Module1 Identity
Module1 Identity
Module1 Identity
Course Description
This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the
infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic,
implement storage solutions, create and scale virtual machines, implement web apps and containers, back up
and share data, and monitor your solution.
Level: Intermediate
Audience
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage,
networking, and compute cloud capabilities, with a deep understanding of each service across the full IT
lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use
for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role
requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they
become more proficient they use PowerShell and the Command Line Interface.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud
infrastructure, storage structures, and networking.
Expected learning
Secure identities with Azure Active Directory and users and groups.
Manage subscriptions, accounts, Azure policies, and Role-Based Access Control.
Administer Azure using the Resource Manager, Azure portal, Cloud Shell, Azure PowerShell, CLI, and
ARM templates.
Configure virtual networks including planning, IP addressing, Azure DNS, Network Security Groups,
and Azure Firewall.
Configure intersite connectivity solutions like VNet Peering, virtual network gateways, and Site-to-Site
VPN connections.
Manage network traffic using network routing and service endpoints, Azure load balancer, and Azure
Application Gateway.
Implement, manage and secure Azure storage accounts, blob storage, and Azure files with File Sync.
Plan, create, and scale virtual machines.
Administer Azure App Service, Azure Container Instances, and Kubernetes.
Backup files, folders, and virtual machines.
Monitor the Azure infrastructure with Azure Monitor, Azure alerts, Log Analytics, and Network
Watcher.
AZ-104 Certification Exam
The AZ-104, Microsoft Azure Administrator, certification exam is geared towards Azure Administrator
candidates who manage cloud services that span compute, networking, storage, security, and other cloud
capabilities within Microsoft Azure. These candidates should have a deep understanding of each service across
the full IT lifecycle; including infrastructure services, applications, and environments. They will also be able to
make recommendations on services to us for optimal performance and scale, including provision, size, monitor,
and adjust Azure resources.
The exam includes five study areas. The percentages indicate the relative weight of each area on the exam. The
higher the percentage, the more questions the exam will contain.
Microsoft Learn
Microsoft Learn provides self paced skills training on a variety of topics. These Learn modules cover the
content you have just learned. You can also search for additional content that might be helpful.
Module 01 - Identity
Create Azure users and groups in Azure Active Directory
Manage users and groups in Azure Active Directory
Secure your Azure resources with role-based access control
Secure Azure Active Directory users with Multi-Factor Authentication
Allow users to reset their password with Azure Active Directory self-service password reset
Secure your application by using OpenID Connect and Azure AD
Module 11 - Monitoring
Analyze your Azure infrastructure by using Azure Monitor logs
Improve incident response with alerting on Azure
Monitor the health of your Azure virtual machine by collecting and analyzing diagnostic data
Monitor, diagnose, and troubleshoot your Azure storage
Azure forums. The Azure forums are very active. You can search the threads for a specific area of
interest. You can also browse categories like Azure Storage, Pricing and Billing, Azure Virtual Machines,
and Azure Migrate.
Microsoft Learning Community Blog. Get the latest information about the certification tests and exam
study groups.
Channel 9. Channel 9 provides a wealth of informational videos, shows, and events.
Azure Tuesdays with Corey. Corey Sanders answers your questions about Microsoft Azure - Virtual
Machines, Web Sites, Mobile Services, Dev/Test etc.
Azure Fridays. Join Scott Hanselman as he engages one-on-one with the engineers who build the
services that power Microsoft Azure, as they demo capabilities, answer Scott's questions, and share their
insights.
Microsoft Azure Blog. Keep current on what's happening in Azure, including what's now in preview,
generally available, news & updates, and more.
Azure Documentation. Stay informed on the latest products, tools, and features. Get information on
pricing, partners, support, and solutions.
For application developers, Azure AD lets you focus on building your application by making it fast and simple
to integrate with a world class identity management solution used by millions of organizations around the
world.
✔️If you are an Office365, Azure or Dynamics CRM Online customer, you might not realize that you are
already using Azure AD. Every Office365, Azure and Dynamics CRM tenant is already an Azure AD tenant.
