You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/explore-identity-azure-active-directory/includes/1-introduction.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
This module covers a wide view of the definitions and available services for identity provided in the Microsoft Cloud from Microsoft Entra ID to Microsoft 365. You start with the basics of authentication, authorization, and access tokens.
2
2
3
-
From this firm foundation of what an identity is, we explore how identity is used as part of your security foundation. We learn about governance and lifecycle management of your identities and identity solutions. The final section opens up the concept of zero trust, and how it should be applied to your identity solutions. What is the Microsoft Entra ID architecture and the connection with identity in Microsoft 365?
3
+
From this firm foundation of what an identity is, we explore how identity is used as part of your security foundation. We learn about governance and lifecycle management of your identities and identity solutions. The final section opens up the concept of Zero Trust, and how it should be applied to your identity solutions. What is the Microsoft Entra ID architecture and the connection with identity in Microsoft 365?
4
4
5
5
Next you explore how PowerShell and Microsoft Graph are available to build and manage identity solutions. The goal of this module is to prepare your technical knowledge of identity and access management in the Microsoft Cloud.
6
6
@@ -16,4 +16,4 @@ By the end of this module can:
16
16
### Prerequisites
17
17
18
18
- Basic knowledge of cloud computing
19
-
- Azure portal or Microsoft Entra admin center experience are a plus
19
+
- Azure portal or Microsoft Entra admin center experience is a plus
It's important to understand the identity landscape before reviewing other identity concepts. How does Microsoft think about identity when designing products and solutions? The essential lifecycle of identity.
1
+
It's important to understand the identity landscape before reviewing other identity concepts. How does Microsoft think about identity when designing products and solutions? The essential lifecycle of identity.
2
2
3
3
| 1) Zero Trust |
4
4
|:--------------------------:|
5
-
| :::image type="icon" source="../media/icon-verify-explicitly.png" alt-text="Diagram showing a mock-up checklist to show you're verifying each record.":::Verify Explicitly :::image type="content" source="../media/icon-least-privilege.png" alt-text="Decoration. Icon of a simple circuit showing that you should only grant the least level of access needed.":::Use Least Privilege :::image type="content" source="../media/icon-assume-breach.png" alt-text="Decoration. Icon of two arrows with points together showing a point where a breach might have occurred.":::Assume Breach |
5
+
| :::image type="icon" source="../media/icon-verify-explicitly.png" alt-text="Diagram showing a mock-up checklist to show you're verifying each record.":::Verify Explicitly :::image type="content" source="../media/icon-least-privilege.png" alt-text="Decoration. Icon of a simple circuit showing that you should only grant the least level of access needed.":::Use Least Privilege :::image type="content" source="../media/icon-assume-breach.png" alt-text="Decoration. Icon of two arrows with points together showing a point where a breach potentially occurred.":::Assume Breach |
@@ -18,23 +18,23 @@ It's important to understand the identity landscape before reviewing other ident
18
18
| Dollars - Licenses ||
19
19
20
20
21
-
1)**First** you have the guidance of always thinking and designing with zero trust in mind. Don't just give access to data and applications because the user has had access previously. You need to always confirm.
21
+
1)**First** you have the guidance of always thinking and designing with Zero Trust in mind. Don't just give access to data and applications because the user had access previously. You need to always confirm.
22
22
23
-
2)**Second** you have systems to provide verified accounts for users and applications. Identity services come from Microsoft Entra ID, from business-to-business federation, from business-to-customer, and from decentralized identity providers.
23
+
2)**Second** you have systems to provide verified accounts for users and applications. Identity services come from Microsoft Entra ID, from business-to-business federation, from business-to-customer, and from decentralized identity providers.
24
24
25
-
3)**Third** you have specific actions identity provides and to keep the systems running. Users and applications can authenticate and authorize to gain access to systems. And administrators need to monitor and maintain the identity systems with proper governance.
25
+
3)**Third** you have specific actions identity provides and to keep the systems running. Users and applications can authenticate and authorize to gain access to systems. And administrators need to monitor and maintain the identity systems with proper governance.
26
26
27
-
4)**Fourth** you get many actions that can be performed once your credentials are verified. Use applications and data, while taking advantage of other identity based services.
27
+
4)**Fourth** you get many actions that can be performed once your credentials are verified. Use applications and data, while taking advantage of other identity based services.
28
28
29
29
5)**Fifth** and finally, you need to always keep your systems up to date.
30
30
31
-
### From classic identity to zero trust identity
31
+
### From classic identity to Zero Trust identity
32
32
33
-
Historically, identity kept all your assets behind the firewall. Submit a username and password to get through the gate, and you had full access to everything. In the modern world, with the large number of cyber-attacks securing just the network doesn't work. One lost or stolen credential and bad actors have access to everything. With zero trust, you protect your assets anywhere with policy.
33
+
Historically, identity kept all your assets behind the firewall. Submit a username and password to get through the gate, and you had full access to everything. In the modern world, with the large number of cyber-attacks securing just the network doesn't work. One lost or stolen credential and bad actors have access to everything. With Zero Trust, you protect your assets anywhere with policy.
