Azure Identity, Access and Security

Identity

In computing, “identity” is a representation of a person, application or device.

“Identity systems” get hacked all the time.

  1. Storing password in plain text
  2. Using outdated (easily broken) encryption like MD5
  3. Storing the salt with the data
  4. Not enforcing proper password complexity
  5. Not enforcing password change policies

Microsoft is a worldwide leader in enterprise identity management with: Active Directory

They extend their lead in the cloud with: Microsoft Entra ID (used to be called Azure Active Directory).

Active Directory and Microsoft Entra are not direct replacements of each other.

Active Directory uses protocols such as LDAP and Kerberos for communication.

Entra ID uses protocols such as SAML and OAuth for communication.

Instead of coding your own security backend, you can use APIs to Entra ID to handle authentication and authorization.

Benefits of Azure AD

  1. Security
    1. Reduced development time, easier support
  2. More features
  3. Centralized administration
  4. Only one user ID and password
    1. Single Sign-on
  5. Integration with other Azure services

Azure AD Conditional Access

https://learn.microsoft.com/en-us/entra/identity/conditional-access/overview

Azure Multi Factor authentication

  1. Something you know - password
  2. Something you have - mobile phone, access to email account
  3. Something you are - fingerprint

RBAC (Role Based Access Control)

Zero Trust Methodology

Microsoft Defender for Cloud


Links to this note