Skip to content

Identity Fundamentals ​

Source: Azure Master Class v3 - Part 2 - Identity by John Savill
Timestamps: 00:00:00 - 00:22:00


Why Identity is the New Security Perimeter ​

In the cloud world, identity is the new security perimeter. We can't lock things away anymore with just a network firewall. Instead, identity becomes the place where we:

  • Assign permissions to various resources
  • Control access regardless of location
  • Authenticate users, applications, and devices

Key Principle

It's critical to understand, architect, and operate your identity solution correctlyβ€”and that includes educating your users about different types of attacks.


The Need for Identities ​

πŸ“Ί Video Reference: 00:01:56

Why Different Identities Need Different Access ​

Not everyone gets the same access. The goal is to always give whatever identity we're dealing with the minimum possible set of permissionsβ€”just enough for it to perform the required function.

PrincipleDescription
Just EnoughOnly the permissions needed for the task
Just in TimePermissions granted only when needed
Least PrivilegeMinimum rights to perform a function

The Risk of Over-Permissioning ​

If I have more permissions than required:

  • Accidental risk: I do something that has massive unintended impact
  • Deliberate risk: A bad actor gets the credential and can do bad things

Real-World Impact

This is why Microsoft is rolling out mandatory MFAβ€”organizations that used user accounts for automations are now stuck because automations can't comply with MFA requirements.


Roles and Role Assignments ​

πŸ“Ί Video Reference: 00:03:07

Rather than granting every permission individually (there could be hundreds), we group permissions into roles:

A role assignment consists of:

  1. Role - A set of permissions or actions
  2. Identity - Who gets the role (user, group, service principal)
  3. Scope - Where the role applies (tenant, subscription, resource)

Types of Identities ​

TypeDescriptionUse Case
HumanActual usersInteractive access
ApplicationService principalsAPI access, background jobs
AutomationScripts, CI/CDDeployments, maintenance
DeviceComputers, phonesDevice-based access

Why Not Share Identities? ​

πŸ“Ί Video Reference: 00:05:39

There are multiple challenges with sharing identities:

  1. Different needs - Different people/automations need different permissions
  2. Permission creep - Shared identity accumulates ALL required permissions
  3. Audit impossibility - Can't tell who actually did what
  4. Over-permissioning - Sum of all permissions exceeds any single need

Never Share Accounts

Each actor (human, automation, application) should be uniquely identifiable. Shared accounts break auditing and security principles.


The Identity Provider (IDP) ​

πŸ“Ί Video Reference: 00:07:03

A central store for identities that:

  • Maintains the list of security principals
  • Enables authentication (proving identity)
  • Issues tokens for resource access

Authentication vs Authorization ​

ConceptSymbolDescription
Authentication (AuthN)πŸ”Prove I am who I say I am
Authorization (AuthZ)βœ…What can this identity do

Decentralized Identity (Preview) ​

πŸ“Ί Video Reference: 00:11:01

A newer concept where the user is in the center of the picture:

Traditional vs Decentralized ​

AspectTraditional IDPDecentralized ID
Who's in centerIdentity ProviderUser
Who owns identityIDP can revokeUser owns completely
Information sharingIDP decidesUser controls
PortabilityLocked to providerPortable wallet

How Decentralized ID Works ​

  1. User has a digital wallet (like Microsoft Authenticator)
  2. Issuers (government, employers) create verifiable credentials
  3. User stores credentials in their wallet
  4. Verifiers request specific claims
  5. User consents and shares only what's needed

Selective Disclosure

You can prove you're over 21 without sharing your actual birth dateβ€”sharing only the fact, not the data.

Learn More: Microsoft Entra Verified ID


Microsoft Entra ID ​

πŸ“Ί Video Reference: 00:18:58

Entra ID (formerly Azure AD) is Microsoft's enterprise identity provider.

Why the Rename? ​

The old "Azure AD" name was terrible because:

  • It suggested Active Directory running in the cloud
  • It's a completely different type of directory service
  • "Entra" = "Entrance" to your services

What Requires Entra ID? ​

All Microsoft clouds require an Entra tenant:

ServiceEntra Integration
Azure Subscriptionsβœ… Trust tenant for RBAC
Microsoft 365βœ… Users, groups, policies
Dynamics 365βœ… Identity provider
Third-party SaaSβœ… Federation support

Entra ID vs Active Directory Domain Services ​

FeatureAD DS (On-Prem)Entra ID (Cloud)
PurposeClosed network identityCloud/SaaS identity
ProtocolsKerberos, NTLM, LDAPOAuth 2.0, OIDC, SAML
PortsMany (wide range)HTTPS only (443)
StructureOrganizational Units (OU)Flat (no hierarchy)
ManagementGroup PolicyConditional Access, Intune
QueryLDAPMicrosoft Graph API

Common Misconception

Entra ID is NOT Active Directory in the cloud. They are completely different systems that happen to both provide identity services.


