0% found this document useful (1 vote)
2K views13 pages

Azure Identity Management Lab AND Quiz - WEEK3

This document provides instructions for a lab to configure Azure Identity Management. The objectives are to: 1. Create and configure Azure AD users and groups with assigned and dynamic membership. 2. Create a test Azure AD tenant. 3. Manage Azure AD guest users by creating guest users and granting them access to resources. The instructions guide the user through tasks to provision user and group accounts in an Azure AD tenant, configure dynamic group membership based on user job titles, create a test tenant, and manage guest users.

Uploaded by

Priyangka Deka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
2K views13 pages

Azure Identity Management Lab AND Quiz - WEEK3

This document provides instructions for a lab to configure Azure Identity Management. The objectives are to: 1. Create and configure Azure AD users and groups with assigned and dynamic membership. 2. Create a test Azure AD tenant. 3. Manage Azure AD guest users by creating guest users and granting them access to resources. The instructions guide the user through tasks to provision user and group accounts in an Azure AD tenant, configure dynamic group membership based on user job titles, create a test tenant, and manage guest users.

Uploaded by

Priyangka Deka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Azure Identity Management Lab

Lab scenario
In order to allow Truevisions users to authenticate by using Azure AD, you have been tasked
with provisioning users and group accounts. Membership of the groups should be updated
automatically based on the user job titles. You also need to create a test Azure AD tenant with a
test user account and grant that account limited permissions to resources in the TrueVisions
Azure subscription.

Objectives
In this lab, you will:

 Task 1: Create and configure Azure AD users


 Task 2: Create Azure AD groups with assigned and dynamic membership
 Task 3: Create an Azure Active Directory (AD) tenant
 Task 4: Manage Azure AD guest users

Instructions

Exercise 1

Task 1: Create and configure Azure AD users

In this task, you will create and configure Azure AD users.

1. In the Azure portal, search for and select Azure Active Directory.


2. On the Azure Active Directory blade, scroll down to the Manage section,
click User settings, and review available configuration options.
3. On the Azure Active Directory blade, in the Manage section, click Users, and then click
your user account to display its Profile settings.
4. Click edit, in the Settings section, set Usage location to United States and save the
change. (Note: This is necessary in order to assign an Azure AD Premium P2 license to
your user account later in this lab.)
5. Navigate back to the Users - All users blade, and then click + New User
6. Create a new user with the following settings (leave others with their defaults)
Setting Value

User name tstark

Name Tony Stark

Let me create the password enabled

Initial Password Pa55w.rd1234

Usage location United States

Job Title Cloud Administrator

Department IT

Note: Copy to clipboard the full User name. You will need it later in this ta

7. In the list of users, click the newly created user account to display its blade.

8. Review the options available in the Manage section and note that you can identify the Azure
AD roles assigned to the user account as well as the user account's permissions to Azure
resources.

9. In the Manage section, click Assigned roles, then click + Add assignment button and assign


the User administrator role to tstark. (Note: You also have the option of assigning Azure AD
roles when provisioning a new user.)

10. Open an InPrivate browser window and sign in to the Azure portal using the newly created
user account. When prompted to update the password, change the password for the user. (Note:
Rather than typing the user name, you can paste the content of Clipboard.)

11. In the InPrivate browser window, in the Azure portal, search for and select Azure Active
Directory. (Note: While this user account can access the Azure Active Directory tenant, it does
not have any access to Azure resources. This is expected, since such access would need to be
granted explicitly by using Azure Role-Based Access Control.)

12. In the InPrivate browser window, on the Azure AD blade, scroll down to the Manage section,


click User settings, and note that you do not have permissions to modify any configuration
options.
13. In the InPrivate browser window, on the Azure AD blade, in the Manage section,
click Users, and then click + New user.

14. Create a new user with the following settings (leave others with their defaults):

Setting Value

User name dbanner

Name David Banner

Let me create the password enabled

Initial Password Pa55w.rd1234

Usage location United States

Job Title System Administrator

Department IT

15. Sign out as the tstark user from the Azure portal and close the InPrivate browser window.

Task 2: Create Azure AD groups with assigned and dynamic membership

In this task, you will create Azure Active Directory groups with assigned and dynamic
membership.

1. Back in the Azure portal where you are signed in with your user account, navigate back to the
Overview blade of the Azure AD tenant and, in the Manage section, click Licenses. (Note: Azure
AD Premium P1 or P2 licenses are required in order to implement dynamic groups)

2. In the Manage section, click All products.

3. Click + Try/Buy and activate the free trial of Azure AD Premium P2.

4. Refresh the browser window to verify that the activation was successful.
5. From the Licenses - All products blade, select the Azure Active Directory Premium P2
entry, and assign all license options of Azure AD Premium P2 to your user account and the two
newly created user accounts.

