Skip to content

Commit d5d3d20

Browse files
authored
Merge pull request #53394 from ceperezb/CEPEREZB-sc100-design-identity-access-solutions
update unit 2 and create new unit
2 parents 9c80234 + cd43b63 commit d5d3d20

9 files changed

Lines changed: 248 additions & 91 deletions

learn-pr/wwl-sci/design-solutions-identity-access-management/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: "Introduction to designing identity and access management solutions for security architects."
7-
ms.date: 01/30/2026
7+
ms.date: 02/07/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-identity-access-management.design-cloud-hybrid-multi-cloud-access-strategies
3-
title: Design cloud, hybrid, and multicloud access strategies
3+
title: Design a solution for access to SaaS, PaaS, IaaS, hybrid, and multicloud resources
44
metadata:
5-
title: Design cloud, hybrid, and multicloud access strategies
6-
description: "Design access strategies for SaaS, PaaS, IaaS, hybrid, and multicloud environments using Microsoft Entra ID."
7-
ms.date: 01/30/2026
5+
title: Design a solution for access to SaaS, PaaS, IaaS, hybrid, and multicloud resources
6+
description: "Design access strategies for SaaS, PaaS, IaaS, hybrid, and multicloud resources using identity, networking, and application controls."
7+
ms.date: 02/07/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 7
11+
durationInMinutes: 8
1212
content: |
1313
[!include[](includes/2-design-cloud-hybrid-multi-cloud-access-strategies.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.design-solutions-identity-access-management.design-solution-entra-hybrid-multicloud
3+
title: Design a solution for Microsoft Entra ID, including hybrid and multicloud environments
4+
metadata:
5+
title: Design a solution for Microsoft Entra ID, including hybrid and multicloud environments
6+
description: "Design a Microsoft Entra ID solution for hybrid and multicloud environments, including directory synchronization, authentication methods, and multicloud federation."
7+
ms.date: 02/07/2026
8+
author: ceperezb
9+
ms.author: ceperezb
10+
ms.topic: unit
11+
ai-usage: ai-generated
12+
durationInMinutes: 9
13+
content: |
14+
[!include[](includes/2a-design-solution-entra-hybrid-multicloud.md)]

learn-pr/wwl-sci/design-solutions-identity-access-management/9-summary.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Summary
44
metadata:
55
title: Summary
66
description: "Summary of identity and access management design for security architects."
7-
ms.date: 01/30/2026
7+
ms.date: 02/07/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit

learn-pr/wwl-sci/design-solutions-identity-access-management/includes/1-introduction.md

Lines changed: 17 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,30 @@
1-
Identity is the foundation of security in cloud and hybrid environments. As a security architect, you design identity and access management solutions that verify users and workloads, control access to resources, and protect against identity-based attacks.
2-
3-
This module covers the key identity and access management decisions security architects face when designing secure environments. You learn how to design access strategies for different deployment models, enable secure collaboration with external identities, implement modern authentication, and protect both cloud and on-premises identity infrastructure.
1+
Identity is the primary security perimeter in cloud and hybrid environments. As a cybersecurity architect, you're responsible for designing identity and access management solutions that verify every user and workload, control access to resources, and protect against identity-based attacks.
42

53
## Scenario
64

7-
Your organization is modernizing its identity infrastructure to support cloud adoption while maintaining security for existing on-premises systems. You need to design solutions that:
5+
Your organization is expanding its cloud footprint across Azure, AWS, and GCP while maintaining on-premises Active Directory infrastructure. The security team needs an identity architecture that:
86

9-
- Enable secure access to SaaS, PaaS, and IaaS resources
10-
- Support collaboration with external partners and customers
11-
- Implement adaptive authentication that responds to risk
12-
- Protect Active Directory Domain Services from credential-based attacks
13-
- Centrally manage secrets, keys, and certificates
7+
- Controls access to SaaS, PaaS, and IaaS resources through identity, networking, and application controls
8+
- Extends Microsoft Entra ID across hybrid and multicloud environments
9+
- Enables secure collaboration with external partners and customers
10+
- Implements modern authentication strategies that adapt to risk
11+
- Enforces Zero Trust principles through Conditional Access policies
12+
- Hardens Active Directory Domain Services against credential-based attacks
13+
- Centrally manages secrets, keys, and certificates
1414

15-
As the security architect, you design the identity architecture that balances security requirements with user productivity while supporting Zero Trust principles.
15+
As the cybersecurity architect, you design the identity and access management solutions that balance security with productivity across this complex environment.
1616

