Manage Azure identities and governance
Manage Microsoft Entra users, groups, access, and subscriptions.
Managing Azure identities and governance is the foundational domain of the Azure Administrator Associate (AZ-104) certification, accounting for approximately 15-20% of the exam. It focuses on securing access and maintaining control over the cloud environment through Microsoft Entra ID (formerly Azu…
Concepts covered: Manage Microsoft Entra users and groups, Manage licenses in Microsoft Entra ID, Manage external users (B2B), Configure self-service password reset (SSPR), Manage built-in Azure roles (RBAC), Assign roles at different scopes, Implement and manage Azure Policy, Configure resource locks, Apply and manage tags on resources, Manage resource groups and subscriptions, Manage costs (alerts, budgets, Azure Advisor), Configure management groups
AZ-104 - Manage Azure identities and governance Example Questions
Test your knowledge of Manage Azure identities and governance
Question 1
You apply a CanNotDelete lock to a resource group named 'RG-Finance'. An administrator with the Owner role attempts to delete a virtual machine located inside 'RG-Finance'. What is the outcome of this deletion attempt?
Question 2
You administrate an Azure environment containing a resource group named 'RG-Finance'. You need to assign the Virtual Machine Contributor role to 'User1' so they can manage all current and future virtual machines within 'RG-Finance'. The solution must ensure 'User1' has no permissions on resources outside of this resource group. What is the correct scope to apply for this assignment?
Question 3
You manage the Microsoft Entra tenant for Contoso. You are initiating a collaboration with a partner company named Litware Inc. Litware does not use Microsoft Entra ID or Google, but they manage their user identities using an on-premises solution that supports the SAML 2.0 protocol. You need to ensure that Litware users can sign in to Contoso's guest resources using their existing on-premises credentials. You navigate to the External Identities blade. What should you configure to support this requirement?