Exam Tips: Azure Identity, Authentication, and Authorization Flashcards
1
Q
Identity, Authentication, and Authorization:
A
- Identity is the unique identifier for digital objects.
- Authentication verifies identity, while authorization assigns specific permissions.
- Microsoft Entra ID provides identity, authentication, and authorization services in Azure.
2
Q
Zero Trust:
A
- Zero trust assumes all users untrustworthy until proven otherwise.
- It relies on identity verification regardless of location, with no trusted networks.
3
Q
Least Privilege Access:
A
- Users should have just enough permissions to perform their specific tasks at any given time.
- This approach simplifies centralized management and applies policies based on user roles.
4
Q
Multifactor Authentication (MFA):
A
- MFA adds an extra layer of security by requiring at least two authentication components, such as something you know, have, or are.
- Microsoft recommends MFA for all Microsoft identities to enhance security.
5
Q
Conditional Access:
A
- Conditional access provides an additional layer of security by permitting or denying access based on specified rules.
- It is often implemented alongside MFA for enhanced security measures.
6
Q
Passwordless Authentication:
A
- Passwordless authentication removes the need for passwords and replaces them with more convenient yet secure methods, such as biometrics or PINs.
- It aims to increase convenience while maintaining security.
7
Q
External Guest Access:
A
- External guest access allows organizations to collaborate securely with external users, providing visibility within organizational IT borders.
- Business-to-business access facilitates trust between different tenants, while business-to-customer access improves integration with customer systems.
8
Q
Microsoft Entras ID Domain Services :
A
- Microsoft Entra ID DS offers legacy Active Directory features as a managed service in Azure, eliminating the need for infrastructure maintenance.
- It integrates with Microsoft Entra ID for identity and is useful for migrating or integrating legacy applications.
9
Q
Role-Based Access Control (RBAC):
A
- RBAC controls access to resources based on assigned roles for users, devices, applications, or services.
- Implement least privilege access and role segregation to ensure efficient and secure access management.
10
Q
Defense in Depth at the Identity Level:
A
- Layered defense at the identity level is essential for protecting user identities and enhancing application security.
- Implement multifactor authentication, conditional access, and passwordless authentication to strengthen identity security.