesn't monitor sign-in behavior. Once connected to Microsoft Entra ID, Microsoft can detect suspicious sign-in attempts at no extra cost — for example, sign-ins from unexpected locations or unknown devices.
6
6
7
7
## Who uses Microsoft Entra ID?
8
8
9
9
Microsoft Entra ID is for:
10
10
11
-
-**IT administrators**. Administrators can use Microsoft Entra ID to control access to applications and resources based on their business requirements.
11
+
-**IT administrators**. Administrators can use Microsoft Entra ID to control access to applications and resources based on workload and security requirements.
12
12
-**App developers**. Developers can use Microsoft Entra ID to provide a standards-based approach for adding functionality to applications that they build, such as adding SSO functionality to an app or enabling an app to work with a user's existing credentials.
13
13
-**Users**. Users can manage their identities and take maintenance actions like self-service password reset.
14
14
-**Online service subscribers**. Microsoft 365, Microsoft Office 365, Azure, and Microsoft Dynamics CRM Online subscribers are already using Microsoft Entra ID to authenticate into their account.
@@ -17,24 +17,26 @@ Microsoft Entra ID is for:
17
17
18
18
Microsoft Entra ID provides services such as:
19
19
20
-
-**Authentication**: This includes verifying identity to access applications and resources. It also includes providing functionality such as self-service password reset, multifactor authentication, a custom list of banned passwords, and smart lockout services.
21
-
-**Single sign-on**: Single sign-on (SSO) enables you to remember only one username and one password to access multiple applications. A single identity is tied to a user, which simplifies the security model. As users change roles or leave an organization, access modifications are tied to that identity, which greatly reduces the effort needed to change or disable accounts.
22
-
-**Application management**: You can manage your cloud and on-premises apps by using Microsoft Entra ID. Features like Application Proxy, SaaS apps, the My Apps portal, and single sign-on provide a better user experience.
23
-
-**Device management**: Along with accounts for individual people, Microsoft Entra ID supports the registration of devices. Registration enables devices to be managed through tools like Microsoft Intune. It also allows for device-based Conditional Access policies to restrict access attempts to only those coming from known devices, regardless of the requesting user account.
20
+
-**Authentication** — Verifies identity before granting access. Includes self-service password reset, multifactor authentication, banned password lists, and smart lockout.
21
+
-**Single sign-on (SSO)** — Lets one identity access multiple applications. SSO benefits and behavior are covered in the authentication methods unit.
22
+
-**Application management** — Manages cloud and on-premises apps through features like Application Proxy, SaaS app integration, and the My Apps portal.
23
+
-**Device management** — Supports device registration and management through tools like Microsoft Intune. Enables device-based Conditional Access policies that restrict access to known devices.
24
+
25
+
:::image type="content" source="../media/directory-services-option-entra-capabilities-hub.png" alt-text="Diagram showing Microsoft Entra ID at the center with spokes connecting to Authentication, Single Sign-On, App Management, and Device Management capabilities.":::
24
26
25
27
## Can I connect my on-premises AD with Microsoft Entra ID?
26
28
27
-
If you had an on-premises environment running Active Directory and a cloud deployment using Microsoft Entra ID, you would need to maintain two identity sets. However, you can connect Active Directory with Microsoft Entra ID, enabling a consistent identity experience between cloud and on-premises.
29
+
Without a connection, an on-premises Active Directory deployment and a cloud Microsoft Entra ID deployment require you to maintain two separate identity sets. Microsoft Entra Connect bridges that gap.
28
30
29
-
One method of connecting Microsoft Entra ID with your on-premises AD is using Microsoft Entra Connect. Microsoft Entra Connect synchronizes user identities between on-premises Active Directory and Microsoft Entra ID. Microsoft Entra Connect synchronizes changes between both identity systems, so you can use features like SSO, multifactor authentication, and self-service password reset under both systems.
31
+
Microsoft Entra Connectsynchronizes user identities between on-premises Active Directory and Microsoft Entra ID. Because changes flow between both systems, users get a consistent experience — including SSO, multifactor authentication, and self-service password reset — whether they're accessing on-premises or cloud resources.
30
32
31
33
## What is Microsoft Entra Domain Services?
32
34
33
-
Microsoft Entra Domain Services is a service that provides managed domain services such as domain join, group policy, lightweight directory access protocol (LDAP), and Kerberos/NTLM authentication. Just like Microsoft Entra ID lets you use directory services without having to maintain the infrastructure supporting it, with Microsoft Entra Domain Services, you get the benefit of domain services without the need to deploy, manage, and patch domain controllers (DCs) in the cloud.
35
+
Microsoft Entra Domain Services provides managed domain services — domain join, group policy, LDAP, and Kerberos/NTLM authentication — without requiring you to deploy or maintain domain controllers in the cloud.
34
36
35
-
A Microsoft Entra Domain Services managed domain lets you run legacy applications in the cloud that can't use modern authentication methods, or where you don't want directory lookups to always go back to an on-premises AD DS environment. You can lift and shift those legacy applications from your on-premises environment into a managed domain, without needing to manage the AD DS environment in the cloud.
37
+
This is especially useful for legacy applications that can't use modern authentication. You can lift and shift those applications from on-premises into a managed domain without managing an AD DS environment in the cloud.
36
38
37
-
Microsoft Entra Domain Services integrates with your existing Microsoft Entra tenant. This integration lets users sign into services and applications connected to the managed domain using their existing credentials. You can also use existing groups and user accounts to secure access to resources. These features provide a smoother lift-and-shift of on-premises resources to Azure.
39
+
Because Microsoft Entra Domain Services integrates with your existing Microsoft Entra tenant, users can sign in to the managed domain with their existing credentials. Existing groups and user accounts also carry over, providing a smoother migration path.
38
40
39
41
### How does Microsoft Entra Domain Services work?
40
42
@@ -46,7 +48,8 @@ You don't need to manage, configure, or update these DCs. The Azure platform han
46
48
47
49
A managed domain is configured to perform a one-way synchronization from Microsoft Entra ID to Microsoft Entra Domain Services. You can create resources directly in the managed domain, but they aren't synchronized back to Microsoft Entra ID. In a hybrid environment with an on-premises AD DS environment, Microsoft Entra Connect synchronizes identity information with Microsoft Entra ID, which is then synchronized to the managed domain.
48
50
49
-
:::image type="content" source="../media/azure-active-directory-sync-topology-7359f2b8-427db2d4.png" alt-text="Diagram of Microsoft Entra Connect Sync synchronizing information back to the Microsoft Entra tenant from on-premises AD.":::
51
+
:::image type="content" source="../media/directory-services-option-sync-architecture.png" alt-text="Diagram showing the identity sync flow from on-premises Active Directory through Microsoft Entra Connect to Microsoft Entra ID and Domain Services.":::
50
52
51
53
52
54
Applications, services, and VMs in Azure that connect to the managed domain can then use common Microsoft Entra Domain Services features such as domain join, group policy, LDAP, and Kerberos/NTLM authentication.
0 commit comments