Concept of identity and how identity is used in public cloud (Azure). Various features provided by Azure AD
Size: 16.34 MB
Language: en
Added: Jan 28, 2022
Slides: 15 pages
Slide Content
Identity and Access Management Dinusha Kumarasiri
Agenda Identity Identity Management in On-premises Azure AD Azure AD Features Scopes Role Based Access Control Identity Collaboration
Identity Information that represent an agent (user / group) Identity is used to authenticate against an identity provider Used to access resources authorized for that identity Identity Provider Resource Trusts
Identity management on-premises Active Directory Domain Services Custom Protocols might not be compatible with cloud services Kerberos NTLM LDAP
Azure Active Directory Cloud based identity and access management service Works as an identity provider Can import on-premises identities to cloud Azure AD On-premises ADDS AAD Connect
AAD Features : Authentication Self-service password reset Multi-Factor Authentication
AAD Features : Application Management How do we connect with external applications? How can we avoid using different credentials for each application? App1 App2
AAD Features : Identity Protection Automate detection and remediation of identity based risks Investigate risks Integrate with other platforms Leaked Credentials Malware Linked IP Addresses Unfamiliar S ign-In P roperties Require MFA Self-Service Password Reset Block User Risks Remediation Risk Levels Review Detections - Reports Investigation Import to Other Platforms Export Risk Data Export
AAD Features : Privileged Identity Management Service to manage , control and monitor access to critical operations Elevating existing permissions Just In Time (JIT)
AAD Features : Seamless Sign-on Automatically signed into both on-premises and cloud-based applications Pass-through authentication Authentication agent in on-premises server Credentials never leaves on-premises Password hash synchronization Azure AD stores the hash of hash of the passwords stored in on-premises AD Azure AD Connect is used to synchronize
Scopes Root Management Group MG1 MG2 Subscription 2 Subscription 1 Resource Group R R Management Group Resource Group Resource Scope RBAC Policy Budget RBAC Policy Budget RBAC Policy Budget Apply Trusts Trusts Set of resources permissions , policies and costing can be applied at
Role Based Access Control (RBAC) Access management to cloud resources Security Principal Role Definition Sco pe
Identity Collaboration : B2B Allow external identities to collaborate with organization Allow external identities to use organization’s resources
Identity Collaboration : B2C Business to customer identity as a service Customers can use social accounts to connect