Learn Capabilities of Microsoft Entra (SC-900) with Interactive Flashcards
Master key concepts in Capabilities of Microsoft Entra through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.
Microsoft Entra ID Overview and Features
Microsoft Entra ID (formerly Azure Active Directory) is Microsoft's cloud-based identity and access management (IAM) service that helps organizations manage and secure access to applications, resources, and services. It serves as the backbone of identity management within the Microsoft ecosystem and beyond.
**Core Features:**
1. **Authentication & Single Sign-On (SSO):** Microsoft Entra ID provides seamless SSO capabilities, allowing users to sign in once and access multiple applications—including Microsoft 365, Azure services, and thousands of third-party SaaS applications—without re-entering credentials.
2. **Multi-Factor Authentication (MFA):** It enhances security by requiring users to verify their identity through additional methods such as phone calls, text messages, or authenticator apps, significantly reducing the risk of unauthorized access.
3. **Conditional Access:** This feature enables organizations to create policies that evaluate signals like user location, device state, and risk level to make intelligent access control decisions in real time.
4. **Identity Protection:** Leveraging machine learning and Microsoft's threat intelligence, it detects suspicious activities, risky sign-ins, and compromised identities, enabling automated remediation.
5. **Application Management:** Organizations can register and manage both cloud and on-premises applications, providing centralized access control and governance.
6. **Self-Service Capabilities:** Users can reset passwords, manage groups, and request access to applications independently, reducing IT overhead.
7. **B2B and B2C Collaboration:** Entra ID supports secure collaboration with external partners (B2B) and customer-facing identity management (B2C), enabling controlled access for external users.
8. **Device Management Integration:** It integrates with Microsoft Intune for device-based conditional access and compliance enforcement.
9. **Role-Based Access Control (RBAC):** Administrators can assign granular permissions based on roles, ensuring least-privilege access.
**Editions:** Microsoft Entra ID is available in Free, P1, and P2 tiers, with increasingly advanced features like Privileged Identity Management and access reviews in premium tiers.
Overall, Microsoft Entra ID is essential for implementing Zero Trust security strategies and managing identities across hybrid and multi-cloud environments.
Types of Identities in Microsoft Entra ID
Microsoft Entra ID (formerly Azure Active Directory) supports several types of identities, each serving distinct purposes in managing access and security within an organization.
**1. User Identities:**
These represent people within or outside an organization. There are two main types:
- **Internal members (employees):** Users created directly in the organization's Entra ID tenant, authenticated via internal credentials.
- **External guests (B2B collaboration):** Users invited from outside the organization who authenticate using their home identity provider (e.g., another Entra ID tenant, Google, or Microsoft accounts). They are granted limited access to organizational resources.
**2. Workload Identities:**
These are identities assigned to software workloads such as applications, services, and automation scripts. They include:
- **Service Principals:** Security identities used by applications or services to authenticate and access resources. They define the access policy and permissions for the app.
- **Managed Identities:** A special type of service principal automatically managed by Azure, eliminating the need for developers to manage credentials. They come in two forms: **system-assigned** (tied to a specific Azure resource) and **user-assigned** (created as standalone resources and assignable to multiple services).
- **Applications (App Registrations):** When an application is registered in Entra ID, it creates an application object and a corresponding service principal, enabling identity and access management.
**3. Device Identities:**
Devices can also have identities in Entra ID. Devices can be **Entra ID registered** (personal devices), **Entra ID joined** (organization-owned devices), or **Hybrid Entra ID joined** (joined to both on-premises AD and Entra ID). Device identities enable conditional access policies and mobile device management.
**4. External Identities:**
Microsoft Entra External ID allows organizations to securely interact with external users, including customers and partners, through B2B collaboration and B2C (customer identity) scenarios.
These identity types collectively enable organizations to implement robust zero-trust security, manage access efficiently, and govern identities across hybrid and multi-cloud environments.
Hybrid Identity with Microsoft Entra
Hybrid Identity with Microsoft Entra is a solution that bridges on-premises Active Directory environments with cloud-based Microsoft Entra ID (formerly Azure Active Directory), creating a unified identity experience for users across both environments.
At its core, hybrid identity allows organizations to maintain a single user identity that can access both on-premises and cloud resources seamlessly. This is critical for enterprises transitioning to the cloud while still relying on existing on-premises infrastructure.