Whenever you want you can start using that tenant to manage access to thousands of other cloud applications
Azure AD integrates with.
Azure AD Concepts
Identity. A thing that can get authenticated. An identity can be a user with a username and password.
Identities also include applications or other servers that might require authentication through secret keys or
certificates.
Account. An identity that has data associated with it. You cannot have an account without an identity.
Azure AD Account. An identity created through Azure AD or another Microsoft cloud service, such as
Office 365. Identities are stored in Azure AD and accessible to your organization's cloud service
subscriptions. This account is also sometimes called a Work or school account.
Azure subscription. Used to pay for Azure cloud services. You can have many subscriptions and
they're linked to a credit card.
Azure tenant. A dedicated and trusted instance of Azure AD that's automatically created when your
organization signs up for a Microsoft cloud service subscription, such as Microsoft Azure, Microsoft
Intune, or Office 365. An Azure tenant represents a single organization.
Azure AD directory. Each Azure tenant has a dedicated and trusted Azure AD directory. The Azure
AD directory includes the tenant's users, groups, and apps and is used to perform identity and access
management functions for tenant resources.
✔️Azure AD is a managed service. You only manage the users, groups, and policies. Deploying AD DS with
virtual machines using Azure means that you manage the deployment, configuration, virtual machines,
patching, and other backend tasks.
Up to 10
Single Sign-On Up to 10 apps Unlimited Unlimited
apps
Premium Features X X
Hybrid Identities X X
Conditional Access X X
Identity Protection X
Identity Governance X
Azure Active Directory Free. Provides user and group management, on-premises directory synchronization,
basic reports, and single sign-on across Azure, Office 365, and many popular SaaS apps.
Azure Active Directory Office 365 Apps. This edition is included with O365. In addition to the Free features,
this edition provides Identity & Access Management for Office 365 apps including branding, MFA, group
access management, and self-service password reset for cloud users.
Azure Active Directory Premium P1. In addition to the Free features, P1 also lets your hybrid users access
both on-premises and cloud resources. It also supports advanced administration, such as dynamic groups, self-
service group management, Microsoft Identity Manager (an on-premises identity and access management suite)
and cloud write-back capabilities, which allow self-service password reset for your on-premises users.
Azure Active Directory Premium P2. In addition to the Free and P1 features, P2 also offers Azure Active
Directory Identity Protection to help provide risk-based Conditional Access to your apps and critical company
data and Privileged Identity Management to help discover, restrict, and monitor administrators and their access
to resources and to provide just-in-time access when needed.
✔️The Azure Active Directory Pricing page has detailed information on what is included in each of the
editions. Based on the feature list which edition does your organization need?
Azure AD Join
Azure Active Directory (Azure AD) enables single sign-on to devices, apps, and services from anywhere. The
proliferation of devices - including Bring Your Own Device (BYOD) – empowers end users to be productive
wherever and whenever. But, IT administrators must ensure corporate assets are protected and that devices meet
standards for security and compliance.
Azure AD Join is designed provide access to organizational apps and resources and to simply Windows
deployments of work-owned devices. AD Join has these benefits.
Single-Sign-On (SSO) to your Azure managed SaaS apps and services. Your users will not have
additional authentication prompts when accessing work resources. The SSO functionality is available even
when users are not connected to the domain network.
Enterprise compliant roaming of user settings across joined devices. Users don’t need to connect to a
Microsoft account (for example, Hotmail) to observe settings across devices.
Access to Microsoft Store for Business using an Azure AD account. Your users can choose from an
inventory of applications pre-selected by the organization.
Windows Hello support for secure and convenient access to work resources.
Restriction of access to apps from only devices that meet compliance policy.
Seamless access to on-premise resources when the device has line of sight to the on-premises domain
controller.
Connection options
To get a device under the control of Azure AD, you have two options:
Registering a device to Azure AD enables you to manage a device’s identity. When a device is
registered, Azure AD device registration provides the device with an identity that is used to authenticate the
device when a user signs-in to Azure AD. You can use the identity to enable or disable a device.
