Active Directory in Azure
Microsoft Windows Active Directory is a cloud service that enables administrators to manage resources, to administer end-user identities and access privileges. It is a part of Microsoft Azure public cloud computing platform. Now Renamed as Entra ID
Active Directory service
- Provide directory feature,
- Provide access management feature.
- Helps you with identity protection.
Tenant Based
Azure Active Directory is a Microsoft multi-tenant cloud based directory and Identity Management service.
Azure AD facilitates employee registration across many services, enabling access them anywhere over the cloud with a single set of login credentials.
3 Main Users of MS Active Directory
- IT Admins
- Use Azure AD to manage role permissions and control access to specific applications.
- App Developers
- Use Azure AD to add single sign on to their apps.
- Provides app developer with application programming interface for API calls.
- Cloud Services Subscribers
- Normal Users who subscribe to the Azure cloud service.
- Who access to the cloud service like office 65, CRM of Azure, or default tenant of Azure AD.
Active Directory Flow
- Let we want to access some Azure Cloud Service
- Now There is Gateway at Cloud Service called Azure Directory
- In Cloud we have multiple subscriptions
- Each Subscription has multiple resources
- To access these resources from internet okay, we have to authenticate External users using some credentials
- Using that user ID and password will authenticate ourself on Azure AD.
- Authentication
- This user ID and password will be created on Azure Active Directory, and you will authenticate yourself on Azure AD first.
- Authorization on AD
- WHY? even though we have authenticated at AD, even then we can't access resources inside our subscription. to Access, user Need to Authorize first
- How?
- We need to get authorized at the subscription level.
- Authorization can be done using Rbac. That is role based access control.
- Access will be given based on User Role
- If you are a developer or developer based role will be given.
- If you are a tester, a tester based role will be given
- At what Level
- This authorization can can be done at
- the resource group level.
- the resource level also.
- This authorization can can be done at
Check/Assign User Role at Microsoft Active Directory
- login to portal.azure.com
- search Entra Id and move to AD page
- Click on Users on Left Panel
- from user list click specific user name
- On User Detail page click on numeric no giving against ‘Assigned Roles’
- right now my user has Global Admin Role
Check/Assign User Role at Specific Resource
WHY?
- I was authorized on Azure Active Directory level
- But does that give permission to access the resources?
- So I need to authorize myself at the subscription level also beside AD
How?
- Go to your Active working Subscription
- Click Access Control (IAM) on left panel
- Click Tab “Role Assignments”
- You can see your user name here as an owner.
- An owner role has been given. So this person is authorized at the subscription level. So whatever resource gets created inside this subscription now this person will have access to it.
- You can see your user name here as an owner.
- Click Tab “Role Assignments”