You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/fundamentals/identity-management-overview.md
+19-36Lines changed: 19 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,20 +7,20 @@ author: TerryLanfear
7
7
manager: rkarlin
8
8
9
9
ms.assetid: 5aa0a7ac-8f18-4ede-92a1-ae0dfe585e28
10
-
ms.service: information-protection
11
-
ms.subservice: aiplabels
10
+
ms.service: security
11
+
ms.subservice: security-fundamentals
12
12
ms.topic: article
13
13
ms.tgt_pltfrm: na
14
14
ms.workload: na
15
-
ms.date: 02/05/2021
15
+
ms.date: 12/05/2022
16
16
ms.author: terrylan
17
17
# Customer intent: As an IT Pro or decision maker, I am trying to learn about identity management capabilities in Azure
18
18
---
19
19
# Azure identity management security overview
20
20
21
21
Identity management is the process of authenticating and authorizing [security principals](/windows/security/identity-protection/access-control/security-principals). It also involves controlling information about those principals (identities). Security principals (identities) may include services, applications, users, groups, etc.
22
-
Microsoft identity and access management solutions help IT protect access to applications and resources across the corporate datacenter and into the cloud. Such protection enables additional levels of validation, such as Multi-Factor Authentication and Conditional Access policies. Monitoring suspicious activity through advanced security reporting, auditing, and alerting helps mitigate potential security issues. [Azure Active Directory Premium](../../active-directory/fundamentals/active-directory-whatis.md) provides single sign-on (SSO) to thousands of cloud software as a service (SaaS) apps and access to web apps that you run on-premises.
23
-
22
+
Microsoft identity and access management solutions help IT protect access to applications and resources across the corporate datacenter and into the cloud. Such protection enables additional levels of validation, such as Multi-Factor Authentication and Conditional Access policies. Monitoring suspicious activity through advanced security reporting, auditing, and alerting helps mitigate potential security issues. [Azure Active Directory Premium](../../active-directory/fundamentals/active-directory-whatis.md#what-are-the-azure-ad-licenses) provides single sign-on (SSO) to thousands of cloud software as a service (SaaS) apps and access to web apps that you run on-premises.
23
+
24
24
By taking advantage of the security benefits of Azure Active Directory (Azure AD), you can:
25
25
26
26
* Create and manage a single identity for each user across your hybrid enterprise, keeping users, groups, and devices in sync.
@@ -75,20 +75,16 @@ Learn more:
75
75
76
76
Azure AD Multi-Factor Authentication is a method of authentication that requires the use of more than one verification method and adds a critical second layer of security to user sign-ins and transactions. Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication via a range of verification options: phone calls, text messages, or mobile app notifications or verification codes and third-party OAuth tokens.
*[What is Azure AD Multi-Factor Authentication?](../../active-directory/authentication/concept-mfa-howitworks.md)
82
-
*[How Azure AD Multi-Factor Authentication works](../../active-directory/authentication/concept-mfa-howitworks.md)
78
+
Learn more: [How Azure AD Multi-Factor Authentication works](../../active-directory/authentication/concept-mfa-howitworks.md)
83
79
84
80
## Azure RBAC
85
81
86
82
Azure RBAC is an authorization system built on Azure Resource Manager that provides fine-grained access management of resources in Azure. Azure RBAC allows you to granularly control the level of access that users have. For example, you can limit a user to only manage virtual networks and another user to manage all resources in a resource group. Azure includes several built-in roles that you can use. The following lists four fundamental built-in roles. The first three apply to all resource types.
87
83
88
-
-[Owner](../../role-based-access-control/built-in-roles.md#owner) - Has full access to all resources including the right to delegate access to others.
89
-
-[Contributor](../../role-based-access-control/built-in-roles.md#contributor) - Can create and manage all types of Azure resources but can't grant access to others.
90
-
-[Reader](../../role-based-access-control/built-in-roles.md#reader) - Can view existing Azure resources.
91
-
-[User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) - Lets you manage user access to Azure resources.
84
+
*[Owner](../../role-based-access-control/built-in-roles.md#owner) - Has full access to all resources including the right to delegate access to others.
85
+
*[Contributor](../../role-based-access-control/built-in-roles.md#contributor) - Can create and manage all types of Azure resources but can't grant access to others.
86
+
*[Reader](../../role-based-access-control/built-in-roles.md#reader) - Can view existing Azure resources.
87
+
*[User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) - Lets you manage user access to Azure resources.
92
88
93
89
Learn more:
94
90
@@ -97,7 +93,7 @@ Learn more:
97
93
98
94
## Security monitoring, alerts, and machine learning-based reports
99
95
100
-
Security monitoring, alerts, and machine learning-based reports that identify inconsistent access patterns can help you protect your business. You can use Azure AD access and usage reports to gain visibility into the integrity and security of your organization’s directory. With this information, a directory administrator can better determine where possible security risks might lie so that they can adequately plan to mitigate those risks.
96
+
Security monitoring, alerts, and machine learning-based reports that identify inconsistent access patterns can help you protect your business. You can use Azure AD access and usage reports to gain visibility into the integrity and security of your organization's directory. With this information, a directory administrator can better determine where possible security risks might lie so that they can adequately plan to mitigate those risks.
