Skip to content

Entra ID Objects and Synchronization ​

Source: Azure Master Class v3 - Part 2 - Identity by John Savill
Timestamps: 00:38:00 - 01:04:00


Entra ID Object Types ​

πŸ“Ί Video Reference: 00:38:06

Entra ID contains many types of objects. Most are security principalsβ€”entities that can be authenticated.


Users ​

πŸ“Ί Video Reference: 00:38:35

Key Principle: Carbon-Based Life Forms Only ​

When we say user, it should be tied to a specific human being:

Identity TypeUse User Account?Better Alternative
Human employeeβœ… Yesβ€”
Automation script❌ NoService Principal
Application❌ NoService Principal
CI/CD pipeline❌ NoManaged Identity / Service Principal

Don't Use User Accounts for Automations

Applications and automations can't comply with MFA requirements. Microsoft is rolling out mandatory MFA, and organizations using user accounts for automations are now stuck.

User Properties ​

PropertyDescriptionExample
Display NameFriendly nameJohn Smith
User Principal NameSign-in namejohn@contoso.com
User TypeMember or GuestMember
On-premises SyncSynced from AD?Yes/No
IdentitiesOrigin of identitycontoso.onmicrosoft.com

User Types ​

TypeDescriptionDefault Rights
MemberInternal to organizationFull directory read
GuestExternal identity (B2B)Limited visibility

Creating Users ​

MethodUse Case
Manual (Portal)Single user creation
Bulk OperationsCSV file upload
HR IntegrationAutomated from Workday, SAP, etc.
PowerShell/GraphScripted provisioning

Groups ​

πŸ“Ί Video Reference: 00:44:10

Always use groups for permission assignment instead of direct user assignments.

Why Groups Over Direct Assignment? ​

Direct User AssignmentGroup Assignment
❌ Forgotten over timeβœ… Easy to audit
❌ Permission creepβœ… Role-based control
❌ Manual managementβœ… Can be dynamic
❌ Hard to auditβœ… Clear purpose

Group Types ​

TypePurposeExample Use
SecurityResource access, RBACAzure permissions, app access
Microsoft 365CollaborationTeams, SharePoint, shared mailbox

Membership Types ​

TypeHow Members JoinBest For
AssignedManual additionSpecific users
Dynamic UserAttribute-based rulesDepartment, location, job title
Dynamic DeviceDevice attribute rulesOS version, compliance state

Dynamic Group Examples ​

Example 1: Job Title Based

user.jobTitle -startsWith "Hero"

All users whose job title starts with "Hero" (Hero, Heroine) auto-join.

Example 2: Recent Hires (Last 365 days)

user.employeeHireDate -ge now().addDays(-365)

New employees automatically added, removed after one year.

P1 License Required

Dynamic group membership requires Entra ID P1 licensing.


Service Principals (App Registrations) ​

πŸ“Ί Video Reference: 00:47:55

For applications and automations, use Service Principals instead of user accounts.

Components ​

ComponentDescription
App RegistrationThe identity definition
Enterprise AppThe service principal in your tenant
CredentialsHow the app authenticates

Credential Options ​

TypeSecurityManagementBest For
Client Secret⭐⭐Rotate manuallySimple scenarios
Certificate⭐⭐⭐Rotate periodicallyBetter security
Federated Credential⭐⭐⭐⭐No secrets to manageGitHub Actions, external IDPs

Federated Credentials (Workload Identity Federation) ​

πŸ“Ί Video Reference: 00:48:22

Instead of storing secrets, exchange tokens from a trusted external identity provider:

Example: GitHub Actions to Azure

  • GitHub workflow gets a token from GitHub's IDP
  • Federation trust in Entra says "GitHub repo X can act as this identity"
  • Token exchange happensβ€”no secrets stored in GitHub!

Managed Identities ​

πŸ“Ί Video Reference: 00:51:27

For Azure resources talking to other Azure resources, use Managed Identities.

Benefits ​

  • βœ… No credentials to manage
  • βœ… Automatic token rotation
  • βœ… Azure handles everything
  • βœ… Works with RBAC

Types ​

TypeScopeUse Case
System-AssignedOne resourceVM needs to access Key Vault
User-AssignedMultiple resourcesSeveral VMs share identity

How It Works ​

No Secrets Required

The Azure control plane knows which resource is making the requestβ€”no credentials stored in code or config!


Devices ​

πŸ“Ί Video Reference: 00:52:54

Device States ​

StateSign-in AccountManagementBest For
RegisteredPersonal (MSA)MDM optionalBYOD
JoinedEntra accountFull MDMCorporate owned
Hybrid JoinedAD + EntraGPO + MDMExisting AD environment

Supported Platforms ​

PlatformRegisteredJoinedHybrid
Windows 10/11βœ…βœ…βœ…
macOSβœ…βœ…βŒ
iOSβœ…βŒβŒ
Androidβœ…βŒβŒ

Synchronization from Active Directory ​

πŸ“Ί Video Reference: 00:55:11

Most organizations have Active Directory on-premises and synchronize to Entra ID.

Key Principle: AD is the Source of Truth ​

HR Integration Option ​

Workday, SAP, and others can provision users directly via the Entra provisioning service.


Sync Topology Rules ​

πŸ“Ί Video Reference: 00:57:48

RuleDescription
One tenant ↔ One sync engineAn Entra tenant can only sync from one Entra Connect instance
One AD β†’ Multiple tenantsPossible with multiple sync instances (only one does writeback)
Multiple forests β†’ One tenantSingle Entra Connect can sync from multiple AD forests

Sync Technologies ​

TechnologyDescriptionBest For
Entra Connect SyncWindows-based sync engineLegacy, full features
Entra Cloud SyncLightweight provisioning agentNewer, simpler, multi-forest

Entra Connect vs Cloud Sync ​

FeatureConnect SyncCloud Sync
ArchitectureWindows server requiredLightweight agent
Multi-forest (disconnected)βŒβœ…
Pass-through Authβœ…βŒ
WritebackFullLimited
ManagementOn-premCloud portal

Cloud Sync is the Future

Microsoft is moving toward Cloud Sync. Use it for new deployments if it meets your requirements.

Cloud Sync Setup ​

  1. Install provisioning agents on domain controllers (or servers with same security tier)
  2. Create configuration in Entra portal
  3. Map attributes and scoping (OUs, groups)
  4. Enable sync

Quick Reference ​

Object Comparison ​

ObjectCan Authenticate?Created WherePrimary Use
Userβœ…Entra or ADHuman identity
Group❌Entra or ADPermission grouping
Service Principalβœ…EntraApp/automation identity
Managed Identityβœ…Azure resourceAzure resource identity
Device❌*Entra or ADDevice identity

*Devices have associated identity but don't "authenticate" in the traditional sense.

Best Practices ​

ScenarioRecommendation
New employeeCreate in AD or HR system, let sync
Application authService Principal with federated credential
Azure resource authManaged Identity
Permission assignmentAlways use groups
Multiple forestsEvaluate Cloud Sync

Further Reading ​

Released under the MIT License.