these are my notes as i prepare for a certification exam
i already have fundamental understanding of aad/entra so i am not covering that , we will move to some specific topics
conditional access policies – these are policies that allow or block access based on certain conditions and it requires azure ad premium p1 licensing. it is possible to get locked and blocked out of your own environment, so its good to run these policies in a report only mode and use the what if tool to evaluate , before you actually apply these policies.
- named locations – msft maps the ip addresses to countries and now you can have named locations
- you can add ip ranges
- assignments – you can include all the roles and groups to which to these policies apply to , what apps these are applicable for and then add conditions like specific location , device type , granular control with device properties etc
- Access controls – this controls access enforcement like require mfa , and other policies and you can and /or these grants. Session access controls are for specific
- identity protection
Privileged identity management – PIM – This allows finer more granular controls on who gets access to what resource when , in other words you could use this to set up a workflow , where someone wants to log in as a global admin and your require another approver to approve the request etc. , in this case someone is eligible but they don’t get immediate access, you sort of have to initiate the approval
Term or concept | Role assignment category | Description |
---|---|---|
eligible | Type | A role assignment that requires a user to perform one or more actions to use the role. If a user has been made eligible for a role, that means they can activate the role when they need to perform privileged tasks. There’s no difference in the access given to someone with a permanent versus an eligible role assignment. The only difference is that some people don’t need that access all the time. |
active | Type | A role assignment that doesn’t require a user to perform any action to use the role. Users assigned as active have the privileges assigned to the role. |
activate | The process of performing one or more actions to use a role that a user is eligible for. Actions might include performing a multi-factor authentication (MFA) check, providing a business justification, or requesting approval from designated approvers. | |
assigned | State | A user that has an active role assignment. |
activated | State | A user that has an eligible role assignment, performed the actions to activate the role, and is now active. Once activated, the user can use the role for a preconfigured period of time before they need to activate again. |
permanent eligible | Duration | A role assignment where a user is always eligible to activate the role. |
permanent active | Duration | A role assignment where a user can always use the role without performing any actions. |
time-bound eligible | Duration | A role assignment where a user is eligible to activate the role only within start and end dates. |
time-bound active | Duration | A role assignment where a user can use the role only within start and end dates. |
just-in-time (JIT) access | A model in which users receive temporary permissions to perform privileged tasks, which prevents malicious or unauthorized users from gaining access after the permissions have expired. Access is granted only when users need it. | |
principle of least privilege access | A recommended security practice in which every user is provided with only the minimum privileges needed to accomplish the tasks they’re authorized to perform. This practice minimizes the number of Global Administrators and instead uses specific administrator roles for certain scenarios. |
PIM aslo allows conduct reviewing of audit history , set up time bound access etc
access reviews. – automate the review and schedule the maintenance of access removal,need p2 licensing, create and manage reviews in azure portal -> Active directory -> identity governance
RBAC to give least privilege access
PIM to provision access only when its needed
Sign in risk policy – to restrict sing ins from anonymous ips
What if feature helps determine whether access would be allowed or denied when multiple policies are configured and also allows to specify the conditions and parameters of a given scenario to determine the policy result
conditional access includes functionality to create locations based on geography , in this case microsoft manages the ip addresses associated with the location to determine whether the request originates from a specific country. Locations like headoffice can be tagged as a trusted location , once a location is configured m it can be used in zero or more policies either to include or exclude them
PIM is required if we want to ensure MFA for global admins , pim can be used this way to control activation of assigned privileges
identity protection can be used to protect Azure AD identities from suspicious activity
access reviews can review user access for sso to apps integrated with AAD, Azure AD roles and Azure resource roles within PIM, as well as Group Reviews