SlideShare a Scribd company logo
Identity Security
Azure Active Directory
Hello!
I am Eng Teong Cheah
Microsoft MVP
2
Azure Active Directory
3
Azure Active Directory(AD)
Microsoft’s cloud-based identity and access management
service, which helps your employees sign in and access
resources in:
◎ External resources, such as Microsoft 365, the Azure
portal, and thousands of other SaaS applications.
◎ Internal resources, such as apps on your corporate
network and intranet, along with any cloud apps
developed by your own organization.
4
Azure AD
◎ Cloud
◎ Designed for HTTP & HTTPS
◎ Queried via REST API’s
◎ Uses SAML, WS-Federation,
or OpenID for authentication
◎ Uses OAuth for
authentication
◎ Includes federation services
◎ Flat Structure
Azure AD vs Active Directory
Active Directory
◎ On-Premises
◎ Query via LDAP
◎ Used Kerberos for
Authentication
◎ No Federated Services
◎ Organizational Units(OU’s)
◎ Group Policy Object(GPO’s)
5
Roles for Azure AD
Global Administrator
Users with this role have access to
all administrative features in Azure
Active Directory
Security
Administrator
Users with this role have
permissions to manage security-
related features in the Microsoft
365 Security Center, Security
Center, Azure Active Directory
Identity Protection, Azure
Information Protection and Office
365 Security & Compliance Center.
Global Reader
Useers in this role can read
settings and administrative
information across Microsoft 365
services but can’t take
management actions.
Directory Reader
Makes purchases, manage
subscriptions, manages support
tickets, and monitors service
health
6
Azure AD Domain Services (Azure AD DS)
Provides managed domain services such as domain join,
group policy, lightweight directory access protocol
(LDAP), and Kerberos / NTLM authentication that is fully
compatible with Windows Server Active Directory.
7
Azure AD Users
8
All users must have an account The account is used for
authentication and authorization
Types of users: Azure AD, Active
Directory, Guest, B2C, and B2B
Azure AD Groups
Group Types
◎ Security groups
◎ Office 365 groups
Assignment Types
◎ Assigned
◎ Dynamic User
◎ Dynamic Device
(Security groups
only)
9
Azure MFA Concepts
Multi-factor authentication is a process where a user is
prompted during the sign-in process for an additional
form of identification, such as to enter a code on their
cellphone or to provide a fingerprint scan.
10
Azure MFA Concepts
Authentication methods include:
◎ Something you know (typically a password)
◎ Something you have (a trusted device that is not easily
duplicated, like phone)
◎ Something you are (biometrics)
11
Enabling MFA
Select the users that you want to
modify and enable for MFA
User states can be Enabled,
Enforced, or Disabled
On first-time sign-in, after MFA has
been enabled, users are prompted
to configure their MFA settings
12
Azure MFA is included free of
charge for global administrator
security
MFA Settings
Trusted IPs – Allows federated
users or IP address ranges to
bypass two-step authentication
One-time Bypass – Allows a user to
authenticate a single time without
performing two-step verification
Fraud Alerts – Users can report
fraudlent attempts to access their
resources
13
Demostrations
Role-Based Access Control
14
Thanks!
Any questions?
You can find me at:
@walkercet
15
References
◎ https://docs.microsoft.com/en-us/
16

More Related Content

PDF
Programming with Azure Active Directory
Joonas Westlin
 
PDF
Active Directory & LDAP | Security for Elasticsearch
Jochen Kressin
 
PDF
Access Security - Hybrid Identity
Eng Teong Cheah
 
PPTX
Zero Credential Development with Managed Identities
Joonas Westlin
 
PPTX
Zero Credential Development with Managed Identities for Azure resources
Joonas Westlin
 
PDF
Compute Security - Container Security
Eng Teong Cheah
 
PPTX
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
Tom Kerkhove
 
PPTX
Class Project: Security in Microsoft Azure
saitoserge
 
Programming with Azure Active Directory
Joonas Westlin
 
Active Directory & LDAP | Security for Elasticsearch
Jochen Kressin
 
Access Security - Hybrid Identity
Eng Teong Cheah
 
Zero Credential Development with Managed Identities
Joonas Westlin
 
Zero Credential Development with Managed Identities for Azure resources
Joonas Westlin
 