34
34
35
-
| Classic identity | Zero trust identity |
35
+
| Classic identity | Zero Trust identity |
36
36
| :--------------- | :------------- |
37
37
| :::image type="content" source="../media/classic-identity.png" alt-text="Diagram of a set of assets like a database and an application protected behind a locked gate."::: | :::image type="content" source="../media/zero-trust-identity.png" alt-text="Diagram of a central policy in the form of a chart, giving access to different locally protected resources."::: |
38
38
| Restrict everything to a secure network | Protect assets anywhere with central policy |
39
39
40
-
Each of these subjects will be covered in more detail over the rest of this module.
40
+
Each of these subjects is covered in more detail over the rest of this module.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/explore-identity-azure-active-directory/includes/3-explore-zero-trust-identity.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ A Zero Trust approach should extend throughout the entire digital estate and ser
19
19
20
20
:::image type="content" source="../media/zero-trust-pillars.png" alt-text="Diagram of the six pillars of Zero Trust. Identity - endpoints - data - apps - infrastructure - and network.":::
21
21
22
-
For this content, we're going to focus specifically on the **security identity with zero trust** pillar. Identities, whether they represent people, services, or IoT devices define the Zero Trust control plane. When an identity attempts to access a resource, verify that identity with strong authentication, and ensure access is compliant and typical for that identity. Follow least privilege access principles.
22
+
For this content, we're going to focus specifically on the **security identity with Zero Trust** pillar. Identities, whether they represent people, services, or IoT devices define the Zero Trust control plane. When an identity attempts to access a resource, verify that identity with strong authentication, and ensure access is compliant and typical for that identity. Follow least privilege access principles.
:::image type="content" source="../media/control-plane.png" alt-text="Diagram of identity and access management working as a controller for access to all resource.":::
2
2
3
-
What is a control plane? A **control plane** is a term that has been used for years within networks. It's the part of a network that routes network traffic around the network architecture. So, a control plane is a tool or service that directs access to resources based on specific criteria. When it comes to solutions in today's world, the user identity is the right place to check for access. This sets up identity as the control plane.
3
+
What is a control plane? A **control plane** is a term that used for years within networks. It's the part of a network that routes network traffic around the network architecture. So, a control plane is a tool or service that directs access to resources based on specific criteria. When it comes to solutions in today's world, the user identity is the right place to check for access. Identity is a clear choice for the control plane.
4
4
5
-
With the many networks, devices, and applications needed in daily business, the only common denominator is the identity. Every user, external user, app, and device has an identity. This is why we say, Identity is the control plane. It’s critical to establish who the user is as the core of trust for other transactions. If we aren’t sure who the user is, no other system access control or security matters. Once we're sure of the user, we can explicitly verify every element of access whether our resources are on-premises, in cloud-hosted servers, or managed SaaS apps like Office 365.
5
+
With the many networks, devices, and applications needed in daily business, the only common denominator is the identity. Every user, external user, app, and device have an identity. So, we say identity is the control plane. It’s critical to establish who the user is as the core of trust for other transactions. If we aren’t sure who the user is, no other system access control or security matters. Once we're sure of the user, we can explicitly verify every element of access whether our resources are on-premises, in cloud-hosted servers, or managed SaaS apps like Office 365.
description: "This module will cover a wide view of the definition and available services for identity provided in the Microsoft Cloud from Microsoft Entra ID and to Microsoft 365. You start with the basics of authentication, authorization, and access tokens. This builds a firm foundation of what an identity is, why it is important. Then we move into governance and lifecycle management of your identities and identity solutions. The final topic opens up the term zero trust to see how it should be applied to your identity solutions."
5
+
description: "This module covers a wide view of the definition and available services for identity provided in the Microsoft Entra ID. Start with the basics of authentication, authorization, and access tokens. After building a firm foundation of what an identity is, why it's important. Then we move into governance and lifecycle management of your identities and identity solutions. The final topic opens up the term Zero Trust to see how it should be applied to your identity solutions."
6
6
ms.date: 03/27/2025
7
7
author: wwlpublish
8
8
ms.author: roberts
9
9
ms.topic: module
10
10
ms.service: identity-platform
11
+
ai-usage: human-only
11
12
title: Explore identity in Microsoft Entra ID
12
-
summary: This module covers definitions and available services for identity provided in Microsoft Entra ID and to Microsoft 365. You start with authentication, authorization, and access tokens then build into full identity solutions.
13
+
summary: This module covers definitions and available services for identity, provided in Microsoft Entra ID. Explore authentication, authorization, and access tokens, then build into full identity solutions.
13
14
abstract: |
14
-
By the end of this module, you'll be able to:
15
+
By the end of this module, you're able to:
15
16
16
-
- Define common identity terms and explain how they're used in the Microsoft Cloud
17
+
- Define common identity terms and explain how they're used in the Microsoft Cloud.
17
18
18
-
- Explore the common management tools and needs of an identity solution
19
+
- Explore the common management tools and needs of an identity solution.
19
20
20
-
- Review the goal of Zero Trust and how it's applied in the Microsoft Cloud
21
+
- Review the goal of Zero Trust and how it applies in the Microsoft Cloud.
21
22
22
-
- Explore the available identity services in the Microsoft Cloud
23
+
- Explore the available identity services in the Microsoft Cloud.
0 commit comments