AZ 104 Module - 01
AZ 104 Module - 01
Administer Identity
Configure Azure Active Directory
A cloud-based suite of
identity management
capabilities that enables you
to securely manage access to
Azure services and resources
for your users
Provides application
management, authentication,
device management, and
hybrid identity
Benefits and features
• Single sign-on to any cloud or on-premises web app. Azure Active Directory provides secure single sign-on to cloud and
on-premises applications. SSO includes Microsoft 365 and thousands of SaaS applications such as Salesforce, Workday,
DocuSign, ServiceNow, and Box.
• Works with iOS, macOS, Android, and Windows devices. Users can launch applications from a personalized web-based
access panel, mobile app, Microsoft 365, or custom company portals using their existing work credentials. The experience is
the same on iOS, macOS, Android, and Windows devices.
• Protect on-premises web applications with secure remote access. Access your on-premises web applications from
everywhere and protect with multifactor authentication, conditional access policies, and group-based access management.
Users can access SaaS and on-premises web apps from the same portal.
• Easily extend Active Directory to the cloud. You can connect Active Directory and other on-premises directories to Azure
Active Directory in just a few steps. This connection means a consistent set of users, groups, passwords, and devices across
both environments.
• Protect sensitive data and applications. You can enhance application access security with unique
identity protection capabilities. This includes a consolidated view into suspicious sign-in activities and
potential vulnerabilities. You can also take advantage of advanced security reports, notifications,
remediation recommendations, and risk-based policies.
• Reduce costs and enhance security with self-service capabilities. Delegate important tasks such as
resetting passwords and the creation and management of groups to your employees. Providing
self-service application access and password management through verification steps can reduce
helpdesk calls and enhance security.
Describe Azure AD Concepts
Concept Description
Azure AD account An identity created through Azure AD or another Microsoft cloud service
A dedicated and trusted instance of Azure AD, a Tenant is automatically created when
your organization signs up for a Microsoft cloud service subscription
REST API Querying. Because Azure AD is HTTP/HTTPS based, it cannot be queried through
LDAP. Instead, Azure AD uses the REST API over HTTP and HTTPS.
Federation Services. Azure AD includes federation services, and many third-party services
(such as Facebook).
Flat structure. Azure AD users and groups are created in a flat structure, and there are no
Organizational Units (OUs) or Group Policy Objects (GPOs).
Select Azure Active Directory Editions
Feature Free Microsoft 365 Apps Premium P1 Premium P2
Directory Objects 500,000 objects No object limit No object limit No object limit
Single Sign-On Unlimited Unlimited Unlimited Unlimited
Core Identity and Access X X X X
B2B Collaboration X X X X
Premium Features X X
Hybrid Identities X X
Advanced Group Access X X
Conditional Access X X
Identity Protection X
Identity Governance X
Azure Active Directory Free. Provides user and group management, on-premises directory
synchronization, basic reports, and single sign-on across Azure, Microsoft 365, and many popular
SaaS apps.
Azure Active Directory Microsoft 365 Apps. This edition is included with O365. In addition to the
Free features, this edition provides Identity & Access Management for Microsoft 365 apps including
branding, MFA, group access management, and self-service password reset for cloud users.
Azure Active Directory Premium P1. In addition to the Free features, P1 also lets your hybrid users
access both on-premises and cloud resources. It also supports advanced administration, such as
dynamic groups, self-service group management, Microsoft Identity Manager (an on-premises
identity and access management suite) and cloud write-back capabilities, which allow self-service
password reset for your on-premises users.
Azure Active Directory Premium P2. In addition to the Free and P1 features, P2 also offers Azure
Active Directory Identity Protection to help provide risk-based Conditional Access to your apps and
critical company data. Privileged Identity Management is included to help discover, restrict, and
monitor administrators and their access to resources and to provide just-in-time access when needed.
Configure Azure AD Device Identities
Azure AD registered devices Azure AD joined devices Hybrid Azure AD joined devices
• Supports Bring Your Own Device • Intended for cloud-first or cloud- • You have Win32 apps deployed to
• Registered devices sign-in using a only organizations these devices using Active Directory
Microsoft account • Organization-owned devices machine authentication
• Attached to an Azure AD account • Joined only to Azure AD - • You want to continue to use Group
granting access to resources organizational account required Policy to manage the device
• Control using Mobile Device • Can use Conditional Access policies • You want to use existing image
Management (MDM) tools like solutions to deploy devices
• OS – Windows 10+ devices
Microsoft Intune • OS - Windows 7+ devices
• OS – Windows 10+, iOS, Android,
and MacOS
Implement Self-Service Password Reset
All users must The account is used for Each user account has additional
have an account authentication and authorization properties
Typically, Azure AD defines users in three ways:
Cloud identities. These users exist only in Azure AD. Examples are administrator accounts and
users that you manage yourself. Cloud identities can be in Azure Active Directory or an external
Azure Active Directory, if the user is defined in another Azure AD instance. When these accounts
are removed from the primary directory, they are deleted.
Guest users. These users exist outside Azure. Examples are accounts from other cloud providers
and Microsoft accounts such as an Xbox LIVE account. Their source is Invited user. This type of
account is useful when external vendors or contractors need access to your Azure resources.
Once their help is no longer necessary, you can remove the account and all of their access.
Note: Users can also be added to Azure AD through
Microsoft 365 Admin Center, Microsoft Intune
Manage User Accounts admin console, and the CLI.
Must be Global
User profile Deleted users Sign in and audit
Administrator or User
(picture, job, contact can be restored log information
Administrator to
info) is optional for 30 days is available
manage users
Perform bulk account updates
Passwords. Implement a convention for the initial password of the newly created user. Figure out
a way for the new users to receive their password in a secure way. Methods commonly used
include generating a random password and emailing it to the new user or their manager.
Microsoft 365 groups. Microsoft 365 groups Dynamic Device (Security groups only). Lets you
provide collaboration opportunities by giving use dynamic group rules to automatically add and
members access to a shared mailbox, calendar, remove devices. If a device's attributes change, Azure
files, SharePoint site, and more. You can give reviews the dynamic group rules for the directory. If
people outside of your organization access to the device meets the rule requirements, they're added.
the group. Both users and admins can use If the device no longer meets the rules requirements,
Microsoft 365 groups. they're removed.
Assign Licenses to Users and Groups