Compute Security - Container Security
Eng Teong Cheah
 
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
Tom Kerkhove
 
Class Project: Security in Microsoft Azure
saitoserge
 

What's hot (19)

PPTX
Global Azure Bootcamp 2017 - Azure Key Vault
Alberto Diaz Martin
 
PDF
Access Security - Enterprise governance
Eng Teong Cheah
 
PPTX
Azure key vault
Rahul Nath
 
PPTX
Securing sensitive data with Azure Key Vault
Tom Kerkhove
 
PPTX
Azure Key Vault - Getting Started
Taswar Bhatti
 
PDF
Consolidating Infrastructure with Azure Kubernetes Service
Eng Teong Cheah
 
PDF
Microsoft Azure Security Infographic
Microsoft Azure
 
PDF
Microsoft Azure Security Overview
Alert Logic
 
PDF
Azure Penetration Testing
Cheah Eng Soon
 
PPTX
Azure security basics
Stas Lebedenko
 
PDF
Tour to Azure Security Center
Lalit Rawat
 
PPTX
Azure key vault - Brisbane User Group
Rahul Nath
 
PPTX
Windows Azure Security & Compliance
Nuno Godinho
 
PPTX
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
Tom Kerkhove
 
PPTX
48. Azure Active Directory - Part 1
Shawn Ismail
 
PPTX
Azure Security Overview
Allen Brokken
 
PPTX
Building a document e-signing workflow with Azure Durable Functions
Joonas Westlin
 
PDF
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
NCCOMMS
 
PDF
Azure security architecture
Karl Ots
 
Global Azure Bootcamp 2017 - Azure Key Vault
Alberto Diaz Martin
 
Access Security - Enterprise governance
Eng Teong Cheah
 
Azure key vault
Rahul Nath
 
Securing sensitive data with Azure Key Vault
Tom Kerkhove
 
Azure Key Vault - Getting Started
Taswar Bhatti
 
Consolidating Infrastructure with Azure Kubernetes Service
Eng Teong Cheah
 
Microsoft Azure Security Infographic
Microsoft Azure
 
Microsoft Azure Security Overview
Alert Logic
 
Azure Penetration Testing
Cheah Eng Soon
 
Azure security basics
Stas Lebedenko
 
Tour to Azure Security Center
Lalit Rawat
 
Azure key vault - Brisbane User Group
Rahul Nath
 
Windows Azure Security & Compliance
Nuno Godinho
 
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
Tom Kerkhove
 
48. Azure Active Directory - Part 1
Shawn Ismail
 
Azure Security Overview
Allen Brokken
 
Building a document e-signing workflow with Azure Durable Functions
Joonas Westlin
 
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
NCCOMMS
 
Azure security architecture
Karl Ots
 
Ad

Similar to Identity Security - Azure Active Directory (20)

PPTX
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
FredBrandonAuthorMCP
 
PPSX
AzureAAD
TonyHotko
 
PDF
Secure Your Cloud Environment with Azure Active Directory (AD)
WinWire Technologies Inc
 
PPTX
826182700-AZ-500T00A-ENU-Powerpoint-01.pptx
wisdomrobertkonudze
 
PDF
Best Practices in Cloud Security
Alert Logic
 
PPTX
Preparing your enteprise for Hybrid AD Join and Conditional Access
Jason Condo
 
PDF
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
Kumton Suttiraksiri
 
PPTX
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Max Fritz
 
PPTX
Azure from scratch part 2 By Girish Kalamati
Girish Kalamati
 
PPTX
Securing your Azure Identity Infrastructure
Vignesh Ganesan I Microsoft MVP
 
PPTX
2018 November - AZUGDK - Azure AD
Peter Selch Dahl
 
PDF
Premier Webcast - Identity Management with Windows Azure AD
uberbaum
 
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
PDF
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
Scott Hoag
 