6. In the Azure portal, navigate back to the Azure AD tenant blade and click Groups.

7. Use the + New group button to create a new group with the following settings:

Setting Value

Group type Security

Group name IT Cloud Administrator

Group description Truevisions IT cloud administrators

Membership type Dynamic User

Note: If the Membership type drop-down list is grayed out, refresh the browser page.

8. Click Add dynamic query.

9. On the Configure Rules tab of the Dynamic membership rules blade, create a new rule


with the following settings:

Setting Value

Property Job Title

Operator Equals

Value Cloud Administrator

10. Save the rule and, back on the New Group blade, click Create.

11. Back on the Groups - All groups blade of the Azure AD tenant, click the + New
group button and create a new group with the following settings:
Setting Value

Group type Security

Group name IT System Administrators

Group description Truevisions IT system administrators

Membership type Dynamic User

12. Click Add dynamic query.

13. On the Configure Rules tab of the Dynamic membership rules blade, create a new rule


with the following settings:

Setting Value

Property Job Title

Operator Equals

Value System Administrator

14. Save the rule and, back on the New Group blade, click Create.

15. Back on the Groups - All groups blade of the Azure AD tenant, click the + New
group button, and create a new group with the following settings:

Setting Value

Group type Security

Group name IT Lab Administrators

Group description Truevisions IT Lab administrators

member type Assigned


Setting Value

16. Click No members selected.

17. From the Add members blade, search and select the IT Cloud Administrators and IT
System Administrators groups and, back on the New Group blade, click Create.

18. Back on the Groups - All groups blade, click the entry representing the IT Cloud
Administrators group and, on then display its Members blade. Verify that the tstark appears in
the list of group members.

19. Navigate back to the Groups - All groups blade, click the entry representing the IT System
Administrators group and, on then display its Members blade. Verify that the dbanner appears
in the list of group members. (Note: You might experience delays with updates of the dynamic
membership groups. To expedite the update, navigate to the group blade, display its Dynamic
membership rules blade, Edit the rule listed in the Rule syntax textbox by adding a whitespace at
the end, and Save the change.)

Task 3: Create an Azure Active Directory (AD) tenant

In this task, you will create a new Azure AD tenant.

1. In the Azure portal, search for and select Azure Active Directory.

2. Click + Create a directory and specify the following setting:

Setting Value

Directory type Azure Active Directory

Organization name Truevisions Lab

Initial Domain
any valid DNS name consisting of lower case letters and digits and starting with a letter
name

Country/Region United States


Setting Value

Note: The green check mark in the Initial domain name text box will indicate that the dom
typed in is valid and unique.

3. Click Review + create and then click Create.

4. Display the blade of the newly created Azure AD tenant by using the Click here to navigate
to your new directory: Truevisions Lab link or the Directory + Subscription button (directly to
the right of the Cloud Shell button) in the Azure portal toolbar.

Task 4: Manage Azure AD guest users.

In this task, you will create Azure AD guest users and grant them access to resources in an
Azure subscription.

1. In the Azure portal displaying the Truevisions Lab Azure AD tenant, in the Manage section,
click Users, and then click + New user.

2. Create a new user with the following settings (leave others with their defaults):

Setting Value

User name bmarley

Name Bob Marley

Let me create the password enabled

Initial password Pa55w.rd1234

Job title System Administrator

Department IT

Note: Copy to clipboard the full User name. You will need it later in this ta

3. Switch back to your default Azure AD tenant by using the Directory + Subscription button


(directly to the right of the Cloud Shell button) in the Azure portal toolbar.
4. Navigate back to the Users - All users blade, and then click + New guest user.

5. Create a new guest user with the following settings (leave others with their defaults):

Setting Value

Name bmarley

Email address paste the value you copied into the Clipboard earlier in this task

Usage location United States

Job title Lab Administrator

Department IT

6. Click Invite.

7. Back on the Users - All users blade, click the entry representing the newly created guest
user account.

8. On the bmarley - Profile blade, click Groups.

9. Click + Add membership and add the guest user account to the IT Lab
Administrators group.

Clean up resources
Note: Remember to remove any newly created Azure resources that you no longer use.
Removing unused resources ensures you will not incur unexpected costs. While, in this case,
there are no additional charges associated with Azure Active Directory tenants and their objects,
you might want to consider removing the user accounts, the group accounts, and the Azure
Active Directory tenant you created in this lab.

