You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/design-authentication-authorization-solutions/includes/2-design-for-identity-access-management.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,8 +18,8 @@ As you look at your authentication and authorization options for Tailwind Trader
18
18
19
19
Your first step is to determine the ideal IAM solution for Tailwind Traders. The following table lists three basic choices. We'll look closely at these options in the next units.
20
20
21
-
-**Consider using Microsoft Entra ID**. Develop with [Microsoft Entra ID](https://azure.microsoft.com/services/active-directory/) for a solution that combines core directory services, application access management, and identity protection. Microsoft Entra ID provides an identity and access management system for Tailwind Traders employees that can operate in a cloud or hybrid environment.
21
+
-**Consider using Microsoft Entra ID**. Develop with [Microsoft Entra ID](/entra/identity/) for a solution that combines core directory services, application access management, and identity protection. Microsoft Entra ID provides an identity and access management system for Tailwind Traders employees that can operate in a cloud or hybrid environment.
22
22
23
23
-**Consider your business-to-business (B2B) requirements**. Support collaboration for guest users and external business partners of Tailwind Traders, such as suppliers and vendors. Build your solution with Microsoft Entra B2B (business-to-business) to support business-to-business operations.
24
24
25
-
-**Consider your business-to-customer scenarios**. Control how Tailwind Traders customers sign up, sign in, and manage their profiles when they use your apps. Use [Azure AD B2C (business-to-customer)](/azure/active-directory-b2c/overview) to develop a Microsoft Entra solution that supports customer-focused operations.
25
+
-**Consider your business-to-customer scenarios**. Control how Tailwind Traders customers sign up, sign in, and manage their profiles when they use your apps. Use Microsoft Entra External ID (external tenant configuration) to develop a Microsoft Entra solution that supports customer-focused operations. For existing Azure AD B2C deployments, B2C continues to be supported until at least May 2030.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/design-authentication-authorization-solutions/includes/3-design-for-azure-active-directory.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ Tailwind Traders plans to use Microsoft Entra ID in its identity management solu
30
30
31
31
-**Consider limiting account synchronization**. Don't synchronize accounts to Active Directory that have high privileges in your existing Microsoft Entra Tailwind Traders instance. By default, Microsoft Entra Connect filters out these high privileged accounts. This configuration mitigates the risk of adversaries pivoting from cloud to on-premises assets (which could result in a major incident).
32
32
33
-
-**Consider password hash synchronization**. Enable [password hash synchronization](/azure/active-directory/hybrid/whatis-phs) to sync user password hashes from on-premises to a cloud-based Microsoft Entra instance. This sync helps to protect Tailwind Traders against leaked credentials being replayed from previous sign-ins.
33
+
-**Consider phishing-resistant authentication methods**. Microsoft recommends designing passwordless phishing-resistant credentials, like security keys and passkeys. These methods use origin-bound public-key cryptography and satisfy MFA in a single step.
34
34
35
35
-**Consider single sign-on (SSO)**. Enable SSO to reduce the need for multiple passwords. Multiple passwords increase the likelihood of users reusing passwords or using weak passwords. With SSO, users provide their primary work or school account for their domain-joined devices and company resources. Their application access can be automatically provisioned (or deprovisioned) based on their Tailwind Traders organization group memberships and their status as an employee.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/design-authentication-authorization-solutions/includes/5-design-business-customer.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,6 +8,9 @@ After you set up your Azure AD B2C tenant, you must register your app. You use u
8
8
9
9
### Things to know about Azure AD B2C
10
10
11
+
> [!IMPORTANT]
12
+
> Azure AD B2C is no longer available for new customers as of May 1, 2025 and is supported until at least May 2030. For all new projects, use Microsoft Entra External ID.
13
+
11
14
You review the B2B features of Microsoft Entra ID and consider how they might be implemented in an identity solution for Tailwind Traders. Let's look at the customer features offered by Azure AD B2C.
12
15
13
16
- Azure AD B2C provides secure authentication for your customers by using their preferred identity providers.
@@ -38,7 +41,7 @@ Tailwind Traders wants to investigate how to implement identity management for u
38
41
39
42
Now that you have some basic knowledge about the Microsoft Entra identity solutions, let's compare the options for Tailwind Traders.
40
43
41
-
|<!-- Blank -->| Microsoft Entra B2B (business-to-business) | Azure AD B2C (business-to-customer) |
44
+
|<!-- Blank -->| Microsoft Entra B2B (business-to-business) |Microsoft Entra External ID / Azure AD B2C (legacy) |
42
45
| --- | --- | --- |
43
46
|**Define your focus**| Tailwind Traders wants to collaborate with business partners from external organizations like suppliers, partners, and vendors. You support users as guest users in your directory, and they might or might not use IT. | Tailwind Traders wants to engage with customers of their products. You manage users in a separate Microsoft Entra directory / tenant. |
44
47
|**Identify your users**| Your users represent a Tailwind Traders partner company, or be employees of Tailwind Traders. | Your users are customers of Tailwind Traders who represent themselves. |
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/design-authentication-authorization-solutions/includes/6-design-for-conditional-access.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,6 +44,13 @@ Tailwind Traders wants to implement Conditional Access into their identity solut
44
44
45
45
-**Consider blocking legacy authentication protocols**. Attackers exploit weaknesses in older protocols every day, particularly for password spray attacks. Configure Conditional Access to [block legacy protocols](/azure/active-directory/conditional-access/howto-conditional-access-policy-block-legacy) from accessing Tailwind Traders apps.
46
46
47
+
-**Consider per-policy impact reporting**: Each enabled policy now has a built-in impact graph in the Microsoft Entra admin center. A Log Analytics workspace isn’t required.