Microsoft Entra supports hybrid identity through three primary authentication methods:
1. **Password Hash Synchronization (PHS):** This is the simplest method where Microsoft Entra Connect synchronizes a hash of users' on-premises passwords to Microsoft Entra ID. Users can sign into cloud services using the same credentials they use on-premises. It also enables leaked credential detection for enhanced security.
2. **Pass-through Authentication (PTA):** This method validates users' passwords directly against the on-premises Active Directory without storing password hashes in the cloud. Authentication requests are forwarded to on-premises servers, making it ideal for organizations with strict security policies about password storage.
3. **Federation (AD FS):** This approach delegates the authentication process to a separate trusted identity system, typically Active Directory Federation Services. It provides the most advanced capabilities, including smart card authentication and third-party MFA, but is the most complex to deploy and manage.
**Microsoft Entra Connect** (and its newer version, Microsoft Entra Connect Sync or Cloud Sync) is the essential tool that synchronizes on-premises directory objects, including users, groups, and contacts, to Microsoft Entra ID.
Key benefits of hybrid identity include:
- Single sign-on (SSO) experience for users across environments
- Centralized identity management
- Consistent security policies and conditional access
- Simplified user provisioning and deprovisioning
- Support for self-service password reset that writes back to on-premises AD
Hybrid identity is foundational for organizations pursuing digital transformation while maintaining operational continuity with their existing infrastructure.
Authentication Methods in Microsoft Entra ID
Authentication Methods in Microsoft Entra ID are the various ways users can verify their identity when accessing resources and applications protected by Microsoft Entra (formerly Azure Active Directory). These methods form the foundation of secure identity management and support Microsoft's Zero Trust security model.
**Passwords** remain the most basic authentication method, but Microsoft Entra encourages moving beyond passwords due to their vulnerability to attacks like phishing and brute force.
**Multi-Factor Authentication (MFA)** significantly enhances security by requiring two or more verification factors: something you know (password), something you have (phone or hardware token), or something you are (biometrics). Microsoft Entra supports several MFA methods:
1. **Microsoft Authenticator App** – Enables push notifications, biometric verification, or one-time passcodes on a mobile device. It also supports passwordless sign-in.
2. **Windows Hello for Business** – Provides passwordless authentication using biometrics (facial recognition or fingerprint) or a PIN tied to a specific device.
3. **FIDO2 Security Keys** – Hardware-based passwordless authentication using physical security keys, offering strong phishing-resistant protection.
4. **SMS and Voice Verification** – Users receive a code via text message or an automated phone call to verify their identity as a secondary factor.
5. **Email OTP (One-Time Passcode)** – A temporary code sent to a registered email address for verification.
6. **Certificate-Based Authentication** – Uses X.509 certificates for authentication, commonly used in enterprise environments.
7. **Temporary Access Pass** – A time-limited passcode issued by administrators for onboarding or recovery scenarios.
Microsoft Entra ID also supports **Self-Service Password Reset (SSPR)**, allowing users to reset their passwords independently using registered authentication methods.
Administrators can configure **Authentication Strengths** policies to enforce specific combinations of methods based on risk levels and compliance requirements. The platform encourages **passwordless authentication** as the most secure and user-friendly approach, reducing reliance on traditional passwords while maintaining strong security postures across the organization.
Multifactor Authentication (MFA)
Multifactor Authentication (MFA) is a critical security mechanism within Microsoft Entra (formerly Azure Active Directory) that enhances identity protection by requiring users to provide two or more verification factors before granting access to resources. Rather than relying solely on a password, MFA adds additional layers of security, significantly reducing the risk of unauthorized access due to compromised credentials.
MFA operates on three fundamental categories of authentication factors: something you know (such as a password or PIN), something you have (such as a trusted device, phone, or hardware token), and something you are (biometric verification like fingerprint or facial recognition). To successfully authenticate, users must satisfy at least two of these categories.
In Microsoft Entra, MFA can be implemented through several verification methods, including the Microsoft Authenticator app (which supports push notifications and time-based one-time passcodes), SMS text messages, voice calls, and FIDO2 security keys. The Microsoft Authenticator app is the recommended method as it provides a seamless and highly secure experience.
Organizations can configure MFA through Conditional Access policies in Microsoft Entra, allowing granular control over when and how MFA is enforced. For example, administrators can require MFA based on specific conditions such as user location, device compliance status, application sensitivity, or sign-in risk level detected by Microsoft Entra ID Protection.