PPTX
MD-102T00-ENU-PowerPoxxxxxxxxxint_05.pptx
mloga861
 
PDF
MSFT Cloud Architecture Information Protection
Kesavan Munuswamy
 
PPTX
Azure Community Tour 2019 - AZUGDK
Peter Selch Dahl
 
PPTX
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
SPS Paris
 
PPTX
O365-AzureAD Identity management
David Pechon
 
PPTX
JoTechies - Cloud identity
JoTechies
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
FredBrandonAuthorMCP
 
AzureAAD
TonyHotko
 
Secure Your Cloud Environment with Azure Active Directory (AD)
WinWire Technologies Inc
 
826182700-AZ-500T00A-ENU-Powerpoint-01.pptx
wisdomrobertkonudze
 
Best Practices in Cloud Security
Alert Logic
 
Preparing your enteprise for Hybrid AD Join and Conditional Access
Jason Condo
 
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
Kumton Suttiraksiri
 
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Max Fritz
 
Azure from scratch part 2 By Girish Kalamati
Girish Kalamati
 
Securing your Azure Identity Infrastructure
Vignesh Ganesan I Microsoft MVP
 
2018 November - AZUGDK - Azure AD
Peter Selch Dahl
 
Premier Webcast - Identity Management with Windows Azure AD
uberbaum
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
Scott Hoag
 
MD-102T00-ENU-PowerPoxxxxxxxxxint_05.pptx
mloga861
 
MSFT Cloud Architecture Information Protection
Kesavan Munuswamy
 
Azure Community Tour 2019 - AZUGDK
Peter Selch Dahl
 
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
SPS Paris
 
O365-AzureAD Identity management
David Pechon
 
JoTechies - Cloud identity
JoTechies
 
Ad

More from Eng Teong Cheah (20)