48
+
49
+
-**Consider Microsoft-managed Conditional Access policies**: Microsoft provides managed policies aligned to Secure Future Initiative. These policies can limit device code flow and legacy authentication.
50
+
51
+
-**Consider Conditional Access Optimization Agent**: AI-powered agent that monitors policy gaps and recommends fixes with one-click application (requires Microsoft Entra P1 + Security Copilot SCUs).
52
+
53
+
47
54
-**Consider running Report-only mode**. Run Report-only mode to predict the number and names of Tailwind Traders users who are affected with common deployment initiatives. Use Report-only mode to test blocking legacy authentication, requiring MFA, and implementing sign-in risk policies.
48
55
49
56
-**Consider using the What If tool**. Use the What If tool to test your proposed Conditional Access policies before you implement them.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/design-authentication-authorization-solutions/includes/7-design-for-identity-protection.md
+13-6Lines changed: 13 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
-
[Identity Protection](/azure/active-directory/identity-protection/overview-identity-protection)is a tool that allows organizations to accomplish three key tasks:
1
+
[Microsoft Entra ID Protection](/azure/active-directory/identity-protection/overview-identity-protection)helps organizations detect, investigate, and remediate identity-based risks.
2
2
3
3
-[Automate the detection and remediation of identity-based risks](/azure/active-directory/identity-protection/howto-identity-protection-configure-risk-policies).
4
4
5
5
-[Investigate risks](/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk) by using data in the Azure portal.
6
6
7
-
-[Export risk detection data](/azure/sentinel/connect-azure-ad-identity-protection)to other tools.
7
+
-[Export risk detection data](/azure/sentinel/connect-azure-ad-identity-protection)with Microsoft Sentinel data connector.
8
8
9
9
The signals that are generated and fed into Identity Protection can be exported to other tools. You learned how the Conditional Access tool can make decisions based on your organization's policies. By using Identity Protection, you can pass this information to a security information and event management (SIEM) tool for more investigation.
10
10
@@ -22,21 +22,26 @@ As the CTO of Tailwind Traders, you'd like to know how Identity Protection can b
22
22
23
23
:::image type="content" source="../media/risk-detections.png" alt-text="Diagram that shows risky users, risky sign-ins, and risk detections." border="false":::
24
24
25
-
-[**User risk**](/azure/active-directory/identity-protection/concept-identity-protection-risks) represents the probability that a given identity or account is compromised. An example is when a user's valid credentials are leaked. User risks are calculated offline by using Microsoft's internal and external threat intelligence sources. Here are some user risks that can be identified:
25
+
-**User risk** represents the probability that a given identity or account is compromised. An example is when a user's valid credentials are leaked. User risks are calculated offline by using Microsoft's internal and external threat intelligence sources. Here are some user risks that can be identified:
26
26
27
27
-**Leaked credentials**: Microsoft checks for leaked credentials from the dark web, paste sites, or other sources. These leaked credentials are checked against Microsoft Entra users' current valid credentials for valid matches.
28
28
29
29
-**Microsoft Entra threat intelligence**: This risk detection type indicates user activity that's unusual for the given user or is consistent with known attack patterns.
30
30
31
-
-[**Sign-in risk**](/azure/active-directory/identity-protection/concept-identity-protection-risks) represents the probability that a given sign-in (authentication request) isn't authorized by the identity owner. Sign-in risk can be calculated in real time or offline. Here are some sign-in risks that can be identified:
31
+
-**Sign-in risk** represents the probability that a given sign-in (authentication request) isn't authorized by the identity owner. Sign-in risk can be calculated in real time or offline. Here are some [sign-in risks](/azure/active-directory/identity-protection/concept-identity-protection-risks) that can be identified:
32
32
33
33
-**Anonymous IP address**: A sign-in attempt from an anonymous IP address like a Tor browser or an anonymized VPN.
34
34
35
35
-**Atypical travel**: Two sign-ins from the same user that originate from a geographically distant location. Given past behavior, at least one of the locations might also be atypical for the user.
36
36
37
-
-**Malware-linked IP address**: An infected IP address sign-in known to actively communicate with a bot server.
37
+
-**Malicious IP address**: Sign-in from an IP with high failure rates due to invalid credentials or known bad IP reputation.
38
+
39
+
-**Password spray**: A password spray attack is where multiple identities are attacked using common passwords in a unified brute force manner.
40
+
41
+
-**Anomalous token**: Abnormal token characteristics, such as unusual lifetime or token played from an unfamiliar location.
42
+
43
+
-**Verified threat actor IP**: Sign-in from an IP associated with known nation-state or cybercriminal threat actors.
38
44
39
-
-**Password spray**: A password spray attack where a bad actor tries to defeat lockout and detection by attempting sign-in with different user names and the same password.
40
45
41
46
### Things to consider when using Identity Protection
42
47
@@ -49,3 +54,5 @@ Tailwind Traders decides to implement Identity Protection into their security so
49
54
-**Consider investigating risks in the Azure portal**. Investigate Tailwind Traders risk events in the Azure portal and identify any weak areas in your security implementation. Download the risk events in .CSV format and view the output in the Security section of Microsoft Entra ID. Use the Microsoft Graph API integrations to aggregate your data with other sources.
50
55
51
56
-**Consider exporting your risk detection data**. Export the risk detection data for Tailwind Traders by using the Microsoft Sentinel data connector for Identity Protection.
57
+
58
+
-**Consider unified risk signals**: ID Protection can now ingest signals from Microsoft Defender alongside native detections to calculate a unified Identity Risk Score.
0 commit comments