Identity
Hierarchy
Privileged Identity Management
Privileged Identity Management provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions on resources that you care about. Here are some of the key features of Privileged Identity Management:
Provide just-in-time privileged access to Azure AD and Azure resources
Assign time-bound access to resources using start and end dates
Require approval to activate privileged roles
Enforce multi-factor authentication to activate any role
Use justification to understand why users activate
Get notifications when privileged roles are activated
Conduct access reviews to ensure users still need roles
Download audit history for internal or external audit
Prevents removal of the last active Global Administrator and Privileged Role Administrator role assignments
Access Review
To review the role whether it is still applicable or not
Conditional Access Policies
To require the specific groups of user or apps to grant or block the access, such as require multi-factor authentication
Resource Lock
To create read-only / delete lock on the resource to restrict the action
Managed Identity
It provides the ways for resource to access another other resources
Once connect the resource with managed identity, and then assign the role to managed identity, the application can access other resource based on the role
There are 2 types
System-assigned: Can’t be shared. It can only be associated with a single Azure resource. Workloads that are contained within a single Azure resource. Workloads for which you need independent identities. For example, an application that runs on a single virtual machine.
User-assigned: Can be shared. The same user-assigned managed identity can be associated with more than one Azure resource. Workloads that run on multiple resources and can share a single identity. Workloads that need pre-authorization to a secure resource, as part of a provisioning flow. Workloads where resources are recycled frequently, but permissions should stay consistent. For example, a workload where multiple virtual machines need to access the same resource.
Application object
It is representation of the user containing certain roles
When applied application object to the application, the application can access the resource that include on the user role
Policies
Set the policies up to management group level to limit the access, enforce some of the action
Blue Print
To define the deployment including ARM Templates, policies, resource groups and role-based access control
To assign the definition up to an existing management group or subscription level
Last updated
Was this helpful?