1717
## Learning objectives
1818

1919
By the end of this module, you're able to:
2020

21-
- Design access strategies for cloud, hybrid, and multicloud environments, including secure collaboration with external identities
22-
- Design modern authentication and authorization strategies aligned with Zero Trust principles
23-
- Design solutions for securing identity infrastructure, including Active Directory Domain Services and secrets management
21+
- Design access strategies for SaaS, PaaS, IaaS, hybrid, and multicloud resources using identity, networking, and application controls
22+
- Design a solution for Microsoft Entra ID, including hybrid and multicloud environments
23+
- Design a solution for external identities, including B2B collaboration and customer identity
24+
- Design modern authentication and authorization strategies
25+
- Validate Conditional Access alignment with Zero Trust
26+
- Specify requirements for securing Active Directory Domain Services
27+
- Design a solution for managing secrets, keys, and certificates
2428

2529
## Prerequisites
2630

Lines changed: 69 additions & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -1,91 +1,103 @@
1-
As organizations adopt cloud services across SaaS, PaaS, and IaaS models while maintaining on-premises infrastructure, security architects must design identity solutions that provide secure, consistent access across all environments. This unit provides guidance for designing access strategies that span cloud, hybrid, and multicloud scenarios.
1+
Organizations today operate across SaaS, PaaS, IaaS, hybrid, and multicloud environments. Securing access to resources in these diverse environments requires a coordinated strategy that addresses three control planes: identity, networking, and application controls. This unit helps you design access solutions that apply Zero Trust principles across all deployment models.
22

3-
## Access strategy design considerations
3+
## Design considerations for access across deployment models
44

5-
When designing access strategies, consider the level of integration required with existing identity infrastructure:
5+
Each deployment model presents distinct access challenges. Your access strategy should address how users and workloads authenticate, how network traffic reaches resources, and how applications enforce authorization.
66

7-
| Scenario | Characteristics | Design Approach |
8-
|----------|----------------|-----------------|
9-
| **Cloud-only** | No on-premises directory; cloud-native workloads | Microsoft Entra ID as the sole identity provider |
10-
| **Hybrid** | Existing on-premises AD; mix of cloud and on-premises resources | Directory synchronization with Microsoft Entra Connect |
11-
| **Multicloud** | Resources across Azure, AWS, GCP, and other clouds | Federated identity with Microsoft Entra ID as primary provider |
7+
| Deployment model | Identity controls | Networking controls | Application controls |
8+
|-----------------|-------------------|--------------------|--------------------|
9+
| **SaaS** | SSO federation, Conditional Access | Secure Web Gateway, tenant restrictions | Cloud Access Security Broker (CASB), app consent policies |
10+
| **PaaS** | Managed identities, RBAC | Private endpoints, VNet integration | API authentication, token validation |
11+
| **IaaS** | Entra ID authentication, PIM | NSGs, Azure Firewall, Private Link | Application Proxy, host-based controls |
12+
| **Hybrid/on-premises** | Directory synchronization, federation | VPN/ExpressRoute, Private Access | Application Proxy, Kerberos constrained delegation |
13+
| **Multicloud** | Federated identity, workload identity federation | Cross-cloud network peering, Internet Access | Conditional Access across cloud providers |
1214

13-
Your access strategy should address authentication methods, authorization models, and the principle of least privilege across all environments.
15+
## Identity controls
1416

17+
Identity controls determine who or what can access resources and under what conditions.
1518

16-
## Designing for SaaS application access
19+
### User identity
1720

18-
SaaS applications require secure authentication without exposing credentials to third parties. Design your SaaS access strategy to:
21+
Use Microsoft Entra ID as the primary identity provider across all environments. Key design decisions include:
1922

20-
- **Integrate applications with Microsoft Entra ID** - Use SAML, OAuth 2.0, or OpenID Connect for single sign-on (SSO)
21-
- **Enforce Conditional Access** - Apply policies based on user risk, device compliance, and location
22-
- **Implement application governance** - Use Microsoft Defender for Cloud Apps to discover shadow IT and govern sanctioned applications
23+
- **Single sign-on (SSO)** for SaaS applications using SAML, OAuth 2.0, or OpenID Connect. Microsoft Entra ID provides a gallery of preintegrated applications and supports custom app registrations.
24+
- **Azure role-based access control (RBAC)** for authorization to PaaS and IaaS resources. Assign roles at the narrowest scope necessary.
25+
- **Privileged Identity Management (PIM)** for just-in-time access to sensitive roles, reducing standing administrative privileges.
26+
- **Conditional Access** policies that evaluate signals like user risk, device compliance, location, and application sensitivity before granting access.
2327