101
97
102
98
In the Azure portal, reports fall into the following categories:
103
99
@@ -107,11 +103,7 @@ In the Azure portal, reports fall into the following categories:
107
103
***User-specific reports**: Display device sign-in activity data for a specific user.
108
104
***Activity logs**: Contain a record of all audited events within the last 24 hours, last 7 days, or last 30 days, and group activity changes and password reset and registration activity.
109
105
110
-
Learn more:
111
-
112
-
*[View your access and usage reports](../../active-directory/reports-monitoring/overview-reports.md)
113
-
*[Get started with Azure Active Directory reporting](../../active-directory/reports-monitoring/overview-reports.md)
114
-
*[Azure Active Directory reporting guide](../../active-directory/reports-monitoring/overview-reports.md)
106
+
Learn more: [Azure Active Directory reporting guide](../../active-directory/reports-monitoring/overview-reports.md)
115
107
116
108
## Consumer identity and access management
117
109
@@ -123,9 +115,8 @@ When you use Azure AD B2C, your consumers can sign up for your applications by u
123
115
124
116
Learn more:
125
117
126
-
*[What is Azure Active Directory B2C?](https://azure.microsoft.com/services/active-directory-b2c/)
127
-
*[Azure Active Directory B2C preview: Sign up and sign in consumers in your applications](../../active-directory-b2c/overview.md)
128
-
*[Azure Active Directory B2C Preview: Types of applications](../../active-directory-b2c/application-types.md)
118
+
*[What is Azure Active Directory B2C?](../../active-directory-b2c/overview.md)
119
+
*[Azure Active Directory B2C: Types of applications](../../active-directory-b2c/application-types.md)
129
120
130
121
## Device registration
131
122
@@ -136,8 +127,7 @@ When combined with a mobile device management solution such as Intune, the devic
136
127
Learn more:
137
128
138
129
*[Get started with Azure AD device registration](../../active-directory/devices/device-management-azure-portal.md)
139
-
*[Automatic device registration with Azure AD for Windows domain-joined devices](../../active-directory/devices/hybrid-azuread-join-plan.md)
140
-
*[Set up automatic registration of Windows domain-joined devices with Azure AD](../../active-directory/devices/hybrid-azuread-join-plan.md)
130
+
*[Automatic device registration with Azure AD for Windows domain-joined devices](../../active-directory/devices/hybrid-azuread-join-plan.md#review-supported-devices)
141
131
142
132
## Privileged identity management
143
133
@@ -159,16 +149,13 @@ Learn more:
159
149
160
150
## Identity protection
161
151
162
-
Azure AD Identity Protection is a security service that provides a consolidated view into risk detections and potential vulnerabilities that affect your organization’s identities. Identity Protection takes advantage of existing Azure AD anomaly-detection capabilities, which are available through Azure AD Anomalous Activity reports. Identity Protection also introduces new risk detection types that can detect anomalies in real time.
152
+
Azure AD Identity Protection is a security service that provides a consolidated view into risk detections and potential vulnerabilities that affect your organization's identities. Identity Protection takes advantage of existing Azure AD anomaly-detection capabilities, which are available through Azure AD Anomalous Activity reports. Identity Protection also introduces new risk detection types that can detect anomalies in real time.
163
153
164
-
Learn more:
165
-
166
-
*[Azure AD Identity Protection](../../active-directory/identity-protection/overview-identity-protection.md)
167
-
* Channel 9: Azure AD and Identity Show: Identity Protection Preview
154
+
Learn more: [Azure AD Identity Protection](../../active-directory/identity-protection/overview-identity-protection.md)
168
155
169
156
## Hybrid identity management/Azure AD connect
170
157
171
-
Microsoft’s identity solutions span on-premises and cloud-based capabilities, creating a single user identity for authentication and authorization to all resources, regardless of location. We call this hybrid identity. Azure AD Connect is the Microsoft tool designed to meet and accomplish your hybrid identity goals. This allows you to provide a common identity for your users for Microsoft 365, Azure, and SaaS applications integrated with Azure AD. It provides the following features:
158
+
Microsoft's identity solutions span on-premises and cloud-based capabilities, creating a single user identity for authentication and authorization to all resources, regardless of location. We call this hybrid identity. Azure AD Connect is the Microsoft tool designed to meet and accomplish your hybrid identity goals. This allows you to provide a common identity for your users for Microsoft 365, Azure, and SaaS applications integrated with Azure AD. It provides the following features:
172
159
173
160
* Synchronization
174
161
* AD FS and federation integration
@@ -179,13 +166,9 @@ Learn more:
179
166
180
167
*[Hybrid identity white paper](https://download.microsoft.com/download/D/B/A/DBA9E313-B833-48EE-998A-240AA799A8AB/Hybrid_Identity_White_Paper.pdf)
181
168
*[Azure Active Directory](../../active-directory/index.yml)
182
-
*[Azure AD team blog](https://blogs.technet.microsoft.com/ad/)
183
169
184
170
## Azure AD access reviews
185
171
186
172
Azure Active Directory (Azure AD) access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and privileged role assignments.
187
173
188
-
Learn more:
189
-
190
-
*[Azure AD access reviews](../../active-directory/governance/access-reviews-overview.md)
191
-
*[Manage user access with Azure AD access reviews](../../active-directory/governance/access-reviews-overview.md)
0 commit comments