Skip to content

Commit 1b300a2

Browse files
authored
Merge pull request #241290 from MicrosoftDocs/main
6/12/2023 3PM Publishing
2 parents 8049cdc + 3f0d7ab commit 1b300a2

File tree

174 files changed

+17588
-775
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

174 files changed

+17588
-775
lines changed

articles/active-directory/devices/device-management-azure-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: how-to
9-
ms.date: 07/18/2022
9+
ms.date: 06/12/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -139,7 +139,7 @@ Global readers, Cloud Device Administrators, Intune Administrators, and Global A
139139

140140
The exported list includes these device identity attributes:
141141

142-
`accountEnabled, approximateLastLogonTimeStamp, deviceOSType, deviceOSVersion, deviceTrustType, dirSyncEnabled, displayName, isCompliant, isManaged, lastDirSyncTime, objectId, profileType, registeredOwners, systemLabels, registrationTime, mdmDisplayName`
142+
`displayName,accountEnabled,operatingSystem,operatingSystemVersion,joinType (trustType),registeredOwners,userNames,mdmDisplayName,isCompliant,registrationTime,approximateLastSignInDateTime,deviceId,isManaged,objectId,profileType,systemLabels,model`
143143

144144
## Configure device settings
145145

articles/active-directory/fundamentals/backup-authentication-system.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,9 @@ Microsoft is continuously expanding the number of supported scenarios.
3535

3636
## Which non-Microsoft workloads are supported?
3737

38-
The backup authentication system automatically provides incremental resilience to tens of thousands of supported non-Microsoft applications based on their authentication patterns. Seethe appendix for a list of the most [common non-Microsoft applications and their coverage status](#appendix). For an in depth explanation of which authentication patterns are supported, see the article [Understanding Application Support for the backup authentication system](backup-authentication-system-apps.md) article.
38+
The backup authentication system automatically provides incremental resilience to tens of thousands of supported non-Microsoft applications based on their authentication patterns. See the appendix for a list of the most [common non-Microsoft applications and their coverage status](#appendix). For an in depth explanation of which authentication patterns are supported, see the article [Understanding Application Support for the backup authentication system](backup-authentication-system-apps.md) article.
3939

40-
- Native applications using the OAuth 2.0 protocol to access resource applications, such as popular non-Microsoft e-mail and IM clients like: Apple Mail, Aqua Mail, Gmail, Samsung Email, Spark, and Thunderbird
40+
- Native applications using the OAuth 2.0 protocol to access resource applications, such as popular non-Microsoft e-mail and IM clients like: Apple Mail, Aqua Mail, Gmail, Samsung Email, and Spark.
4141
- Line of business web applications configured to authenticate with OpenID Connect using only ID tokens.
4242
- Web applications authenticating with the SAML protocol, when configured for IDP-Initiated Single Sign On (SSO) like: ADP, Atlassian Cloud, AWS, GoToMeeting, Kronos, Marketo, Palo Alto Networks, SAP Cloud Identity Trello, Workday, and Zscaler.
4343

