SC 300T00A ENU PowerPoint 01
SC 300T00A ENU PowerPoint 01
• Explore identity
• Identity administration concepts
• Authentication and authorization
• Auditing and other identity concepts
• Identity landscape
• Zero Trust and identity
• Why use an identity
• Identity administration concepts
• Authentication and authorization topics
• Auditing in identity and supplemental topics
1) Zero Trust
Verify explicitly Use least privilege Assume breach
2) Identity 3) Actions
Decentralize providers Authenticate – Prove – AuthN Continuous
• B2B Authorize – Get – AuthZ
• B2C Administer – Configure update
• Verifiable Credentials Audit - Report
4) Usage 5) Maintain
Secure ➔ Cryptography Protect – Detect – Respond
Services are paid ➔ Licenses
Identities―whether they represent, people, services, devices, or event IoT devices – define the Zero Trust control
plane. When an identity attempts to access a resource, verify that identity with strong authentication, and ensure
access is compliant and typical for that identity. Follow least privilege access principles.
Identity Baseline discipline overview - Cloud Adoption Framework | Microsoft Overview of the security pillar - Microsoft Azure Well-Architected Framework |
Docs Microsoft Docs
Identity and access management checklist - Microsoft Azure Well-Architected
Framework | Microsoft Docs
© Copyright Microsoft Corporation. All rights reserved.
Why an identity?
An identity provider (IdP) is a system that creates, manages and stores digital
identities. Microsoft Entra ID is an example. The capabilities and features of identity
providers can vary. The most common components are:
• A repository of user identities
• An authentication system
• Security protocols that defend against intrusion
• Someone we trust
What is decentralized
identity?
User-generated
Self-owned
Globally unique
identifier
Immutable
Censorship resistant
Tamper evasive
An identity solution controls access to an organization’s apps and data. Users, devices, and applications have
identities.
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Entra ID architecture and terms
Microsoft Entra ID is a cloud-based identity and access management solution, with
integrated security and a flat architectural design.
Customers Business
Social IDs, email, local accounts Securely authenticate your Apps and APIs
customers using their
preferred identity provider
Security Assertion Markup Web Services Federation (WS- OpenID Connect (OIDC)
Language (SAML) Fed) OIDC extends the OAuth 2.0
Open standard for exchanging An identity specification from a authorization protocol for use as
authentication and authorization Web Services Security framework an authentication protocol, so
data between an identity to provide single-sign-on via that you can do single sign-on
provider and a service provider. external identity exchange and using OAuth.
• The principal, generally authentication.
a user
• The identity provider (IdP)
• The service provider (SP)
Enforcement
• OAuth 2.0
Role-based access control (RBAC) Grant access based on the user's role.
Policy-based access control (PBAC) Role and policy combined to determine user access.
Microsoft Entra ID can support any of these methods and others, based on your business
and security goals.
Log
Build/Maintain
Monitor/Audit
Cryptography is the process of converting data so that only a specific recipient will be able
to read it, using a key.
Cryptography within identity:
• Hashing―the creation of a statistically unique fixed length value to act as a unique identifier.
• Passwords are hashed instead of transmitted over the internet
• Digital signatures―sign a message so the receiver knows the origin of the message and that it has not
been tampered with.
• Encryption―process of encoding data into cipher text for storage or transmission.
• Administration―maintenance
© Copyright Microsoft Corporation. All rights reserved. © Copyright Microsoft Corporation. All rights reserved.
References
Decentralized Identity (Did)
https://docs.microsoft.com/azure/active-directory/verifiable-
credentials/decentralized-identifier-overview
Claims-based
https://docs.microsoft.com/sharepoint/dev/general-
development/claims-based-identity-term-definitions
Claims-based
https://docs.microsoft.com/sharepoint/dev/general-
development/claims-based-identity-term-definitions