Joining a device is an extension to registering a device. This means, it provides you with all the benefits
of registering a device and in addition to this, it also changes the local state of a device. Changing the local
state enables your users to sign-in to a device using an organizational work or school account instead of a
personal account.
✔️Registration combined with a mobile device management (MDM) solution such as Microsoft Intune,
provides additional device attributes in Azure AD. This allows you to create conditional access rules that
enforce access from devices to meet your standards for security and compliance.
✔️Although AD Join is intended for organizations that do not have on-premises Windows Server Active
Directory infrastructure it can be used for other scenarios like branch offices.
For organizations that need to be compliant with industry standards, such as PCI DSS version 3.2, MFA is a
must have capability to authenticate users. Beyond being compliant with industry standards, enforcing MFA to
authenticate users can also help organizations to mitigate credential theft attacks.
The security of MFA two-step verification lies in its layered approach. Compromising multiple authentication
factors presents a significant challenge for attackers. Even if an attacker manages to learn the user's password, it
is useless without also having possession of the additional authentication method. Authentication methods
include:
Mitigate threats with real-time monitoring and alerts. MFA helps protect your business with security
monitoring and machine-learning-based reports that identify inconsistent sign-in patterns. To help mitigate
potential threats, real-time alerts notify your IT department of suspicious account credentials.
Use with Office 365, Salesforce, and more. MFA for Office 365 helps secure access to Office 365 applications
at no additional cost. Multi-Factor Authentication is also available with Azure Active Directory Premium and
thousands of software-as-a-service (SaaS) applications, including Salesforce, Dropbox, and other popular
services.
Add protection for Azure administrator accounts. MFA adds a layer of security to your Azure administrator
account at no additional cost. When it's turned on, you need to confirm your identity to create a virtual machine,
manage storage, or use other Azure services.
Authentication Methods
Method Description
Places an automated voice call. The user answers the call and presses # in the
phone keypad to authenticate. The phone number is not synchronized to on-
Call to phone premises Active Directory. A voice call to phone is important because it
persists through a phone handset upgrade, allowing the user to register the
mobile app on the new device.
Sends a text message that contains a verification code. The user is prompted
to enter the verification code into the sign-in interface. This process is called
Text message to one-way SMS. Two-way SMS means that the user must text back a
phone particular code. Two-way SMS is deprecated and not supported after
November 14, 2018. Users who are configured for two-way SMS are
automatically switched to call to phone verification at that time.
Sends a push notification to your phone or registered device. The user views
Notification
the notification and selects Approve to complete verification. The Microsoft
through mobile
Authenticator app is available for Windows Phone, Android, and iOS. Push
app
notifications through the mobile app provide the best user experience.
✔️There is also a selection to cache passwords so that users do not have to authenticate on trusted devices. The
number of days before a user must re-authenticate on trusted devices can also be configured with the value from
1 to 60 days. The default is 14 days.
For more information, Multi-Factor Authentication
To configure Self-Service Password Reset, you first determine who will be enabled to use self-service password
reset. From your existing Azure AD tenant, on the Azure Portal under Azure Active
Directory select Password reset.
The Selected option is useful for creating specific groups who have self-service password reset enabled. The
Azure documentation recommends creating a specific group for purposes of testing or proof of concept before
deploying to a larger group within the Azure AD tenant. Once you are ready to deploy this functionality to all
users with accounts in your AD Tenant, you can change the setting to All.
Authentication methods
After enabling password reset for user and groups, you pick the number of authentication methods required to
reset a password and the number of authentication methods available to users.
At least one authentication method is required to reset a password, but it is a good idea to have additional
methods available. You can choose from email notification, a text or code sent to user’s mobile or office phone,
or a set of security questions.
Regarding the security questions, these can be configured to require a certain number of questions to be
registered for the users in your AD tenant. In addition, you must configure the number of correctly answered
security question that are required for a successful password reset. There are a large number of security
questions. Note that security questions can be less secure than other methods because some people might know
the answers to another user's questions.