@@ -146,7 +146,6 @@ The backup authentication system is supported in all cloud environments except A
146146
| Slack | No | SAML SP-initiated |
147147
| Smartsheet | No | SAML SP-initiated |
148148
| Spark | Yes | Protected |
149-
| Thunderbird | Yes | Protected |
150149
| UKG pro | Yes \* | Protected |
151150
| VMware Boxer | Yes | Protected |
152151
| walkMe | No | SAML SP-initiated |
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
---
2+
title: Introduction to identity
3+
description: Learn the fundamental concepts of identity and access management (IAM). Learn about identities, resources, authentication, authorization, permissions, identity providers, and more.
4+
services: active-directory
5+
author: rwike77
6+
manager: CelesteDG
7+
8+
ms.service: active-directory
9+
ms.subservice: develop
10+
ms.topic: conceptual
11+
ms.date: 06/05/2023
12+
ms.author: ryanwi
13+
ms.reviewer:
14+
---
15+
16+
# Identity and access management (IAM) fundamental concepts
17+
18+
This article provides fundamental concepts and terminology to help you understand identity and access management (IAM).
19+
20+
## What is identity and access management (IAM)?
21+
22+
Identity and access management ensures that the right people, machines, and software components get access to the right resources at the right time. First, the person, machine, or software component proves they're who or what they claim to be. Then, the person, machine, or software component is allowed or denied access to or use of certain resources.
23+
24+
Here are some fundamental concepts to help you understand identity and access management:
25+
26+
## Identity
27+
28+
A digital identity is a collection of unique identifiers or attributes that represent a human, software component, machine, asset, or resource in a computer system. An identifier can be:
29+
- An email address
30+
- Sign-in credentials (username/password)
31+
- Bank account number
32+
- Government issued ID
33+
- MAC address or IP address
34+
35+
Identities are used to authenticate and authorize access to resources, communicate with other humans, conduct transactions, and other purposes.
36+
37+
At a high level, there are three types of identities:
38+
39+
- **Human identities** represent people such as employees (internal workers and front line workers) and external users (customers, consultants, vendors, and partners).
40+
- **Workload identities** represent software workloads such as an application, service, script, or container.
41+
- **Device identities** represent devices such as desktop computers, mobile phones, IoT sensors, and IoT managed devices. Device identities are distinct from human identities.
42+
43+
## Authentication
44+
45+
Authentication is the process of challenging a person, software component, or hardware device for credentials in order to verify their identity, or prove they're who or what they claim to be. Authentication typically requires the use of credentials (like username and password, fingerprints, certificates, or one-time passcodes). Authentication is sometimes shortened to *AuthN*.
46+
47+
Multi-factor authentication (MFA) is a security measure that requires users to provide more than one piece of evidence to verify their identities, such as:
48+
- Something they know, for example a password.
49+
- Something they have, like a badge or [security token](/azure/active-directory/develop/security-tokens).
50+
- Something they are, like a biometric (fingerprint or face).
51+
52+
Single sign-on (SSO) allows users to authenticate their identity once and then later silently authenticate when accessing various resources that rely on the same identity. Once authenticated, the IAM system acts as the source of identity truth for the other resources available to the user. It removes the need for signing on to multiple, separate target systems.
53+
54+
## Authorization
55+
56+
Authorization validates that the user, machine, or software component has been granted access to certain resources. Authorization is sometimes shortened to *AuthZ*.
57+
58+
## Authentication vs. authorization
59+
60+
The terms authentication and authorization are sometimes used interchangeably, because they often seem like a single experience to users. They're actually two separate processes:
61+
- Authentication proves the identity of a user, machine, or software component
62+
- Authorization grants or denies the user, machine, or software component access to certain resources
63+
64+
:::image type="content" source="./media/identity-fundamentals/authentication-vs-authorization.svg" alt-text="Diagram that shows authentication and authorization side by side." :::
65+
66+
Here's a quick overview of authentication and authorization:
67+
68+
| Authentication | Authorization |
69+
| ------- | -------- |
70+
| Can be thought of as a gatekeeper, allowing access only to those who provide valid credentials. | Can be thought of as a guard, ensuring that only those with the proper clearance can enter certain areas. |
71+
| Verifies whether a user, machine, or software is who or what they claim to be.| Determines if the user, machine, or software is allowed to access a particular resource. |
72+