24-
Microsoft Entra ID provides a gallery of pre-integrated applications and supports custom application registration for applications that support modern authentication protocols.
28+
### Workload identity
2529

26-
## Designing for PaaS and IaaS access
30+
Applications, services, and automation pipelines also need identities. Design for:
2731

28-
Platform and infrastructure services require both user and workload identity management. Key design considerations include:
32+
- **Managed identities** to eliminate credential management for Azure resources that access other Azure services.
33+
- **Workload identity federation** to enable external workloads, such as GitHub Actions or Kubernetes pods, to access Azure resources without storing secrets.
34+
- **Service principals with certificates** for automation scenarios that require explicit credential management. Avoid long-lived client secrets.
2935

30-
### User access to Azure resources
36+
## Networking controls
3137

32-
- Use Microsoft Entra ID for authentication to the Azure portal, CLI, and APIs
33-
- Implement Azure role-based access control (RBAC) for authorization
34-
- Apply Conditional Access policies to protect administrative access
35-
- Use Privileged Identity Management (PIM) for just-in-time privileged access
38+
Networking controls determine how traffic flows between users, devices, and resources. Microsoft Entra's Security Service Edge (SSE) solution, called Global Secure Access, provides identity-aware network security.
3639

37-
### Workload identity access
40+
### Microsoft Entra Internet Access
3841

39-
Applications and services need identities to access other resources. Design for:
42+
Microsoft Entra Internet Access is an identity-based Secure Web Gateway (SWG) that protects access to SaaS applications and internet destinations. Use it to:
4043

41-
- **Managed identities** - Eliminate credential management for Azure resources accessing other Azure services
42-
- **Workload identity federation** - Enable external workloads (GitHub Actions, Kubernetes) to access Azure resources without storing secrets
43-
- **Service principals** - Use for automation scenarios requiring explicit credential management
44+
- Apply web content filtering based on categories or fully qualified domain names (FQDNs).
45+
- Enforce Conditional Access policies for internet traffic, even for destinations not federated with Microsoft Entra ID.
46+
- Enable universal tenant restrictions to prevent data exfiltration to unauthorized tenants or personal accounts.
4447

45-
## Designing for hybrid environments
48+
### Microsoft Entra Private Access
4649

47-
When your organization maintains both on-premises Active Directory and cloud resources, you need directory synchronization to provide a consistent identity experience.
50+
Microsoft Entra Private Access replaces traditional VPNs with Zero Trust Network Access (ZTNA). Use it to:
4851

49-
### Microsoft Entra Connect Sync
52+
- Provide per-app access to on-premises and IaaS-hosted private applications based on Conditional Access policies.
53+
- Eliminate broad network access by routing only authorized traffic to specific applications.
54+
- Secure access across hybrid and multicloud environments without requiring users to connect to corporate networks.
5055

51-
Microsoft Entra Connect Sync synchronizes users, groups, and credentials between on-premises AD and Microsoft Entra ID. Design your synchronization strategy to:
56+
### Additional network controls
5257

53-
- Determine which objects to synchronize based on organizational structure
54-
- Choose the appropriate authentication method (password hash sync, pass-through authentication, or federation)
55-
- Plan for high availability using multiple provisioning agents
58+
For PaaS and IaaS resources, layer network controls alongside identity controls:
5659

57-
Password hash synchronization provides the simplest deployment and enables features like leaked credential detection. Pass-through authentication keeps password validation on-premises, while federation with AD FS supports complex scenarios requiring on-premises policy evaluation.
60+
- **Azure Private Link and private endpoints** to ensure traffic to PaaS services stays on the Microsoft backbone network.
61+
- **Network security groups (NSGs)** and **Azure Firewall** to limit inbound and outbound traffic for IaaS workloads.
62+
- **ExpressRoute or site-to-site VPN** for dedicated connectivity between on-premises networks and Azure.
5863

59-
### Legacy application support
64+
## Application controls
6065

61-
Some applications require legacy authentication protocols like Kerberos or NTLM. Consider these options for supporting legacy authentication in hybrid environments:
66+
Application controls govern what apps users can access and how those apps handle data.
6267

63-
- **Microsoft Entra Domain Services** - Provides managed domain services (domain join, group policy, LDAP, Kerberos/NTLM) without deploying domain controllers
64-
- **Self-managed AD DS in Azure** - Deploy domain controllers in Azure VMs for full control over the directory
68+
### Microsoft Defender for Cloud Apps
6569