✔️Azure Administrator accounts will always be able to reset their passwords no matter what this option is set
to.
User accounts
To view the Azure AD users, simply access the All users blade.
Typically, Azure AD defines users in three ways:
Cloud identities. These users exist only in Azure AD. Examples are administrator accounts and users
that you manage yourself. Their source is Azure Active Directory or External Azure Active Directory if the
user is defined in another Azure AD instance but needs access to subscription resources controlled by this
directory. When these accounts are removed from the primary directory, they are deleted.
Directory-synchronized identities. These users exist in an on-premises Active Directory. A
synchronization activity that occurs via Azure AD Connect brings these users in to Azure. Their source is
Windows Server AD.
Guest users. These users exist outside Azure. Examples are accounts from other cloud providers and
Microsoft accounts such as an Xbox LIVE account. Their source is Invited user. This type of account is
useful when external vendors or contractors need access to your Azure resources. Once their help is no
longer necessary, you can remove the account and all of their access.
✔️Have you given any thought as to the type of users you will need?
Azure Portal
You can add new users through the Azure Portal. In addition to Name and User name, there is profile
information like Job Title and Department.
Things to consider when managing users:
✔️Users can also be added to Azure AD through Office 365 Admin Center, Microsoft Intune admin console,
and the CLI. How do you plan to add users?
If you are going to use a CSV file here are some things to think about:
Naming conventions. Establish or implement a naming convention for usernames, display names and
aliases. For example, a user name could consist of last name, period, first name: [email protected].
Passwords. Implement a convention for the initial password of the newly created user. Figure out a way
for the new users to receive their password in a secure way. Methods commonly used for this are generating
a random password and emailing it to the new user or their manager.
Group Accounts
Azure AD allows you to define two different types of groups.
Security groups. These are the most common and are used to manage member and computer access to
shared resources for a group of users. For example, you can create a security group for a specific security
policy. By doing it this way, you can give a set of permissions to all the members at once, instead of having
to add permissions to each member individually. This option requires an Azure AD administrator.
Office 365 groups. These groups provide collaboration opportunities by giving members access to a
shared mailbox, calendar, files, SharePoint site, and more. This option also lets you give people outside of
your organization access to the group. This option is available to users as well as admins.
Assigned. Lets you add specific users to be members of this group and to have unique permissions.
Dynamic User. Lets you use dynamic membership rules to automatically add and remove members. If a
member's attributes change, the system looks at your dynamic group rules for the directory to see if the
member meets the rule requirements (is added) or no longer meets the rules requirements (is removed).
Dynamic Device (Security groups only). Lets you use dynamic group rules to automatically add and
remove devices. If a device's attributes change, the system looks at your dynamic group rules for the
directory to see if the device meets the rule requirements (is added) or no longer meets the rules
requirements (is removed).
✔️Have you given any thought to which groups you need to create? Would you directly assign or dynamically
assign membership?
Azure AD Connect
Azure AD Connect will integrate your on-premises directories with Azure Active Directory. This allows you to
provide a common identity for your users for Office 365, Azure, and SaaS applications integrated with Azure
AD.
Password hash synchronization. A sign-in method that synchronizes a hash of a users on-premises AD
password with Azure AD.
Pass-through authentication. A sign-in method that allows users to use the same password on-
premises and in the cloud, but doesn't require the additional infrastructure of a federated environment.
Federation integration. Federation is an optional part of Azure AD Connect and can be used to
configure a hybrid environment using an on-premises AD FS infrastructure. It also provides AD FS
management capabilities such as certificate renewal and additional AD FS server deployments.
Synchronization. Responsible for creating users, groups, and other objects. As well as, making sure
identity information for your on-premises users and groups is matching the cloud. This synchronization also
includes password hashes.
Health Monitoring. Azure AD Connect Health can provide robust monitoring and provide a central
location in the Azure portal to view this activity.
For more information, Integrate your on-premises directories with Azure Active Directory
Monitor and gain insights into AD FS servers, Azure AD Connect, and AD domain controllers.
