Manage identity and access Flashcards
What are the 4 types of user accounts in Entra ID?
- Internal member
- Internal guest
- External member
- External guest
Define an ‘Internal member’ user account
Most likely full-time employees in an organization.
Define an ‘Internal guest’ user account
An account in the tenant with guest level priviledge.
Define an ‘External member’ user account
Users authenticate using an external account, but have member access to a tenant.
Define an ‘External guest’
Guests of your tenant who authenticate using an external method and who have guest-level privileges.
What is the minimum role needed to create a new user?
User Administrator
What is the minimum role needed to invite an external guest?
Guest Inviter
What is the minimum rule needed to assign a Entra ID role to another user?
Privileged Role Administrator
Can a security group be nested within another security group?
Yes
How are permissions inherited with a nested security group?
Only members in the parent group will have access to shared resources in the child group, not vise versa.
Can a dynamic user/devices membership change?
Membership will change automatically if underlying attributes change.
Is it possible for a user to join a group without being assigned membership by an admin or policy?
Yes, by requesting access to the group.
Describe the process of a user requesting access to a group
User can either be granted access automatically, or the request will need to be approved by an owner.
If there are multiple owners for a group, does each owner need to approve an access request?
Yes; If one of them disapproves, the user is notified, but isn’t added to the group.
How is a guest user identified?
Their user principal name contains the ‘#EXT#’ identifier.
How are users identified when using Entra B2B?
Guest users uses their own identity management system.
Does a guest user need an Entra account to gain user access with Entra B2B?
No.
Is Entra B2B enabled by default?
Yes.
How is Entra B2B collaboration managed with other Entra tentans/organizaitons?
Cross-tenant access settings.
What are controls that can be implemented with cross-tenant access settings?
Manage scope access to users/groups/apps; MFA.
What setting determines who can invite non-Entra ID external users?
External collaboration settings
How can external collaboration settings restrict access?
Define who can invite external users, allow or block B2B specific domains, and set restrictions on guest user access.
Describe ‘self-service sign up’
Create a sign-up experience for external users who want to access your apps.
How can an Azure based self-service sign-up be integrated with external cloud systems?
With API connectors
How can the self-service sign-up process be customized?
Custom approval workflows, perform identity verification, and validate user-provided information.
How can guest users sign-in with a social account or external identity provider? (Facebook, Google, etc.)
Federation.
Can a second Entra tenant be created to manage external identities?
Yes; External configuration allows you to manage your apps and customer accounts separately from your workforce.
What are the best use cases for implementing Entra B2B?
Let business guests access your Office 365 apps, software-as-a-service (SaaS) apps, and line-of-business applications.
Define an ‘Entra Tenant’
A dedicated and trusted instance of Microsoft Entra ID that contains an organization’s resources, including registered apps and a directory of users.
What are the two tenant configurations?
- Workforce
- External
Describe a ‘Workforce’ Entra ID tenant and its purpose
A standard Microsoft Entra tenant that contains your employees, internal business apps, and other organizational resources and the capability to invite guests.
Describe an ‘External Tenant’ Entra ID Tenant and its purpose
Used exclusively for apps you want to publish to consumers or business customers while identities are managed by External ID.
What is the purpose/function of external ID in a workforce tenant?
Collaborating with business partners from external organizations like suppliers, partners, vendors.
How does SSO function with External ID in an External Tenant?
SSO to apps registered in the external tenant is supported. SSO to Microsoft 365 or to other Microsoft SaaS apps isn’t supported.
Does an External Tenant support entitlement management?
No.
Describe ‘Entra B2B direct connect’
create two-way trust relationships with other Microsoft Entra organizations.
What is the purpose/function of implementing Entra B2B direct connect?
A users to seamlessly sign in to Teams shared channels for chat, calls, file-sharing, and app-sharing.
How is access authenticated with Entra B2B direct connect?
Users authenticate in their home organization and receive a token from the resource organization for access.
Describe ‘Entra entitlement management for business guest sign-up’
Configure policies that manage access for external users and determine who the individual requesting access is.
Describe ‘cross-tenant synchronization’
Automates creating, updating, and deleting B2B users across a multitenant configuration.
How does cross-tenant synchronization operate?
Is a push process from the source tenant, not a pull process from the target tenant; Inbound only organizational setting to allow the administrator of a source tenant to synchronize users into a target tenant.
What types of user accounts can be synced in cross-tenant synchronization?
Internal members only.
How is a cross-tenant synchronization established?
Define a trust relationship between a source tenant and a target tenant.
What properties are configured on the source tenant in a cross-tenant synchronization?
Automatic redemption; Sync settings
configuration; Users in scope.
What properties are configured on the target tenant in a cross-tenant synchronization?
Cross-tenant access settings; Automatic redemption.
What is the overall function of Microsoft Entra Identity Protection?
Detect, investigate, and remediate identity-based risks.
What are some of the signals used to determine risky sign-in behavior?
Anonymous IP address usage
Password spray attacks
Leaked credentials
How does Microsoft Entra Identity Protection detect sign-in risk?
During each sign-in, real-time sign-in detections generate a sign-in session risk level.
Once Microsoft Entra Identity Protection determines risk, what occurs?
Based on this risk level, policies are then applied to protect the user and the organization.
What are the 3 reports Entra Identity Protection provides?
- Risk detections
- Risky sign-ins
- Risky users
Define a ‘Risk detection’
Each risk detected is reported as a risk detection.
Define a ‘Risky sign-in’
Reported when there are one or more risk detections reported for that sign-in.
What conditions define a ‘Risky user’?
The user has one or more Risky sign-ins; One or more risk detections have been reported.
How can a risky sign-in be remediated automatically?
Require user to input MFA or secure password reset based on detected risk level, if successful the risk is remediated.
What role provides full access to Identity protection?
Security Administrator
What roles provide view all Identity Protection reports and Overview?
Security Operator and Security Reader.
What role(s) can dismiss user risk, confirm safe sign-in, confirm compromise?
Security Administrator and Security Operator
What role provides read-only access to Entra Identity Protection?
Global reader.
What is the least privilege role needed to create sign-in polices?
Conditional Access administrators.
What Entra ID license is needed for Entra Identity Protection?
Entra ID P2.
Describe ‘password hash synchronization with Microsoft Entra ID’
Hybrid identity sign-in method implemented by Entra Connect.
How does ‘password hash synchronization’ function?
Synchronizes a hash of a users on-premises AD password with Microsoft Entra ID.
Describe ‘Pass-through authentication’
Allows users to use the same password on-premises and in the cloud, but doesn’t require the additional infrastructure of a federated environment.
Describe ‘Entra Connect Federation’
Used to configure a hybrid environment with an on-premises AD FS infrastructure.
What service is used to monitor the healthy of on prem identity infrasturcute?
Entra Connect Health.
What are the two Microsoft offerings for synching hybrid identities?
- Entra Cloud Sync
- Entra Connect Sync
How does Entra Connect Sync function?
Orchestrated in Microsoft Online Services using a cloud provisioning agent installed on the AD server.
What are the key benefits of Entra Cloud Sync compared to Entra Connect Sync?
Sync from a regional multi-forest AD; Can use multiple lightweight agents instead of one application.
What are the key benefits of Entra Connect Sync compared to Entra Cloud Sync?
Support for device objects; Pass-Through Authentication; Allows unlimited AD objects.
What are the two forms of cloud autneticaton?
- Entra password hash synchronization
- Entra pass-through authentication
What form of cloud authentication supports sign-in disaster recovery or leaked credential reports?
Entra password hash synchronization.
What cloud authentication method is required for Entra Identity Protection?
Password Hash Sync.
What is the best use case for password hash sync cloud authentication?
Orgs that only need their users to sign in to Microsoft 365, SaaS apps, and other Microsoft Entra ID-based resources..
How often does password hash sync perform password synchronization?
Every 2 minutes.
What needs to be installed for password hash sync to function?
Microsoft Entra Connect.
How many Entra Cloud Sync agents need to be installed for passthrough authentication to function?
At least one, but 3 is recommended.
Which cloud hybrid authentication method can enforce on prem policies at the time of sign-in?
Pass-through Authentication.
How should redundancy/failover be planned when utilizing Password hash synchronization?
Deploy a second Microsoft Entra Connect server in staging mode in a standby configuration.
How should redundancy/failover be planned when utilizing Pass-through Authentication?
Deploy two extra pass-through authentication agents.
Which cloud authentication method can serve as a failover to the other authentication method?
Use password hash synchronization as a backup authentication method for pass-through authentication
What are the 3 required steps to use password hash synchronization?
- Install Microsoft Entra Connect
- Configure directory synchronization
- Enable password hash synchronization
Can the failover between pass-through authentication and password hash synchronization be automated?
No; the failover must be manually initiated from Entra Connect.