- Back to the Cloud
- Posts
- 🛡️ Unlocking Azure Identity: Who Are You and What Can You Do?
🛡️ Unlocking Azure Identity: Who Are You and What Can You Do?

Hey there, identity navigator!
Last week, we explored the core of Azure’s engine — Compute services. This week on “Back to the cloud”, we're diving into something just as critical: Identity and Access Management.
🔹 1. Azure Active Directory (Azure AD)
🔐 What Is It?
Azure AD is Microsoft’s cloud-based identity and access management (IAM) service. It helps employees sign in and access:
Microsoft 365
Azure portal
Custom apps
Thousands of SaaS apps
Think of it as the cloud version of Active Directory, but not a 1-to-1 replacement of on-prem AD.
🔑 Key Features:
Single Sign-On (SSO): One login for all apps and services.
Authentication: Username + password, MFA, biometrics.
Authorization: What users are allowed to do (via RBAC).
Device registration: Manage mobile and PCs.
Conditional Access: Enforce policies based on location, device, etc.
✅ Common Azure AD Objects:
Object | Description |
---|---|
Users | People with login access |
Groups | Collection of users |
Applications | Registered apps (e.g., SaaS or custom) |
Service Principals | Identity for apps/services to access resources |
💡 Exam Tip:
"Which service handles user authentication in Azure?" ✅ Answer: Azure Active Directory
🔹 2. Role-Based Access Control (RBAC)
🔒 What is RBAC?
Controls what users can do with Azure resources.
Identity = who RBAC = what they’re allowed to do
🧩 RBAC Components:
Component | Description |
---|---|
Security Principal | User, group, service principal, or managed identity |
Role Definition | Collection of permissions (e.g., Reader, Contributor) |
Scope | Level at which role applies (Management Group → Subscription → Resource Group → Resource) |
Role Assignment | Binds a principal to a role at a scope |
🔑 Built-in Roles to Know:
Role | Permissions |
---|---|
Owner | Full access + manage access |
Contributor | Full access, can't manage access |
Reader | View-only |
User Access Administrator | Manage RBAC permissions |
📌 You can also create custom roles, but that's not on AZ-900.
🔹 3. Multi-Factor Authentication (MFA)
🛡️ What is MFA?
Requires two or more authentication methods:
Password
OTP (phone/email)
Biometrics (Windows Hello, Authenticator app)
📌 Enabled via Azure AD → Free tier includes MFA for admins by default.
🔹 4. Conditional Access
🚦 What is it?
Azure AD feature to apply rules and policies based on conditions, like:
User/group
Device type
Location (IP)
App being accessed
Example: Require MFA if login is from a new country.
🧠 What is it?
Uses AI and machine learning to detect risky sign-ins and risky users.
Can automatically:
Block sign-ins
Force password resets
Trigger conditional access
📌 Available in Azure AD Premium P2, not on the free tier.
🔹 6. Azure AD Join vs. Hybrid Join
Type | Use Case |
---|---|
Azure AD Join | Devices joined directly to Azure AD (cloud-only environments) |
Hybrid Join | Devices joined to on-prem AD + Azure AD (for hybrid orgs) |
🔹 7. Managed Identities
Automatically manage identities for Azure resources (like VMs or App Services).
Used to access other Azure services securely (like Azure Key Vault) without storing credentials.
📌 Available in System-assigned (1:1) or User-assigned (reusable across resources).
✅ AZ-900 Quick Identity Scenarios
Scenario | Service |
---|---|
Authenticate users across cloud apps | Azure AD |
Give a developer read-only access to a resource group | RBAC – Reader role |
Require a second factor to access the Azure Portal | MFA |
Restrict access by location | Conditional Access |
Automatically detect and respond to risky logins | Identity Protection |
Allow a VM to access a Key Vault securely | Managed Identity |
🧠 Final Exam Tips for Azure Identity
Know Azure AD is used for authentication and SSO.
RBAC = Authorization at scope levels (Subscription → Resource Group → Resource).
MFA is a common security feature. It protects against stolen credentials.
Conditional Access lets you create smart access policies.
Managed Identity = No secrets or credentials needed for resource-to-resource access.