MFA is a cornerstone of the Zero Trust security model, which operates on the principle of 'never trust, always verify.' By implementing MFA, organizations can protect against over 99.9% of identity-related attacks, including phishing, credential stuffing, and brute-force attacks.
Microsoft Entra also supports Security Defaults, which provide a baseline level of security by enabling MFA for all users at no additional cost. For more advanced scenarios, Microsoft Entra ID P1 or P2 licenses offer Conditional Access-based MFA with richer customization and reporting capabilities, ensuring comprehensive identity security across the organization.
Password Protection and Management Capabilities
Password Protection and Management Capabilities in Microsoft Entra (formerly Azure AD) provide robust mechanisms to safeguard organizational identities and reduce password-related vulnerabilities.
**Global Banned Password List:** Microsoft maintains a global banned password list that is automatically applied to all users in a Microsoft Entra tenant. This list is continuously updated based on real-world security telemetry and blocks commonly used weak passwords and their variants. When users attempt to change or reset their passwords, these requests are checked against this list to ensure strong passwords are enforced.
**Custom Banned Password List:** Organizations can configure a custom banned password list tailored to their specific needs. Administrators can add words related to the company name, products, locations, or internal terms that could be easily guessed. This custom list works in conjunction with the global banned password list to provide comprehensive protection.
**Password Spray Protection:** Microsoft Entra's smart lockout feature helps protect against brute-force and password spray attacks. It can recognize sign-ins from legitimate users and treat them differently from attackers, locking out attackers while allowing valid users to continue accessing their accounts.
**Hybrid Security with On-Premises Integration:** Password protection extends to on-premises Active Directory environments through Microsoft Entra Password Protection agents. These agents enforce the same global and custom banned password policies for on-premises password changes, ensuring consistent security across hybrid environments.
**Self-Service Password Reset (SSPR):** SSPR allows users to change or reset their passwords without administrator intervention. Users can unlock their accounts or reset passwords using methods like mobile app notifications, codes, email, phone calls, or security questions. This reduces helpdesk burden while maintaining security.
**Password Writeback:** Combined with Microsoft Entra Connect, password writeback ensures that passwords reset in the cloud are synchronized back to on-premises directories, providing a seamless hybrid experience.
Together, these capabilities create a layered defense strategy that strengthens password hygiene, reduces attack surfaces, and enhances overall identity security across cloud and hybrid environments.
Conditional Access Policies
Conditional Access Policies are a core feature of Microsoft Entra ID (formerly Azure Active Directory) that act as intelligent gatekeepers for your organization's resources. They function as 'if-then' statements that evaluate specific conditions before granting or denying access to applications and data.
At their core, Conditional Access Policies analyze signals such as user identity, device platform, location, application being accessed, and real-time risk levels. Based on these signals, automated access decisions are enforced, such as granting full access, requiring multi-factor authentication (MFA), limiting access, or blocking access entirely.
The policies consist of two main components: **Assignments** and **Access Controls**. Assignments define the 'who, what, and where' — specifying which users or groups are targeted, which cloud apps or actions are included, and under what conditions (like location, device state, or risk level). Access Controls define the outcome — either granting access with specific requirements (like MFA or compliant devices) or blocking access altogether.
Common use cases include requiring MFA for administrative users, blocking access from untrusted locations, enforcing compliant device requirements for accessing sensitive data, and restricting legacy authentication protocols that lack modern security features.
Conditional Access operates on a Zero Trust principle, meaning it never assumes trust and always verifies. Every access request is evaluated in real-time, ensuring that security policies adapt dynamically to changing conditions. For example, if a user's sign-in risk is detected as high due to suspicious activity, additional verification can be automatically required.
Conditional Access Policies require at least a Microsoft Entra ID P1 license. Organizations can use 'Report-only' mode to test policies before enforcement, helping administrators understand the potential impact without disrupting user access.
By centralizing access decisions, Conditional Access Policies provide a powerful, flexible, and automated approach to securing organizational resources while maintaining productivity and a seamless user experience across the Microsoft ecosystem.
Microsoft Entra Roles and Role-Based Access Control
Microsoft Entra Roles and Role-Based Access Control (RBAC) are fundamental components of Microsoft Entra ID (formerly Azure Active Directory) that govern how administrative permissions are managed and assigned within an organization's identity and access management infrastructure.