1. In the Azure portal, navigate to the Users - All users blade, click the entry representing
the bmarley guest user account, on the bmarley- Profile blade click Delete, and, when
prompted to confirm, click OK.

2. Repeat the same sequence of steps to delete the remaining user accounts you created in this
lab.
3. Navigate to the Groups - All groups blade, select the groups you created in this lab,
click Delete, and, when prompted to confirm, click OK.

4. Navigate to the Azure Active Directory Premium P2 - Licensed users blade, select the user
accounts to which you assigned licenses in this lab, click Remove license, and, when prompted
to confirm, click OK.

5. In the Azure portal, display the blade of the Truevisions Lab Azure AD tenant by using
the Directory + Subscription button (directly to the right of the Cloud Shell button) in the Azure
portal toolbar.

6. Navigate to the Users - All users blade, click the entry representing the bmarley user


account, on the bmarley - Profile blade click Delete, and, when prompted to confirm, click OK.

7. Navigate to the Truevisions Lab - Overview blade of the Truevisions Lab Azure AD tenant,


click Delete directory, on the Delete directory 'Truevisions Lab' blade, click the Get
permission to delete Azure resources link, on the Properties blade of Azure Active Directory,
set Access management for Azure resources to Yes and click Save.

8. Sign out from the Azure portal and sign in back.

9. Navigate back to the Delete directory 'Truevisions Lab' blade and click Delete.

Review
In this lab, you have:

 Created and configured Azure AD users


 Created Azure AD groups with assigned and dynamic membership
 Created an Azure Active Directory (AD) tenant
 Managed Azure AD guest users

New New user. 6. Create a new user with the following settings (leave others with their defaults):

Azure AD
TOTAL POINTS 5
1.
Question 1

You have an Azure AD tenant named Truevisions and an Azure subscription named SUB1.
Truevisions contains a group named Developers. SUB1 contains a Resource Group named
DEV1.

You need to provide the Developers group with the ability to create Azure Logic Apps in the
DEV1 Resource Group.

Solution: On DEV1, you assign the Logic App Contributor role to the Developers group.

Does this meet the goal?

1 / 1 point

Yes

No

Correct

The Logic App Contributor role will give the Developers group the needed permissions to add
Logic Apps to their solutions.

2.

Question 2

You have an Azure subscription named SUB1. SUB1 contains the Resource Groups in the
following table:

RG1 has a Web App named WEBAPP1. WEBAPP1 is located in West Europe.

You move WEBAPP1 to RG2.

What is the effect of the move?

1 / 1 point
The App Service Plan for WEBAPP1 moves to North Europe, Policy 2 applies to WEBAPP1

The App Service Plan for WEBAPP1 moves to West Europe, Policy 2 applies to WEBAPP1

The App Service Plan for WEBAPP1 moves to North Europe, Policy 1 applies to WEBAPP1

The App Service Plan for WEBAPP1 moves to West Europe, Policy 1 applies to WEBAPP1

Correct

The Policy stays the same.

3.

Question 3

You have an Azure subscription that contains an Azure Log Analytics Workspace named
WORKSPACE1.

You need to view the Error events form a table named EVENT.

Which query should you run in WORKSPACE1?

1 / 1 point

Get-Event Event | where $_.EventType –eq “ERROR”

Get-Event Event  | where {$_.EventType ==“ERROR”}

search in (Events) * | where EventType == “ERROR”

search in (Events) “ERROR”


search * from Event where EventType == “ERROR”

Event | where EventLevelType == 'ERROR"

Correct

This is correctly configured KUSTO query.

4.

Question 4

You have an Azure AD tenant named Truevisions and an Azure subscription named SUB1.
Truevisions contains a group named Developers. SUB1 contains a Resource Group named
DEV1.

You need to provide the Developers group with the ability to create Azure Logic Apps in the
DEV1 Resource Group.

Solution: On DEV1, you assign the Contributor Role to the Developers group.

Does this meet the goal?

1 / 1 point

Yes

No

Correct

This satisfies the requirements. You need to have the Contributor role permissions to be able to
add the Logic App to the Resource Group.

5.

Question 5

Your company has an existing Azure tenant named truevisions.onmicrosoft.com. The company
wants to start using truevisions.com. You add a custom domain to Azure. What are the other two
things you can do to verify the domain.

0 / 1 point
Add a TXT record to the DNS zone

Correct

You can use a TXT or MX record to verify ownership of a domain.

Add a SRV record to the DNS zone

Add a PTR record tothe DNS zone

This should not be selected

Add a CNAME record to the DNS zone

Add a MX record to the DNS zone

You might also like