<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:series="https://publishpress.com/"
	>

<channel>
	<title>identity governance Archives - Anuj Varma, Hands-On Technology Architect, Clean Air Activist</title>
	<atom:link href="https://www.anujvarma.com/tag/identity-governance/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.anujvarma.com/tag/identity-governance/</link>
	<description>Production Grade Technical Solutions &#124; Data Encryption and Public Cloud Expert</description>
	<lastBuildDate>Fri, 12 Jun 2020 16:56:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.anujvarma.com/wp-content/uploads/anujtech.png</url>
	<title>identity governance Archives - Anuj Varma, Hands-On Technology Architect, Clean Air Activist</title>
	<link>https://www.anujvarma.com/tag/identity-governance/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Azure Security Architect &#8211; Understanding Identity</title>
		<link>https://www.anujvarma.com/identity-in-azure-2/</link>
					<comments>https://www.anujvarma.com/identity-in-azure-2/#comments</comments>
		
		<dc:creator><![CDATA[Anuj Varma]]></dc:creator>
		<pubDate>Fri, 12 Jun 2020 16:56:35 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[rbac azure]]></category>
		<category><![CDATA[Azure IAM]]></category>
		<category><![CDATA[Access management Azure]]></category>
		<category><![CDATA[users and groups azure]]></category>
		<category><![CDATA[aad devices]]></category>
		<category><![CDATA[aad tenant]]></category>
		<category><![CDATA[access reviews azure]]></category>
		<category><![CDATA[azure applications]]></category>
		<category><![CDATA[azure identity and access management]]></category>
		<category><![CDATA[identity governance]]></category>
		<guid isPermaLink="false">https://googlearchitect.com/?p=106</guid>

					<description><![CDATA[<p>As an Azure Security Architect, getting a firm grasp of Identity Management in Azure is key. Not only is IAM in Azure very different from that on AWS and GCP, [&#8230;]</p>
<p>The post <a href="https://www.anujvarma.com/identity-in-azure-2/">Azure Security Architect &#8211; Understanding Identity</a> appeared first on <a href="https://www.anujvarma.com">Anuj Varma, Hands-On Technology Architect, Clean Air Activist</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As an Azure Security Architect, getting a firm grasp of Identity Management in Azure is key. Not only is IAM in Azure very different from that on AWS and GCP, it&#8217;s console interface can be a bit confusing for some. There are several  similar sounding terms and services &#8211; and often, even experienced Azure architects are found clicking in the wrong section of the console. This post will elucidate some of the first tasks you would need to undertake on a new Azure Architect assignment &#8211; a task that revolves around evaluation the current set of Azure users, their roles, their access privileges and other aspects of Azure Identity.</p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-127" src="https://googlearchitect.com/wp-content/uploads/2020/06/compliance_score_azure-300x133.png" alt="" width="945" height="419" /></p>
<p>Identity Compliance Score in Azure</p>
<h3>Overview and Azure Active Directory</h3>
<p>When you sign up for an azure subscription, you get an Azure Active Directory tenant (whether you want one or not). AAD is central to Azure&#8217;s management of both users as well as access to different parts of the Azure portal. This post walks you through some of the more common tasks you would start addressing as an Azure IAM Architect and Azure Security Architect.</p>
<h3>What is an AAD Tenant? What does multi tenant mean?</h3>
<ul>
<li>An AAD tenant is simply your own instance of the Azure Active Directory. It comes with a (flat) directory. Multi tenant means you can own multiple directories in your subscription.</li>
<li>Since you can have multiple directories, each directory has it&#8217;s own Administration (Admin PER directory)</li>
<li>Also, with multiple directories, when you synchronize on premises users, the synchronization of users also is PER directory. i.e. If you want the same set of users in 2 different directories, you will need to set up two separate syncs.</li>