Entra ID Licensing ​

πŸ“Ί Video Reference: 00:27:55

LicenseKey FeaturesPricing
FreeBasic user/group management, SSOIncluded
P1Conditional Access, MFA, dynamic groupsPer user/month
P2Identity Protection, PIM, access reviewsPer user/month
Entra SuiteAll P2 + Private Access, Verified ID, full governancePer user/month (requires P1)

Flexible Licensing

Licenses are per user per monthβ€”you don't have to license every user the same. Give P1 to standard users, P2 to admins, Suite to those needing advanced features.


Your Entra Tenant ​

πŸ“Ί Video Reference: 00:30:00

Default Naming ​

When you create a tenant, it gets a default name:

yourcompany.onmicrosoft.com

Custom Domain Names ​

You'll want to add your actual domain:

  1. Go to Entra Admin Center β†’ Settings β†’ Domain names
  2. Click Add custom domain
  3. Prove ownership via DNS TXT record
  4. Set as primary domain
Before: john@contoso.onmicrosoft.com
After:  john@contoso.com

If You Have M365... ​

πŸ“Ί Video Reference: 00:34:54

You already have Entra! There's no such thing as a separate "M365 directory service"β€”it's all Entra ID under the hood.

The M365 Admin Center's user management is just hooking into Microsoft Graph and your Entra tenant.


Tenant Types ​

Entra ID has evolved to support different identity scenarios through tenant configurations:

Workforce Tenant (Default) ​

This is the standard tenant you get when signing up for Azure or M365. It's designed for:

PurposeExamples
Your employeesInternal staff accessing corporate resources
B2B collaborationPartners, vendors as guest users in YOUR tenant
Hybrid identitySync with on-premises Active Directory

A workforce tenant is where:

  • Your internal users live (employees, contractors)
  • You configure Conditional Access for corporate apps
  • Guest users are invited for collaboration (B2B)
  • Licenses are assigned (M365, P1, P2)

External Tenant (CIAM) ​

A separate tenant type optimized for customer-facing applications:

AspectWorkforce TenantExternal Tenant
Who's in itEmployees, B2B guestsCustomers, consumers
AuthenticationCorporate credentialsSocial logins, email OTP
ScaleThousandsMillions
BrandingCompany portalFully customizable per app
Cost modelPer user/monthMAU (Monthly Active Users)

When to Use External Tenant

Building a customer portal? Mobile app for consumers? Public-facing service? β†’ External Tenant

Managing your workforce? Partner collaboration? Internal apps? β†’ Workforce Tenant

​

Managing Multiple Tenants ​

You can create additional tenants, but should you?

When Multiple Tenants Make Sense ​

ScenarioRecommendation
Development/sandboxβœ… Separate tenant for testing
Merger & acquisition⏳ Consolidate when feasible
Regulatory (data residency)βœ… May require geographic separation
Customer-facing appsβœ… Use External tenant
>1 million usersβœ… Consider regional split
"Just because"❌ Avoid unnecessary complexity

Multi-Tenant Complexity ​

Every additional tenant means:

  • Separate licensing
  • Separate admin accounts
  • Separate policies to maintain
  • Cross-tenant access to configure
  • User migration challenges

Single Tenant First

Microsoft recommends a single tenant for organizations under 1 million users unless you have specific regulatory, administrative, or isolation requirements.

Cross-Tenant Collaboration ​

When you DO have multiple tenants, use B2B collaboration and Cross-Tenant Access Settings:

  • Trust MFA from partner tenants (avoid double prompts)
  • Trust device compliance across organizations
  • Control which users can collaborate outbound/inbound

Quick Reference ​

Key Concepts ​

TermDefinition
IDPIdentity Provider - central store for identities
Security PrincipalEntity that can be authenticated
RoleCollection of permissions
ScopeWhere permissions apply
TenantYour organization's Entra instance

Important URLs ​

ResourceURL
Entra Admin Centerentra.microsoft.com
Azure Portalportal.azure.com
M365 Admin Centeradmin.microsoft.com
My Accountmyaccount.microsoft.com

Further Reading ​

Released under the MIT License.