Monitor and gain insights into the synchronizations that occur between your on-premises AD DS and
Azure AD.
Monitor and gain insights into your on-premises identity infrastructure that is used to access Office 365
or other Azure AD applications
With Azure AD Connect the key data you need is easily accessible. You can view and act on alerts, setup email
notifications for critical alerts, and view performance data.
✔️Using AD Connect Health works by installing an agent on each of your on-premises sync servers.
Resource independence
If you create or delete a resource in one tenant, it has no impact on any resource in another tenant, with
the partial exception of external users.
If you use one of your domain names with one tenant, it cannot be used with any other tenant.
Administrative independence
By default, the user who creates a tenant is added as an external user in that new tenant, and assigned the
global administrator role in that tenant.
The administrators of tenant ‘Contoso’ have no direct administrative privileges to tenant 'Test,' unless an
administrator of ‘Test’ specifically grants them these privileges. However, administrators of 'Contoso' can
control access to tenant ‘Test’ if they control the user account that created 'Test.'
If you add/remove an administrator role for a user in one tenant, the change does not affect the
administrator roles that the user has in another tenant.
Synchronization independence
You can configure each Azure AD tenant independently to get data synchronized from a single instance of
either:
To add an Azure AD tenant in the Azure portal, sign in to the Azure portal with an account that is an Azure AD
global administrator, and, on the left, select New.
Note: Unlike other Azure resources, your tenants are not child resources of an Azure subscription. If your
Azure subscription is canceled or expired, you can still access your tenant data using Azure PowerShell, the
Microsoft Graph API, or the Microsoft 365 admin center. You can also associate another subscription with the
tenant.
Azure AD B2C
Azure Active Directory B2C provides business-to-customer identity as a service. Your customers use their
preferred social, enterprise, or local account identities to get single sign-on access to your applications and
APIs. Azure Active Directory B2C (Azure AD B2C) is a customer identity access management (CIAM)
solution capable of supporting millions of users and billions of authentications per day. It takes care of the
scaling and safety of the authentication platform, monitoring and automatically handling threats like denial-of-
service, password spray, or brute force attacks.
You invite users from other social media Identity Tenants into your own organization tenant.
User provisioning is done by the invited party; you are in control to invite the other side’s users.
Standards-based authentication protocols are used including OpenID Connect, OAuth 2.0, and SAML.
Integrates with most modern applications and commercial off-the-shelf software.
Provides a directory that can hold 100 custom attributes per user. However, you can also integrate with
external systems. For example, use Azure AD B2C for authentication, but delegate to an external customer
relationship management (CRM) or customer loyalty database as the source of truth for customer data
Facilitate identity verification and proofing by collecting user data, then passing it to a third party
system to perform validation, trust scoring, and approval for user account creation.
Demonstration - Users and Groups
In this demonstration, we will explore Active Directory users and groups.
Note: Depending on your subscription not all areas of the Active Directory blade will be available.
1. Select the Users blade.
2. Select New user. Notice the selection to create a New guest user.
3. Add a new user reviewing the information: User. User Name, Groups, Directory Role, and Job Info.
4. After the user is created, review additional information about the user.
1. Select the Groups blade.
2. Add a New group.
Group type: Security
Group name: Managers
Membership type: Assigned
Members: Add your new user to the group.
3. After the group is created, review additional information about the group.
Objectives
In this lab, you will:
✔️Consult with your instructor for how to access the lab instructions and lab environment (if provided).
Explanation
Join the device to Azure AD. Joining a device is an extension to registering a device. This means, it provides
you with all the benefits of registering a device, like being able to enable or disable the device. In addition, it
also changes the local state of a device. Changing the local state enables your users to sign-in to a device using
an organizational work or school account instead of a personal account.
Check Answers
Review Question 2
Your network contains an Active Directory Domain Services (AD DS) domain named contoso.com and an
Azure Active Directory (Azure AD) domain named contoso.onmicrosoft.com.
Azure AD Connect is installed and Active Directory Federation Services (AD FS) is configured. Password-
writeback is enabled. You need to monitor synchronization events generated by Azure AD Connect. Select one.