</ul>
<h3>How do I add a Custom DNS Zone?</h3>
<p>Your default AAD tenant is the onmicrosoft.com directory. This is, of course, confusing for your regular AD users. The first thing you would like to do is use your corporate AD emails as valid logins for Azure. To do this, you will need to add a custom domain name (e.g. yourcustomdomain.com)</p>
<ul>
<li>Custom DNS is part of AAD</li>
<li>It needs a FQDN</li>
</ul>
<p>Step 1 &#8211; Register your FQDN with AAD (Custom DNS Requires a FQDN)</p>
<p>Step 2 &#8211; Verify your domain using a TXT record that AAD will create and provide you with. You will need to simply enter that TXT record on your on premises DNS host. This will allow AAD to validate that TXT record.</p>
<p>Step 3 &#8211; Now that you have multiple domains (onmicrosoft.com and yourcustomdomain.com), PICK a primary domain.</p>
<p>As an azure IAM architect, one of your first tasks would be to identify the custom DNS needs of your client and create a custom DNS entry in Azure AD.</p>
<h3>How do I manage Access for Users? &#8211; Enter Roles &#8211; and RBAC on Azure</h3>
<ul>
<li>Users only (not for groups)</li>
<li>Find all Company Admins (this is a role &#8211; and find all users with this role)</li>
<li>Role Templates</li>
</ul>
<h3>Users and Groups in AAD</h3>
<ul>
<li>Security Groups vs. O365 Groups &#8211;&gt; Usually &#8216;Security Groups&#8217;.</li>
<li>Owners vs. Members &#8211;&gt; Not necessary that a GROUP has an OWNER. Owner is not a member &#8211; Owner has IAM privileges on the GROUP.</li>
<li>Assigned Membership Groups vs. Dynamic Membership Groups &#8211;&gt; Manually Assign Members or Dynamically based on a search pattern (e.g. &#8216;department&#8217;=&#8217;IT&#8217;)</li>
<li>Dynamic Queries &#8211;&gt;</li>
<li>Synced Users, Members vs. Guests &#8211;&gt; Synced users have their SOURCE set to the Local AD</li>
</ul>
<h3>Create a new user</h3>
<p>Assign a Usage Location &#8211;&gt; Assign a License (e.g. AAD Premium License) &#8211;&gt; Auto gets a User Principal (based on custom domain or onmicrosoft.com)</p>
<h3>Self Service Password Reset</h3>
<ul>
<li>Apply the policy to a restricted subset of users (e.g. create  a GROUP called ResetPilot)</li>
<li>Pick one or two REQUIRED</li>
<li>Email, SMS, Security Questions</li>
</ul>
<h3>External (Guest) Users</h3>
<ul>
<li>AAD not required</li>
<li>Guest Accounts</li>
<li>Collaborate on docs</li>
<li>Access internal apps</li>
<li>Condtional access policies</li>
</ul>
<h3>Adding Applications</h3>
<h3>Adding Devices (Use intune for master device management, not AAD)</h3>
<p>Devices added can benefit from &#8216;pushed&#8217; org policies in AAD organization.</p>
<h3>Access Panel &#8211; myapps.microsoft.com</h3>
<h3>Access Management &#8211; Auditing Access Changes</h3>
<h3>Access Management &#8211; Identity Protection</h3>
<h3><span style="font-size: 16px;">Sign In Activity (Monitoring on AAD Menu) vs. User Activity (Audit Logs for the User)</span></h3>
<h3>Access Reviews &#8211;&gt; Under  Identity Governance</h3>
<ol>
<li>Review who all are still Admins for your org</li>
<li>Review who all still have guest access (either to an application or across the board)</li>
</ol>
<h3>Log Analytics for AAD (Monitoring Menu)</h3>
<p><b>Log Analytics</b> gives you the power to query huge amounts of your Azure <b>AD</b> data to find <span class="ILfuVd"><span class="e24Kjd">events, analyze trends, and create rich visualizations within minutes.</span></span></p>
<h3>Privileged Identity</h3>
<h3>Conditional Access Policy  (can create &#8216;report only&#8217; before policy takes effect)</h3>
<ul>
<li>Require MFA on all unmanaged devices (not managed  by intune) &#8211;&gt; Cloud Apps &#8211;&gt; Microsoft Azure Management</li>
<li>Block based on location</li>
<li>Block / Grant based on Device Compliance</li>
<li>Grant based on Application</li>
</ul>
<h3>Manage Devices in Powershell</h3>
<h3>Log Analytics</h3>
<h3>TWO Built In Apps</h3>