| Challenges the user, machine, or software for verifiable credentials (for example, passwords, biometric identifiers, or certificates).| Determines what level of access a user, machine, or software has.|
73+
| Done before authorization. | Done after successful authentication. |
74+
| Information is transferred in an ID token. | Information is transferred in an access token. |
75+
| Often uses the OpenID Connect (OIDC) (which is built on the OAuth 2.0 protocol) or SAML protocols. | Often uses the OAuth 2.0 protocol. |
76+
77+
For more detailed information, read [Authentication vs. authorization](/azure/active-directory/develop/authentication-vs-authorization).
78+
79+
### Example
80+
81+
Suppose you want to spend the night in a hotel. You can think of authentication and authorization as the security system for the hotel building. Users are people who want to stay at the hotel, resources are the rooms or areas that people want to use. Hotel staff is another type of user.
82+
83+
If you're staying at the hotel, you first go to reception to start the "authentication process". You show an identification card and credit card and the receptionist matches your ID against the online reservation. After the receptionist has verified who you are, the receptionist grants you permission to access the room you've been assigned. You're given a keycard and can go now to your room.
84+
85+
:::image type="content" source="./media/identity-fundamentals/hotel-authentication.png" alt-text="Diagram that shows a person showing identification to get a hotel keycard." :::
86+
87+
The doors to the hotel rooms and other areas have keycard sensors. Swiping the keycard in front of a sensor is the "authorization process". The keycard only lets you open the doors to rooms you're permitted to access, such as your hotel room and the hotel exercise room. If you swipe your keycard to enter any other hotel guest room, your access is denied. Individual [permissions](/azure/active-directory/fundamentals/users-default-permissions?context=/azure/active-directory/roles/context/ugr-context), such as accessing the exercise room and a specific guest room, are collected into [roles](/azure/active-directory/roles/concept-understand-roles) which can be granted to individual users. When you're staying at the hotel, you're granted the Hotel Patron role. Hotel room service staff would be granted the Hotel Room Service role. This role permits access to all hotel guest rooms (but only between 11am and 4pm), the laundry room, and the supply closets on each floor.
88+
89+
:::image type="content" source="./media/identity-fundamentals/hotel-authorization.png" alt-text="Diagram that shows a user getting access to a room with a keycard." :::
90+
91+
## Identity provider
92+
93+
An identity provider creates, maintains, and manages identity information while offering authentication, authorization, and auditing services.
94+
95+
:::image type="content" source="./media/identity-fundamentals/identity-provider.png" alt-text="Diagram that shows an identity icon surrounded by cloud, workstation, mobile, and database icons." :::
96+
97+
With modern authentication, all services, including all authentication services, are supplied by a central identity provider. Information that's used to authenticate the user with the server is stored and managed centrally by the identity provider.
98+
99+
With a central identity provider, organizations can establish authentication and authorization policies, monitor user behavior, identify suspicious activities, and reduce malicious attacks.
100+
101+
[Microsoft Azure Active Directory](/azure/active-directory/) is an example of a cloud-based identity provider. Other examples include Twitter, Google, Amazon, LinkedIn, and GitHub.
102+
103+
## Next steps
104+
105+
- Read [Introduction to identity and access management](introduction-identity-access-management.md) to learn more.
106+
- Learn about [Single sign-on (SSO)](/azure/active-directory/manage-apps/what-is-single-sign-on).
107+
- Learn about [Multi-factor authentication (MFA)](/azure/active-directory/authentication/concept-mfa-howitworks).

articles/active-directory/fundamentals/identity-secure-score.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,12 @@ Controls can be scored in two ways. Some are scored in a binary fashion - you ge
104104

105105
Actions labeled as [Not Scored] are ones you can perform in your organization but won't be scored because they aren't hooked up in the tool (yet!). So, you can still improve your security, but you won't get credit for those actions right now.
106106

107+
In addition, the recommended actions:
108+
* Protect all users with a user risk policy
109+
* Protect all users with a sign-in risk policy
110+
111+
Also won't give you credits when configured using Conditional Access Policies, yet, for the same reason as above. For now, these actions give credits only when configured through Identity Protection policies.
112+
107113
### How often is my score updated?
108114

109115
The score is calculated once per day (around 1:00 AM PST). If you make a change to a measured action, the score will automatically update the next day. It takes up to 48 hours for a change to be reflected in your score.

0 commit comments

Comments
 (0)