Launch Synchronization Service Manager and edit the properties of the connector.
Explanation
Install Azure AD Connect Health. Azure AD Connect Health is a feature that will monitor on-premises AD DS
identities and provide alerts. This requires an agent on each server being monitored.
Check Answers
Review Question 3
Identify three differences from the following list between Azure Active Directory (AD) and Active Directory
Domain Services (AD DS). Select three.
There are no Organizational Units (OUs) or Group Policy Objects (GPOs) in Azure AD
Explanation
Although the list is by no means conclusive, and you may identify others not listed, here are several
characteristics of Azure AD that make it different to AD DS: Azure AD is primarily an identity solution, and it
is designed for Internet-based applications by using HTTP and HTTPS communications; because Azure AD is
HTTP/HTTPS based, it cannot be queried through LDAP. Instead, Azure AD uses the REST API over HTTP
and HTTPS. Because Azure AD is HTTP/HTTPS based, it does not use Kerberos authentication. Instead, it uses
HTTP and HTTPS protocols such as SAML, WS-Federation, and OpenID Connect for authentication (and
OAuth for authorization). Azure AD users and groups are created in a flat structure, and there are no
Organizational Units (OUs) or Group Policy Objects (GPOs). While Azure AD includes federation services,
and many third-party services (such as Facebook), AD DS supports federation.
Check Answers
Review Question 4
You would like to add a user who has a Microsoft account to your subscription. Which type of user account is
this? Select one.
Cloud identity
Directory-Synchronized
Provider identity
Guest User
Hosted identity
Explanation
Guest user. Guest users are users added to Azure AD from a third party like Microsoft or Google.
Check Answers
Review Question 5
You are configuring Self-service Password Reset. Which of the following is not a validation method? Select
one.
An email notification.
A paging service.
Explanation
A paging service. At least one authentication method is required to reset a password. Choices include email
notification, a text or code sent to user’s mobile or office phone, or a set of security questions.
Check Answers
Review Question 6
You are assigning Azure AD roles. Which role will allow the user to manage all the groups in your Teams
tenants and be able to assign other administrator roles? Select one.
Global administrator
Password administrator
Security administrator
User administrator
Explanation
Global administrator. Only the global administrator can manage groups across tenants and assign other
administrator roles.
Check Answers
Additional Study
Microsoft Learn provides self paced skills training on a variety of topics. These Learn modules cover the
content you have just learned. You can search for additional modules by product, role, or level.
--password "<password>" \
--user-principal-name "[email protected]" \
--force-change-password-next-login true \
--mail-nickname "AbbyB"
New-AzureADGroup -Description "Marketing" -DisplayName "Marketing" -MailEnabled $false -SecurityEnabled $true
-MailNickName "Marketing"
Azure AD provides several built-in roles to cover the most common security scenarios. To understand how the
roles work, let's examine three roles that apply to all resource types:
Owner, which has full access to all resources, including the right to delegate access to others.
Contributor, which can create and manage all types of Azure resources but can’t grant access to others.
Reader, which can view existing Azure resources.
Role definitions
Each role is a set of properties defined in a JavaScript Object Notation (JSON) file. This role definition includes
a Name, Id, and Description. It also includes the allowable permissions (Actions), denied permissions
(NotActions), and scope (for example, read access) for the role.
For the Owner role, that means all actions, indicated by an asterisk (*); no denied actions; and all scopes,
indicated by a forward slash (/).
You can get this information using the Powershell Get-AzureRmRoleDefinition cmdlet. Try typing the
following command into the Cloud Shell on the right.
PowerShellCopy
OutputCopy
Name : Owner
Id : 8e3af657-a8ff-443c-a75c-2fe8c4bcb635
IsCustom : False
Description : Lets you manage everything, including access to resources.
Actions : {*}
NotActions : {}
DataActions : {}
NotDataActions : {}
AssignableScopes : {/}
Try the same for the Contributor and Reader roles to see the actions allowed and denied.