<figure id="attachment_7215" aria-describedby="caption-attachment-7215" style="width: 300px" class="wp-caption alignnone"><img decoding="async" class="size-medium wp-image-7215" src="https://www.anujvarma.com/wp-content/uploads/builtin_apps_azure-300x101.png" alt="built in apps azure" width="300" height="101" srcset="https://www.anujvarma.com/wp-content/uploads/builtin_apps_azure-300x101.png 300w, https://www.anujvarma.com/wp-content/uploads/builtin_apps_azure-183x62.png 183w, https://www.anujvarma.com/wp-content/uploads/builtin_apps_azure.png 457w" sizes="(max-width: 300px) 100vw, 300px" /><figcaption id="caption-attachment-7215" class="wp-caption-text">built in apps azure</figcaption></figure>
<h3>Azure Security and Compliance &#8211; Two Built in Apps</h3>
<h3><img decoding="async" class="alignnone wp-image-7216" src="https://www.anujvarma.com/wp-content/uploads/azure_security_score-300x171.png" alt="azure security score" width="363" height="207" srcset="https://www.anujvarma.com/wp-content/uploads/azure_security_score-300x171.png 300w, https://www.anujvarma.com/wp-content/uploads/azure_security_score-183x104.png 183w, https://www.anujvarma.com/wp-content/uploads/azure_security_score-768x437.png 768w, https://www.anujvarma.com/wp-content/uploads/azure_security_score-1024x582.png 1024w, https://www.anujvarma.com/wp-content/uploads/azure_security_score.png 1400w" sizes="(max-width: 363px) 100vw, 363px" /></h3>
<figure id="attachment_7217" aria-describedby="caption-attachment-7217" style="width: 300px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-medium wp-image-7217" src="https://www.anujvarma.com/wp-content/uploads/compliance_score_azure-300x133.png" alt="azure compliance score" width="300" height="133" srcset="https://www.anujvarma.com/wp-content/uploads/compliance_score_azure-300x133.png 300w, https://www.anujvarma.com/wp-content/uploads/compliance_score_azure-183x81.png 183w, https://www.anujvarma.com/wp-content/uploads/compliance_score_azure-768x340.png 768w, https://www.anujvarma.com/wp-content/uploads/compliance_score_azure-1024x453.png 1024w, https://www.anujvarma.com/wp-content/uploads/compliance_score_azure.png 1371w" sizes="auto, (max-width: 300px) 100vw, 300px" /><figcaption id="caption-attachment-7217" class="wp-caption-text">azure compliance score</figcaption></figure>
<h3>Installing Azure Powershell (from windows ps)</h3>
<pre>Invoke-WebRequest -Uri https://aka.ms/installazurecliwindows -OutFile .\AzureCLI.msi; Start-Process msiexec.exe -Wait -ArgumentList '/I AzureCLI.msi'; rm .\AzureCLI.msiInvoke-WebRequest -Uri https://aka.ms/installazurecliwindows -OutFile .\AzureCLI.msi; Start-Process msiexec.exe -Wait -ArgumentList '/I AzureCLI.msi /quiet'; rm .\AzureCLI.msi</pre>
<p>Run the az login cmd from regular dos cmd prompt or from powershell</p>
<h3>Storage Account Security in Azure</h3>
<ul>
<li>Storage Key Rollovers &#8211; encryption key rollovers</li>
<li>Shared Access Signatures &#8211; SAS &#8211; short term access to storage resources</li>
<li>Shared (Storage) Access Policies &#8211; Reuse of SAS</li>
</ul>
<h3>Summary</h3>
<p>A firm grasp of Azure Identity and Access Management is a key component of becoming an Azure security architect. There&#8217;s a lot more to Azure Security than RBAC (for users and groups. RBAC applies to apps as well as users  and groups.</p>
<p>In addition to RBAC, a security architect needs to think about data at rest encryption. This entails storage keys and azure key vault. Shared Access Signatures provide short term access to azure storage resources. Also see <a href="https://googlearchitect.com/2020/06/12/security-audits-on-aws-accounts/">Auditing AWS Account Security</a>.</p>
<p><a href="https://calendly.com/anujvarma/private-1-on-1-conversation">Set up a 1 on 1 appointment with Anuj to assist with your cloud journey.</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.anujvarma.com/identity-in-azure-2/">Azure Security Architect &#8211; Understanding Identity</a> appeared first on <a href="https://www.anujvarma.com">Anuj Varma, Hands-On Technology Architect, Clean Air Activist</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.anujvarma.com/identity-in-azure-2/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Content Delivery Network via N/A
Minified using Disk

Served from: www.anujvarma.com @ 2026-04-23 05:05:11 by W3 Total Cache
-->