Role-Based Access Control (RBAC) in Microsoft Entra follows the principle of least privilege, ensuring that users are granted only the permissions they need to perform their specific tasks. This minimizes security risks by reducing unnecessary access to sensitive resources and administrative functions.
Microsoft Entra provides several categories of roles:
1. **Built-in Roles**: These are predefined roles that cover common administrative scenarios. Examples include Global Administrator (full access to all features), User Administrator (manages user accounts), Security Administrator (manages security features), and Billing Administrator (handles billing-related tasks). There are over 80 built-in roles available.
2. **Custom Roles**: Organizations can create tailored roles with specific permission sets when built-in roles don't meet their exact needs. Custom roles allow granular control by selecting individual permissions from a predefined list.
3. **Role Assignments**: Roles can be assigned to users, groups, or service principals at different scopes, including tenant-wide, administrative unit, or application-specific levels.
Key concepts include:
- **Security Principal**: The identity (user, group, or service principal) receiving the role assignment.
- **Role Definition**: A collection of permissions that specifies what actions can be performed.
- **Scope**: The boundary within which the role assignment applies.
Microsoft Entra also supports **Privileged Identity Management (PIM)**, which enables just-in-time role activation, time-bound assignments, and approval workflows for elevated roles. This adds an extra layer of security by ensuring privileged access is temporary and auditable.
The Global Administrator role is the most powerful, with unrestricted access to all administrative features. Organizations are advised to limit the number of Global Administrators and use more specific roles whenever possible to maintain a strong security posture and comply with governance requirements.
Microsoft Entra ID Governance
Microsoft Entra ID Governance is a comprehensive identity governance solution within Microsoft Entra that helps organizations balance security and productivity by ensuring the right people have the right access to the right resources at the right time. It addresses the critical challenge of managing identity lifecycles, access lifecycles, and privileged access across an organization.
Key capabilities of Microsoft Entra ID Governance include:
1. **Entitlement Management**: Allows organizations to manage access request workflows, access assignments, reviews, and expiration for groups, applications, and SharePoint sites. Users can request access through access packages, and approvals can be automated or delegated.
2. **Access Reviews**: Enables periodic reviews of user access to ensure that only authorized individuals retain access to resources. Reviewers can evaluate group memberships, application access, and role assignments, helping maintain the principle of least privilege.
3. **Privileged Identity Management (PIM)**: Provides just-in-time privileged access to Microsoft Entra ID and Azure resources. It reduces risk by enforcing time-bound access, requiring approval and justification for role activation, and providing audit trails for privileged operations.
4. **Lifecycle Workflows**: Automates user lifecycle processes such as onboarding (joiner), role changes (mover), and offboarding (leaver). This ensures that access is provisioned and deprovisioned appropriately as employees join, move within, or leave the organization.
5. **Terms of Use**: Requires users to acknowledge organizational policies before accessing resources.
Microsoft Entra ID Governance helps organizations reduce identity and access risk, automate governance processes, and meet compliance requirements. It provides visibility into who has access to what, enabling organizations to detect and remediate excessive or unnecessary permissions. By automating identity governance tasks, it reduces the administrative burden on IT teams while strengthening security posture. This solution is essential for organizations seeking to implement zero-trust principles and maintain regulatory compliance across their hybrid and multi-cloud environments.
Access Reviews in Microsoft Entra
Access Reviews in Microsoft Entra is a feature within Microsoft Entra ID Governance that helps organizations efficiently manage group memberships, access to enterprise applications, and role assignments. It enables organizations to ensure that only the right people have continued access to resources, reducing security risks associated with excessive or outdated permissions.
Access Reviews allow administrators or designated reviewers to periodically evaluate and recertify user access. This process helps maintain the principle of least privilege by identifying and removing unnecessary access rights. Reviews can be configured for various scenarios, including reviewing members of security groups, users assigned to applications, users with privileged roles in Microsoft Entra ID or Azure resources, and guest user access.
Key features of Access Reviews include:
1. **Automated Scheduling**: Reviews can be set up as one-time or recurring events (weekly, monthly, quarterly, or annually), ensuring regular and consistent access evaluations.
2. **Flexible Reviewers**: Reviews can be performed by resource owners, managers, self-review by users, or specific designated reviewers.
3. **Multi-Stage Reviews**: Organizations can configure multi-stage reviews where different reviewers evaluate access in sequential stages for more thorough governance.