PDF
Modern Cross-Platform Apps with .NET MAUI
Eng Teong Cheah
 
PDF
Efficiently Removing Duplicates from a Sorted Array
Eng Teong Cheah
 
PDF
Monitoring Models
Eng Teong Cheah
 
PDF
Responsible Machine Learning
Eng Teong Cheah
 
PDF
Training Optimal Models
Eng Teong Cheah
 
PDF
Deploying Models
Eng Teong Cheah
 
PDF
Machine Learning Workflows
Eng Teong Cheah
 
PDF
Working with Compute
Eng Teong Cheah
 
PDF
Working with Data
Eng Teong Cheah
 
PDF
Experiments & TrainingModels
Eng Teong Cheah
 
PDF
Automated Machine Learning
Eng Teong Cheah
 
PDF
Getting Started with Azure Machine Learning
Eng Teong Cheah
 
PDF
Hacking Containers - Container Storage
Eng Teong Cheah
 
PDF
Hacking Containers - Looking at Cgroups
Eng Teong Cheah
 
PDF
Hacking Containers - Linux Containers
Eng Teong Cheah
 
PDF
Data Security - Storage Security
Eng Teong Cheah
 
PDF
Application Security- App security
Eng Teong Cheah
 
PDF
Application Security - Key Vault
Eng Teong Cheah
 
PDF
Compute Security - Host Security
Eng Teong Cheah
 
PDF
Virtual Networking Security - Network Security
Eng Teong Cheah
 
Modern Cross-Platform Apps with .NET MAUI
Eng Teong Cheah
 
Efficiently Removing Duplicates from a Sorted Array
Eng Teong Cheah
 
Monitoring Models
Eng Teong Cheah
 
Responsible Machine Learning
Eng Teong Cheah
 
Training Optimal Models
Eng Teong Cheah
 
Deploying Models
Eng Teong Cheah
 
Machine Learning Workflows
Eng Teong Cheah
 
Working with Compute
Eng Teong Cheah
 
Working with Data
Eng Teong Cheah
 
Experiments & TrainingModels
Eng Teong Cheah
 
Automated Machine Learning
Eng Teong Cheah
 
Getting Started with Azure Machine Learning
Eng Teong Cheah
 
Hacking Containers - Container Storage
Eng Teong Cheah
 
Hacking Containers - Looking at Cgroups
Eng Teong Cheah
 
Hacking Containers - Linux Containers
Eng Teong Cheah
 
Data Security - Storage Security
Eng Teong Cheah
 
Application Security- App security
Eng Teong Cheah
 
Application Security - Key Vault
Eng Teong Cheah
 
Compute Security - Host Security
Eng Teong Cheah
 
Virtual Networking Security - Network Security
Eng Teong Cheah
 

Recently uploaded (20)

PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Best ERP System for Manufacturing in India | Elite Mindz
Elite Mindz
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PPT
L2 Rules of Netiquette in Empowerment technology
Archibal2
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PPTX
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Software Development Company | KodekX
KodekX
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Doc9.....................................
SofiaCollazos
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Best ERP System for Manufacturing in India | Elite Mindz
Elite Mindz
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
L2 Rules of Netiquette in Empowerment technology
Archibal2
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Software Development Company | KodekX
KodekX
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 

Identity Security - Azure Active Directory

  • 2. Hello! I am Eng Teong Cheah Microsoft MVP 2
  • 4. Azure Active Directory(AD) Microsoft’s cloud-based identity and access management service, which helps your employees sign in and access resources in: ◎ External resources, such as Microsoft 365, the Azure portal, and thousands of other SaaS applications. ◎ Internal resources, such as apps on your corporate network and intranet, along with any cloud apps developed by your own organization. 4
  • 5. Azure AD ◎ Cloud ◎ Designed for HTTP & HTTPS ◎ Queried via REST API’s ◎ Uses SAML, WS-Federation, or OpenID for authentication ◎ Uses OAuth for authentication ◎ Includes federation services ◎ Flat Structure Azure AD vs Active Directory Active Directory ◎ On-Premises ◎ Query via LDAP ◎ Used Kerberos for Authentication ◎ No Federated Services ◎ Organizational Units(OU’s) ◎ Group Policy Object(GPO’s) 5
  • 6. Roles for Azure AD Global Administrator Users with this role have access to all administrative features in Azure Active Directory Security Administrator Users with this role have permissions to manage security- related features in the Microsoft 365 Security Center, Security Center, Azure Active Directory Identity Protection, Azure Information Protection and Office 365 Security & Compliance Center. Global Reader Useers in this role can read settings and administrative information across Microsoft 365 services but can’t take management actions. Directory Reader Makes purchases, manage subscriptions, manages support tickets, and monitors service health 6
  • 7. Azure AD Domain Services (Azure AD DS) Provides managed domain services such as domain join, group policy, lightweight directory access protocol (LDAP), and Kerberos / NTLM authentication that is fully compatible with Windows Server Active Directory. 7
  • 8. Azure AD Users 8 All users must have an account The account is used for authentication and authorization Types of users: Azure AD, Active Directory, Guest, B2C, and B2B
  • 9. Azure AD Groups Group Types ◎ Security groups ◎ Office 365 groups Assignment Types ◎ Assigned ◎ Dynamic User ◎ Dynamic Device (Security groups only) 9
  • 10. Azure MFA Concepts Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan. 10
  • 11. Azure MFA Concepts Authentication methods include: ◎ Something you know (typically a password) ◎ Something you have (a trusted device that is not easily duplicated, like phone) ◎ Something you are (biometrics) 11
  • 12. Enabling MFA Select the users that you want to modify and enable for MFA User states can be Enabled, Enforced, or Disabled On first-time sign-in, after MFA has been enabled, users are prompted to configure their MFA settings 12 Azure MFA is included free of charge for global administrator security
  • 13. MFA Settings Trusted IPs – Allows federated users or IP address ranges to bypass two-step authentication One-time Bypass – Allows a user to authenticate a single time without performing two-step verification Fraud Alerts – Users can report fraudlent attempts to access their resources 13
  • 15. Thanks! Any questions? You can find me at: @walkercet 15