Describe Azure Identity, access and security Flashcards
What is azure active directory? (AD)
- directory service that enables you to sign in and access both Microsoft cloud applications and cloud applications that you develop
- also helps maintain on-prem AD deployment
- microsofts cloud-based identity and access management service
- can detect sign-in attempts from unexpected locations or unknown devices
who uses azure AD?
-IT admins
-App devs
-users
-online service subs
what does azure AD do?
-authentication
-single sign-on
-app management
-device management
What is Azure AD connect?
- synchronizes user identities between on-prem AD and Azure AD
- synchs changes between both systems so you can use single-in on, MFA and self-service password reset under both systems
what is Azure AD Directory Domain Service (Azure AD DS)
- service that provides managed domain services such as domain join, group policy LDAP and NTLM authentication
- lets you use directory services without having to maintain infrastructure supporting it
- managed domain allows running legacy apps in cloud that cant use modern auth
How does Azure AD DS work?
- when created you define a unique namespace, this is the domain name
- 2 windows server domain controllers are deployed into selected region
- you don’t need to manage or update the DCs, azure does it for you
what is single sign-on (SSO)?
- enables users to sign in one time and use that credential to access multiple resources and apps from different providers
- the apps and providers must trust the initial authenticator
- only need to remember one ID and one password
- only as secure as the initial authenticator
What is MFA?
- prompt user for extra form of ID during sign in
- protects against password compromise
- can be asked for something user knows (security q), something they have (phone code) or something they are (fingerprint)
- Azure AD MFA allows user to choose additional form of auth during sign in
what is passwordless auth?
- most convenient security measure
- asked for something you have plus something you are or something you know
- Azure AD has 3 forms, windows hello, authenticator app and FIDO2 Sec keys
what is windows hello
- biometric and PIN are directly tied to user’s PC
- once PC is registered they can log in using PIN
what is auth app?
- MFA option and passwordless option
- sign into any platform by getting phone notification to match a number on the screen to the one on the phone and then use biometrics/pin to confirm
what is FIDO2 security keys?
- unphishable standards-based passwordless auth method that can come in any form factor
- allows orgs to leverage standard to sign-in to their resources without password by using external sec key
- users register, select a key at the sign-in interface and go
- keys are usually USB devices but could be Bluetooth or NFC
What is an external identity?
- a person, device or service that is outside of your org
What is Azure External identities?
- refers to all the ways you can securely interface with users outside of org such as collaboration with partners, distributors, suppliers or vendors and
- external users can “bring own identities”
- e.g. social ID like facebook
- external users ID provider manages their ID and you manage access to your apps with Azure AD or AD B2C to keep resources protectedq
what is B2B?
- business to business
- collaborate with external users by letting them use preferred ID to sign into Microsoft or other enterprise apps
- represented in the directory as guest users
what is B2B direct connect?
- establish a mutal 2 way trust with another Azure AD organisation for seamless collaboration
- teams shared channels supported
- users arent represented in your directory but they’re visible from within their home instances of Teams
What is AD B2C?
- Business to customer
- publish modern SaaS apps or custom-developed apps to consumers and customers while using B2C for ID and access management
What is azure conditional access?
- tool that Azure AD uses to allow access to resources based on ID signals which include who the user is, where they are and what device they are requesting access from
- helps with MFA, users wont be asked for second auth if they at known location
- signal -> decision -> enforcement policy
When is conditional access useful?
- MFA based on role, location or network (e.g. require MFA for admins but not regular users)
- require access to services only through approved client apps (e.g. only gmail can be used to connect to email service)
- require users to access app from managed devices
- block untrusted sources
what is role based access control? (RBAC)
- control access of resources through roles as opposed to assigning access permissions to individuals
- azure provides built-in roles for common cases but you can also create custom roles
- roles contain perms
How is RBAC applied to resources?
- RBAC applied to a scope which is a resource or set of resources that this applies to
- scopes include; management group, single sub, resource group, a single resource
- its hierarchical in nature, access to a parent scope is inherited by all child scopes
How is RBAC enforced?
- enforced on any action that initiated against an Azure resource that passes through Azure resource manager
- doesn’t enforce access perms at the app or data level
what is the zero trust model?
- security model that assumes the worst case scenario and protects resources with that expectation
- assume breach at the outset then verifies each request as though it originated from uncontrolled network
what principles is zero trust model based on?
- verify explicitly; always auth and authorize based on all available data points
- use least privilege access ; limit user access with JIT, risk based adaptive policies and data protection
- assume breach; minimize blast radius and segment access, end-end encryption
- requires everyone to authenticate then grants accessed based on auth