Understanding Azure Active Directory Concepts

Welcome to the core concepts section for Azure Active Directory (Azure AD). This guide will walk you through the fundamental building blocks and principles that govern identity and access management within the Azure ecosystem.

Introduction to Azure AD

Azure Active Directory is a cloud-based identity and access management service. It enables users to sign in to applications and resources located on-premises and in the cloud. It provides a robust set of features for managing users, groups, and devices, as well as securing access to applications and data.

Azure AD Tenants

A tenant is a dedicated and trusted instance of Azure AD that an organization receives through a Microsoft cloud service, such as Azure, Microsoft 365, or Dynamics 365. Each Azure AD tenant is distinct and separate from any other Azure AD tenant. It contains all the organization's user accounts, application registrations, and other identity-related objects.

Users

Users are the individuals who access your organization's resources. In Azure AD, users can be:

Each user is represented by a unique object in Azure AD, which includes attributes like name, email, and organizational role.

Groups

Groups are collections of users, devices, or other groups that can be used to simplify management. Assigning access to a group is more efficient than assigning it to individual users.

Types of groups include:

Applications

In Azure AD, an application is a software program that uses Azure AD to sign in users and securely call Microsoft Graph or other APIs. Applications can be:

Registering an application in Azure AD enables single sign-on (SSO) and provides a centralized way to manage access.

Service Principals

A service principal is an identity that an application, hosted service, or automated tool uses to access Azure resources. It's a specific type of security principal representing an application's identity in a tenant.

When you register an application in Azure AD, a service principal object is automatically created in the tenant where the application is registered. If the application is deployed to other tenants, a service principal object must be created in each of those tenants as well.

Roles

Azure AD defines roles that grant specific permissions to perform administrative tasks. These roles are crucial for enforcing the principle of least privilege.

Examples include:

Permissions

Permissions define what actions a user or application can perform on Azure AD resources. These are often granted through role assignments.

Azure AD uses a role-based access control (RBAC) model, where permissions are bundled into roles, and roles are assigned to security principals (users, groups, or service principals).

Conditional Access

Conditional Access is an Azure AD feature that acts as a gatekeeper, enforcing organizational policies to govern access to cloud apps and resources. It allows administrators to define rules based on user, location, device, application, and real-time risk detection.

Key components:

Identity Protection

Azure AD Identity Protection uses machine learning and artificial intelligence to detect and respond to identity-based risks. It helps organizations protect against credential theft and account compromise.

Key features:

Azure AD B2B Collaboration

B2B collaboration enables you to securely invite external users (partners, vendors, clients) to your Azure AD tenant. These external users access your applications and resources using their own identity credentials.

Benefits:

Azure AD B2C Identity

Azure AD B2C (Business-to-Consumer) is a cloud identity service for customer-facing web and mobile applications. It allows consumers to sign up for applications using existing social accounts (like Google or Facebook) or by creating new credentials.

Key characteristics: