Azure AD Identity

Documentation for Microsoft Entra ID (formerly Azure Active Directory)

Introduction to Azure AD Identity

Microsoft Entra ID (formerly Azure Active Directory) is a cloud-based identity and access management service that helps your employees sign in to and access resources such as Microsoft 365, thousands of other SaaS applications, and even custom line-of-business applications.

It provides a robust set of features for managing user identities, ensuring secure access, and enabling seamless collaboration across your organization. This documentation will guide you through the essential aspects of Azure AD.

Core Concepts

Getting Started

To begin using Azure AD, you typically need an Azure subscription or a Microsoft 365 subscription. You can then:

  1. Create a Tenant: If you don't have one already.
  2. Add Users: Invite users to your tenant.
  3. Configure Applications: Register and configure applications for single sign-on (SSO).
  4. Set Up Policies: Implement security and access policies.
Note: As of July 2023, Azure Active Directory has been rebranded as Microsoft Entra ID. You'll see this name change reflected across Azure and Microsoft 365 services.

Authentication Flows

Azure AD supports various authentication protocols and flows to accommodate different application types and scenarios. Key protocols include:

Common authentication flows include:

Authorization and Access Control

Once a user or service is authenticated, Azure AD determines what resources they can access and what operations they can perform. This is managed through:

Managing Users and Groups

Effective identity management starts with well-organized users and groups.

User Management:

Group Management:

Managing Applications

Azure AD acts as an identity provider for your applications, enabling single sign-on (SSO) and secure API access.

Tip: Utilize the Azure AD gallery for quick integration of common SaaS applications.

Key Security Features

Azure AD offers advanced security features to protect your organization's identities and resources.

Important: Implementing MFA and Conditional Access is crucial for enhancing your organization's security posture.

Getting Started Tutorials

Explore these quick start tutorials to get hands-on experience: