Chapter 13 — Azure Identity Services

Why Identity Matters in the Cloud

In traditional IT, security was primarily about network perimeters — firewalls kept attackers out. In cloud computing, resources are accessible from anywhere, so the focus shifts to identity as the primary security boundary.

Identity is the new perimeter. Controlling who can access what is the foundation of cloud security.


1. Microsoft Entra ID (formerly Azure Active Directory)

What Is It?

Microsoft Entra ID (previously called Azure Active Directory or Azure AD) is Microsoft's cloud-based identity and access management (IAM) service. It is the backbone of authentication and authorization for Azure, Microsoft 365, and thousands of third-party applications.

What Entra ID Does

Function

Description

Authentication

Verifies who you are (proves your identity)

Authorization

Determines what you can access (controls permissions)

Single Sign-On (SSO)

One login gives access to many apps

Multi-Factor Authentication (MFA)

Adds a second verification step

Conditional Access

Grant/block access based on conditions

Application registration

Connect apps to Entra ID for auth

User and group management

Create, update, delete users and groups

Active Directory vs. Entra ID

Many people confuse on-premises Active Directory (AD) with Entra ID. They are different:

Feature

On-Premises AD

Microsoft Entra ID

Type

Directory service

Cloud identity service

Protocol

LDAP, Kerberos

HTTPS, OAuth 2.0, SAML, OpenID Connect

Location

Your data center

Microsoft's cloud

Device join

Domain join

Entra ID join / hybrid join

Management

Group Policy (GPO)

Intune, Conditional Access

Use case

On-premises resources

Cloud and SaaS resources

Entra ID is NOT just Active Directory in the cloud — it's a fundamentally different, cloud-native identity system.

Entra ID Editions

Edition

Features

Free

Basic user management, SSO for 10 apps

P1 (Premium)

Conditional Access, MFA, hybrid identity

P2 (Premium)

Identity Protection, Privileged Identity Management


2. Authentication vs. Authorization

These two terms are often confused — both are essential:

Term

Question It Answers

Example

Authentication

"Who are you?"

Logging in with username + password

Authorization

"What can you do?"

Can you delete files? Read this database?

Step 1 — Authentication:
  User enters username + password + MFA code
  Entra ID verifies: "Yes, this is Alice." ✓

Step 2 — Authorization:
  Alice tries to delete a VM
  RBAC check: "Alice has Reader role — she can't delete." ✗

3. Single Sign-On (SSO)

SSO allows users to log in once and access multiple applications without re-entering credentials.

Without SSO:
  Log in to Azure Portal → separate username/password
  Log in to Microsoft 365 → separate username/password
  Log in to Salesforce → separate username/password
  (3 logins, 3 passwords to remember)

With SSO:
  Log in once to Entra ID → access all three apps automatically
  (1 login, 1 password)

Benefits of SSO

  • Better user experience (less password fatigue)

  • Reduced helpdesk calls for password resets

  • Single place to revoke access (disable one account = locked out everywhere)

  • Better security (fewer passwords = fewer attack vectors)

Supported SSO Protocols

Protocol

Used By

SAML 2.0

Enterprise SaaS apps

OpenID Connect

Modern web and mobile apps

OAuth 2.0

API authorization

WS-Federation

Legacy enterprise apps


4. Multi-Factor Authentication (MFA)

MFA requires users to prove their identity with two or more verification methods:

Factor 1: Something you KNOW     → Password / PIN
Factor 2: Something you HAVE     → Phone / Hardware token
Factor 3: Something you ARE      → Fingerprint / Face recognition

MFA Verification Methods in Entra ID

Method

Description

Microsoft Authenticator app

Push notification or one-time code

SMS text message

Code sent to phone number

Phone call

Automated call — press # to verify

Hardware OATH token

Physical device generating codes

Windows Hello for Business

Biometric (fingerprint, face)

FIDO2 security key

Physical USB/NFC security key

Why MFA Matters

Even if someone steals your password, they still can't log in without the second factor.

Attack scenario:
  Attacker has your password  →  Types username + password
  MFA prompt on your phone    →  Attacker doesn't have your phone
  Result: Login BLOCKED ✓

Microsoft reports that MFA blocks 99.9% of automated account attacks.


5. Conditional Access

Conditional Access is an Entra ID feature that evaluates conditions before granting or denying access. It acts like an intelligent gatekeeper.

How It Works

User tries to sign in
      │
      ▼
Conditional Access Policy evaluates:
  - Who is the user?
  - What device are they on?
  - What app are they accessing?
  - Where are they signing in from? (location/IP)
  - Is the device compliant?
      │
      ▼
  Decision: Allow / Block / Require MFA / Require compliant device

Example Conditional Access Policies

Policy

Condition

Action

Require MFA for admins

User = Global Admin

Require MFA always

Block legacy auth

Protocol = Basic Auth

Block

Block suspicious locations

Sign-in from high-risk country

Block

Require compliant device

Accessing HR app

Device must be Intune-managed

Allow only trusted devices

Finance app

Block if device not compliant


6. Entra ID External Identities

Entra ID supports identity for people outside your organization:

Azure AD B2B (Business-to-Business)

Invite external users (partners, contractors, suppliers) to collaborate in your Azure or Microsoft 365 environment using their own organization's credentials.

Partner at Contoso logs in with their Contoso Microsoft account
→ Gets access to your SharePoint site or Azure resource
→ You don't create a password for them — they use their own

Azure AD B2C (Business-to-Consumer)

A customer identity and access management (CIAM) solution. Lets your customers sign in to your app using:

  • Their email and a new password

  • Social accounts (Google, Facebook, Apple)

  • Custom identity providers

Your e-commerce app → Customer signs in with Google account → B2C handles authentication

7. Self-Service Password Reset (SSPR)

SSPR allows users to reset their own passwords without calling the helpdesk.

User forgets password
  ↓
Clicks "Forgot my password"
  ↓
Verifies identity (email / phone / security questions)
  ↓
Resets password themselves
  ↓
Back to work — no helpdesk ticket needed

Benefits:

  • Reduces IT helpdesk burden significantly

  • Faster for users (no wait time)

  • Works 24/7


8. Role-Based Access Control (RBAC)

RBAC in Azure controls what actions users can perform on Azure resources.

How RBAC Works

A role assignment consists of:

  1. Who (a user, group, or service principal)

  2. What role (a collection of permissions)

  3. What scope (management group, subscription, resource group, or resource)

Built-In Azure Roles

Role

Permissions

Owner

Full control — can manage everything including access

Contributor

Create and manage resources — cannot change access

Reader

View resources — cannot make changes

User Access Administrator

Manage access only — cannot manage resources

RBAC Inheritance

Role assigned at Subscription level
  → Applies to ALL resource groups in the subscription
    → Applies to ALL resources in those resource groups

You can assign a more restrictive role at a lower scope to override inherited permissions.


Identity Services Summary

Service

Purpose

Entra ID

Cloud identity platform — users, groups, apps

SSO

One login for many apps

MFA

Two-factor verification to prevent unauthorized access

Conditional Access

Smart policies based on conditions

B2B

External partner/contractor access

B2C

Customer identity for your apps

SSPR

Let users reset their own passwords

RBAC

Control what users can do with Azure resources


Quick Recap

Entra ID       → Microsoft's cloud identity service (not traditional AD)
Authentication → Who are you? (verify identity)
Authorization  → What can you do? (control access)
SSO            → Login once, access everything
MFA            → Second verification = 99.9% attack protection
Conditional Access → Smart if-this-then-that policies for login
RBAC           → Owner > Contributor > Reader > custom roles

Official References


Next Chapter → Chapter 14: Azure Security Services