A role definition is a collection of permissions. It's sometimes just called a role. A role definition lists the
operations that can be performed, such as read, write, and delete. It can also list the operations that can't be
performed or operations related to underlying data.
Name Description
AssignableScopes Scopes where this role applies. / indicates global, but can reach into a hierarchical tree.
[]
This structure is represented as JSON when used in role-based access control (RBAC) or from the underlying
API. For example, here's the Contributor role definition in JSON format.
JSONCopy
{
"Name": "Contributor",
"Id": "b24988ac-6180-42a0-ab88-20f7382dd24c",
"IsCustom": false,
"Description": "Lets you manage everything except access to resources.",
"Actions": [
"*"
],
"NotActions": [
"Microsoft.Authorization/*/Delete",
"Microsoft.Authorization/*/Write",
"Microsoft.Authorization/elevateAccess/Action"
],
"DataActions": [],
"NotDataActions": [],
"AssignableScopes": [
"/"
]
}
You can tailor the Actions and NotActions properties to grant and deny the exact permissions you need. These
are always in the format: {Company}.{ProviderName}/{resourceType}/{action} .
As an example, here are the actions for the three roles we looked at previously.
The wildcard (*) operation under Actions indicates that the principal assigned to this role can perform all
actions, or in other words, it can manage everything. This includes actions defined in the future, as Azure adds
new resource types. In the case of the Reader role, only the read action is allowed.
These actions work exactly like their management cousins. You specify actions you want to allow (or * for all)
and then provide a list of specific actions to remove in the NotDataActions collection. Here are some examples,
you can find the full list of actions and data actions in the resource provider documentation:
Assignable Scopes
Defining the Actions and NotActions properties is not enough to fully implement a role. You also need to
properly scope your role.
The AssignableScopes property of the role specifies the scopes (subscriptions, resource groups, or resources)
within which the role is available for assignment. You can make the custom role available for assignment just in
the subscriptions or resource groups that need it, thus avoiding cluttering the user experience for the rest of the
subscriptions or resource groups.
TABLE 4
To Use Scope
Creating roles
As you can see, Azure AD comes with a bunch of built-in roles that likely cover 99% of what you'll ever want
to do. You should prefer to use a built-in role if possible. However, you can create custom roles if you find it
necessary to do so.
Note
Custom role creation requires Azure AD Premium P1 or P2 and cannot be done in the free tier.
Azure portal. You can use the Azure portal to create a custom role - Azure Active Directory > Roles
and administrators > New custom role.
Azure PowerShell. You can use the New-AzureADMSRoleDefinition cmdlet to define a new role.
Azure Graph API. You can use a REST call to the Graph API to programmatically create a new role.
The summary includes a link to the documentation for all three approaches.
/subscriptions/de324015-0284-4582-9d9c-6f1e52a30471
/subscriptions/{ef67bd4f-d0f2-4845-b6dd-6cba225b4f10}/resourceGroups/myResourceGroup/backupvm1
/subscriptions/{ef67bd4f-d0f2-4845-b6dd-6cba225b4f10}/resourceGroups/myResourceGroup
Azure AD Connect provides several components that you can install to create a hybrid identity
system.
Sync services. This component is responsible for creating users, groups, and other objects. It also
makes sure that identity information for your on-premises users and groups matches that in the cloud.
Health monitoring. Azure AD Connect Health supplies robust monitoring and a central location in the
Azure portal for viewing this activity.
AD FS. Federation is an optional part of Azure AD Connect that you can use to configure a hybrid
environment via an on-premises AD FS infrastructure. Organizations can use this to address complex
deployments, such as domain join SSO, enforcement of the Active Directory sign-in policy, and smart
card or third-party multi-factor authentication.
Password hash synchronization. This feature is a sign-in method that synchronizes a hash of a user’s
on-premises Active Directory password with Azure AD.
Pass-through authentication. This allows users to sign in to both on-premises and cloud-based
applications using the same passwords. This reduces IT helpdesk costs because users are less likely to
forget how to sign in. This feature provides an alternative to Password hash synchronization that allows
organizations to enforce their security and password complexity policies.