66-
Microsoft Entra Domain Services is appropriate for lift-and-shift scenarios where applications need domain services but don't require direct access to domain controllers.
70+
Microsoft Defender for Cloud Apps provides CASB capabilities to secure SaaS usage. Use it to:
6771

68-
## Designing for multicloud access
72+
- Discover shadow IT by identifying unsanctioned SaaS applications in use.
73+
- Apply session controls that restrict downloads, uploads, or copy/paste actions based on Conditional Access policies.
74+
- Monitor and govern sanctioned applications with real-time activity policies.
6975

70-
Organizations using multiple cloud providers need consistent identity management. Design your multicloud strategy to:
76+
### Microsoft Entra Application Proxy
7177

72-
- **Federate with Microsoft Entra ID** - Configure AWS, GCP, and other providers to trust Microsoft Entra ID as an identity provider
73-
- **Use Conditional Access** - Apply consistent access policies regardless of which cloud hosts the resource
74-
- **Implement cross-cloud governance** - Use Microsoft Entra Permissions Management to discover and remediate excessive permissions across clouds
78+
For on-premises web applications that can't be exposed directly to the internet, Application Proxy provides secure remote access. It integrates with Conditional Access to enforce MFA and device compliance checks for legacy web applications without modifying the application code.
7579

76-
## Security principles and controls for access strategies
80+
### Application consent and permissions
7781

78-
A Zero Trust approach provides the foundation for your access strategy design. Apply these principles and their corresponding security controls across all environments:
82+
Control which applications users can consent to by configuring app consent policies in Microsoft Entra ID. For applications that request high-privilege permissions, require admin consent to prevent users from inadvertently granting broad access to organizational data.
7983

80-
| Zero Trust Principle | Security Controls |
81-
|---------------------|-------------------|
82-
| **Verify explicitly** | Require phishing-resistant MFA for all users; enforce Conditional Access based on user risk, device compliance, and location; block legacy authentication protocols |
83-
| **Use least privilege** | Implement Azure RBAC with minimal permissions; use Privileged Identity Management (PIM) for just-in-time privileged access; configure time-limited access for sensitive roles |
84-
| **Assume breach** | Enable sign-in and audit logs; integrate with Microsoft Sentinel for security monitoring; require compliant or hybrid-joined devices; configure session controls and sign-in frequency |
84+
## Access strategy for multicloud environments
8585

86-
Beyond these core principles, consider these additional design guidelines:
86+
When resources span multiple cloud providers, establish Microsoft Entra ID as the central identity provider:
8787

88-
- **Consolidate identity providers** - Use Microsoft Entra ID as the primary identity provider across cloud, hybrid, and multicloud environments to simplify governance and ensure consistent policy enforcement
89-
- **Plan authentication evolution** - Design for phishing-resistant authentication methods like passkeys and certificate-based authentication, even if you can't deploy them immediately
90-
- **Address legacy systems** - Identify applications that can't use modern authentication and plan appropriate solutions (Microsoft Entra Domain Services, federation, or application proxy)
91-
- **Enable visibility** - Ensure all authentication events across all environments flow to centralized logging for security monitoring and incident response
88+
- **Federate AWS accounts** with Microsoft Entra ID through AWS IAM Identity Center for SSO and automated user lifecycle management.
89+
- **Federate Google Cloud** projects by configuring Google as a service provider that trusts Microsoft Entra ID for authentication.
90+
- **Use Conditional Access** to enforce consistent authentication policies regardless of which cloud provider hosts the resource, requiring MFA, device compliance, and risk evaluation for every sign-in.
91+
- **Monitor cross-cloud permissions** using Microsoft Defender for Cloud to identify overprovisioned identities and enforce least privilege across Azure, AWS, and GCP.
92+
93+
## Apply Zero Trust principles across all environments
94+
95+
A Zero Trust approach provides the foundation for your access strategy. Apply these principles across all control planes:
96+
97+
| Principle | How to apply |
98+
|-----------|-------------|
99+
| **Verify explicitly** | Require phishing-resistant MFA; enforce Conditional Access based on risk, device, and location; block legacy authentication |
100+
| **Use least privilege** | Implement RBAC with minimal permissions; use PIM for just-in-time access; right-size workload identity permissions |
101+
| **Assume breach** | Route traffic through Global Secure Access for inspection; integrate authentication events with Microsoft Sentinel; configure session controls and sign-in frequency |
102+
103+
When you design your access strategy, ensure all authentication events across all environments flow to centralized logging for security monitoring and incident response.

0 commit comments

Comments
 (0)