4. **Auto-Apply Results**: When a review completes, results can be automatically applied to remove access for denied users, reducing administrative overhead.
5. **Recommendations**: The system provides intelligent recommendations to reviewers based on sign-in activity, helping them make informed decisions about whether access should continue.
6. **Guest Access Management**: Access Reviews are particularly valuable for managing external or guest user access, ensuring B2B collaboration remains secure.
Access Reviews require Microsoft Entra ID Governance or Microsoft Entra ID P2 licenses. They are accessible through the Microsoft Entra admin center and can be integrated with broader identity governance workflows. By regularly conducting access reviews, organizations strengthen their security posture, meet compliance requirements, and maintain proper oversight of who has access to critical resources across their environment.
Microsoft Entra Privileged Identity Management (PIM)
Microsoft Entra Privileged Identity Management (PIM) is a service within Microsoft Entra ID (formerly Azure Active Directory) that enables organizations to manage, control, and monitor access to critical resources. It operates on the principle of least privilege, ensuring users only have elevated access when they truly need it, reducing the risk of excessive or misused permissions.
PIM addresses key security concerns by providing just-in-time (JIT) privileged access, meaning users can request temporary elevation of their roles for a specified duration rather than having permanent administrative privileges. This significantly reduces the attack surface by minimizing the number of users with standing privileged access.
Key features of PIM include:
1. **Time-bound access**: Administrators can assign start and end dates for role assignments, ensuring privileges automatically expire after a defined period.
2. **Approval-based activation**: Organizations can require approval workflows before privileged roles are activated, adding an extra layer of oversight.
3. **Multi-factor authentication enforcement**: PIM can require MFA when users activate their privileged roles, ensuring identity verification.
4. **Access reviews**: Regular reviews can be conducted to verify that users still require their privileged role assignments, helping maintain a clean access environment.
5. **Audit history**: PIM maintains comprehensive audit logs of all privileged role assignments and activations, supporting compliance requirements and forensic investigations.
6. **Notifications and alerts**: Administrators receive alerts when privileged roles are activated, providing real-time visibility into privileged access usage.
PIM supports roles across Microsoft Entra ID, Azure resources, and other Microsoft services like Microsoft 365. It covers both eligible assignments (where users can activate roles when needed) and active assignments (where roles are permanently assigned).
By implementing PIM, organizations strengthen their Zero Trust security posture, reduce the risk of insider threats, and maintain compliance with regulatory frameworks that mandate strict control over privileged access to sensitive systems and data.
Microsoft Entra ID Protection
Microsoft Entra ID Protection is a security feature within Microsoft Entra (formerly Azure Active Directory) that helps organizations detect, investigate, and remediate identity-based risks. It leverages Microsoft's vast experience in analyzing trillions of signals daily to identify and address potential threats to user identities.
**Key Capabilities:**
1. **Risk Detection:** ID Protection automatically detects suspicious activities and anomalies related to user sign-ins and identities. It evaluates risks at two levels:
- **User Risk:** Indicates the probability that a user's identity or account has been compromised (e.g., leaked credentials found on the dark web).
- **Sign-in Risk:** Evaluates the likelihood that a specific authentication request is unauthorized (e.g., sign-ins from anonymous IP addresses, atypical travel patterns, or unfamiliar locations).
2. **Automated Remediation:** Organizations can configure risk-based Conditional Access policies that automatically respond to detected risk levels. For example, requiring multi-factor authentication (MFA) when a medium sign-in risk is detected, or forcing a password reset when a user risk is flagged as high.
3. **Investigation Tools:** Administrators can review and investigate detected risks through detailed reports, including risky users, risky sign-ins, and risk detections. These reports provide insights into the nature and context of each risk event.
4. **Data Export:** Risk detection data can be exported to third-party tools such as SIEM (Security Information and Event Management) solutions for further analysis and correlation with other security events.
**How It Works:**
Microsoft uses machine learning algorithms and heuristics fed by signals from Microsoft's global ecosystem to assess risk in real time. Each sign-in and user behavior is evaluated against known attack patterns and anomalies.
**Benefits:**
- Proactive protection against identity-based attacks
- Reduced manual investigation workload through automation
- Enhanced security posture with risk-based access controls
ID Protection is available with Microsoft Entra ID P2 licenses, making it an essential tool for organizations seeking robust identity security.