Back to Blog
AzureEntra IDIdentitySecurityZero Trust

Mastering Microsoft Entra ID: From Identity Management to Zero Trust Security

10 min read

What is Microsoft Entra ID?

Microsoft Entra ID (formerly Azure AD) is a cloud-based Identity and Access Management (IAM) service. It's the central "brain" of your Azure environment — its job is to verify who a user is (Authentication) and decide what they're allowed to do (Authorization). In a Zero Trust model, this isn't just a login system; it's the primary security control plane for your entire organization.


The Organizational Structure: Tenant vs. Directory

Before looking at users, you need to understand the container they live in.

  • The Tenant: Your organization's specific instance of Entra ID. It's your security boundary — everything inside belongs to your company and is fully isolated from everyone else.
  • The Directory: The actual database inside the tenant that stores all identities (users, groups, devices, etc.).
  • The Relationship: For all practical purposes, one Tenant = one Directory. If you have a Tenant ID, you have a Directory ID.

Administrative Units (AUs): The Logical Folders

Entra ID has a flat structure — there are no folders or Organizational Units (OUs) like in on-premises Active Directory. For large organizations, this can get messy fast.

  • What they are: A logical container used to group users and devices.
  • Use Case: If you want a "Regional Admin" to only reset passwords for employees in the Paris office, you put those employees into a "Paris AU" and assign the admin permissions scoped to that AU only — they can't touch anyone outside it.

The Security Principal Umbrella

A Security Principal is any entity that can be authenticated and authorized. Think of it as a "badge holder" — anything that can be verified and given permissions falls under this category.

There are three types.

A. User Objects (Human Identities)

  • Who it is: Employees and guest users.
  • How they log in: UPN (e.g., admin@company.com), a password, and MFA.

B. Service Principals (The "Account" for Apps)

  • Who it is: An identity for an application or a script.
  • How they log in: A Client Secret (essentially a password for code) or a Certificate.
  • Use Case: Scripts running on your laptop or workloads in another cloud like AWS — anything outside of Azure that needs to call Azure APIs.

C. Managed Identities (The "Secret-less" Identity)

  • Who it is: A special Service Principal that Azure automatically creates and manages for a specific Azure resource (like a VM or App Service).
  • How they work: No passwords, no secrets, no rotation — Azure handles the credential lifecycle entirely under the hood. This is the option you should reach for whenever possible.
  • Two types:
    • System-assigned — tied directly to one resource. When the resource is deleted, the identity is deleted too.
    • User-assigned — a standalone identity that can be assigned to multiple resources.
  • Use Case: An Azure VM that needs to read secrets from Key Vault. Instead of storing a Client Secret in your code, you assign the VM a Managed Identity and grant that identity access to Key Vault. The VM authenticates automatically — no credentials in your codebase.
Security Principal
├── User Object         → human, logs in with UPN + password + MFA
├── Service Principal   → app/script, logs in with secret or certificate
└── Managed Identity    → Azure resource, no secret needed (Azure manages it)

Quick Recap

ConceptWhat it is
TenantYour organization's isolated Entra ID instance
DirectoryThe identity database inside the tenant
Administrative UnitLogical folder to scope admin permissions
User ObjectIdentity for a human
Service PrincipalIdentity for an app or external script
Managed IdentitySecret-less identity for Azure resources

2. Management: Roles and Governance

Azure Governance: The "Big Picture"

When we talk about Roles and Governance in Azure, we're talking about how an organization maintains control, security, and cost-efficiency at scale. It's not just about who can log in; it's about what they're allowed to build and where. Without this layer, you end up with a sprawling subscription where nobody really knows who owns what.

There are four primary "pillars" that work together to create a governed environment.


The 4 Pillars of Governance

1. Management Groups (The Hierarchy)

If you have 50 subscriptions, you don't want to manage them one by one. Management Groups let you group subscriptions together.

  • Inheritance: Any policy or role you apply at the top level (Management Group) automatically "flows down" to all subscriptions and resources underneath.
  • Organization: You can organize by Department (HR, IT, Finance) or by Environment (Prod, Dev, Test).

2. Azure RBAC (The "Who")

Role-Based Access Control is all about the identity.

  • Focus: Who has permission to do what? (e.g., "Aziz can create Virtual Machines, but he cannot delete them").
  • Scopes: You can assign RBAC at the Management Group, Subscription, Resource Group, or individual Resource level.

3. Azure Policy (The "What")

While RBAC controls the user, Azure Policy controls the resource state.

  • Focus: Is the resource compliant with our rules?
  • Example: "No one is allowed to create a Virtual Machine in the 'East US' region" or "All Storage Accounts must have encryption enabled."
  • Enforcement: Policy can "Audit" (warn you) or "Deny" (block the creation of the resource entirely).

4. Azure Blueprints (The "Package")

Think of a Blueprint as a "standardized environment in a box."

  • Contents: It bundles together Role Assignments, Policy Assignments, and ARM Templates.
  • Purpose: When a new team needs a "Production Environment," you just stamp the blueprint, and it automatically sets up the Resource Group, the correct permissions, and the required policies in seconds. No more "did you remember to set up the access policies?" conversations.

RBAC vs. Policy: The Critical Distinction

FeatureAzure RBACAzure Policy
FocusUser ActionsResource Properties
Question"Can Aziz create this?""Is this thing allowed to exist like this?"
ResultAllow or Deny based on who you are.Allow or Deny based on how it's configured.

3. Security: The Entra ID "Safety Net"

In 2026, we no longer talk about "protecting the network." We talk about identity as the perimeter. The "safety net" is the automated layer that enforces Zero Trust by assuming every login attempt — even from an admin — is a potential breach. Treating every authentication as untrusted until proven otherwise is the shift that defines modern security architecture.


3.1 Licensing: The Power Gap (P1 vs. P2)

Your security capabilities are dictated by your license. While P1 gives you the tools, P2 gives you the intelligence to use them automatically — which is a meaningful difference when an attack is unfolding in real time.

FeatureEntra ID P1 (Standard)Entra ID P2 (Elite/Governance)
MFA SupportFIDO2, Authenticator, SMS, Voice.Everything in P1 + Phishing-Resistant enforcement.
Conditional AccessManual policies (Location, IP, Device).Risk-Based (AI calculates User & Sign-in risk).
Identity ProtectionBasic sign-in logs.Automated Remediation (Forces password reset on leaks).
Privileged AccessPermanent role assignments.PIM (Just-In-Time activation & Approval flows).
Identity GovernanceBasic group management.Access Reviews & Lifecycle Workflows.

3.2 The Zero Trust Pillars

To reach a solid Entra security baseline, you need all three of these working together.

I. Conditional Access (The Brain)

Conditional Access is the "if-then" engine. In 2026, it supports Workload Identities (for bots and scripts) and Continuous Access Evaluation (CAE), which can revoke a session the second a risk is detected — not just at login time.

  • Sign-in Risk: AI detects "Impossible Travel" (London to Tokyo in 1 hour).
  • User Risk: AI detects if the user's credentials were found on a dark-web dump.
  • Device State: Policy checks for jailbreak/root detection before allowing access.

II. Privileged Identity Management (PIM)

PIM solves the "standing access" problem. No admin should have elevated privileges while they're just reading emails.

  • Eligible Assignments: You're "allowed" to be an admin, but you aren't one yet.
  • Just-In-Time (JIT): You activate the role for a specific window (e.g., 2 hours).
  • Activation Requirements: Requires a ticket number, a business justification, and a phishing-resistant MFA prompt.

III. Identity Protection (The Defense)

This is the "search and destroy" layer.

  • Automated Response: If Entra ID Protection detects a "High" risk, it can automatically block access or force a password change without human intervention.
  • SyncJacking Protection: Prevents attackers from taking over cloud accounts by manipulating "Hard Match" logic during Entra Connect synchronization.

3.3 Hardened Baseline: Best Practices for 2026

  • Kill Legacy Authentication: Use Conditional Access to block protocols like POP, IMAP, and SMTP. These protocols cannot enforce MFA — they're a standing invitation for credential stuffing attacks.
  • The "Rule of 5": Limit Global Administrators to fewer than 5 people.
  • Emergency "Break-Glass" Accounts: Create two cloud-only accounts excluded from all MFA and Conditional Access policies for emergency use only. Store the credentials in a physical safe.
  • Phishing-Resistant MFA: Move high-value users to FIDO2 Security Keys or Certificate-Based Authentication (CBA).
  • Access Reviews: Set a recurring policy that automatically revokes access if a manager doesn't re-approve it.

4. Application Integration

Modernizing how your apps talk to Entra ID is critical for eliminating siloed identities and reducing the credential sprawl that comes from every app managing its own login system.


4.1 Single Sign-On (SSO) Protocols

  • OIDC / OAuth 2.0: The gold standard for modern web and mobile apps.
  • SAML 2.0: Used for legacy SaaS apps (Salesforce, Workday).
  • App Proxy: Lets users access on-premises legacy web apps using their Entra ID credentials without a VPN.

4.2 Managed Identities for Apps

Stop storing Client Secrets (passwords) in your code.

  • System-Assigned: Tied to one resource. If the resource is deleted, the identity dies with it.
  • User-Assigned: A standalone identity that can be shared across multiple resources.

5. External Identities

How you handle people outside your organization is a security boundary that's easy to get wrong. Guest accounts with too much access are a common finding in security reviews.

Account Types: Member vs. Guest

FeatureMemberGuest
Who they areInternal employee, created in your tenantExternal user invited via B2B
User Type valuememberguest
Default permissionsFull directory read accessRestricted — cannot enumerate users, groups, or other guests
How they're createdAdmin creates them directly in Entra IDInvitation sent via B2B Collaboration
AuthenticationYour tenant's credentialsTheir own org or personal credentials
Typical use caseFull-time employee or internal service accountVendor, contractor, or partner needing limited access

External Identity Models

FeatureB2B CollaborationB2B Direct ConnectExternal ID (CIAM)
Who it's forVendors, partners, contractorsPartner orgs using TeamsPublic-facing customers
Guest account created?Yes — in your tenantNo — user stays in their home tenantNo — self-service sign-up
How they authenticateTheir own org credentials (or email OTP)Their own org's Entra IDSocial accounts (Google, Facebook) or email
Access scopeYour apps and resourcesShared Channels in Teams onlyYour customer-facing apps
Typical use caseGive a contractor access to SharePointCollaborate with a partner in TeamsLet customers log in to your product
AJ

Aziz Jarrar

Full Stack Engineer

Share this article