Call Us: +32 2 466 00 16
Email: info@u2u.be
Follow Us:

Microsoft Identity and Access Administrator

3 days
sc-300
3 days

Upcoming Sessions

Date:

Format:

Price:

Location:

Book now

Date:

Format:

Price:

Location:

Book now

Date:

Format:

Price:

Location:

Book now

Date:

Format:

Price:

Book now

Interested in a private company training? Request it here.

Explore identity in Microsoft Entra ID

This module will cover a wide view of the definition and available services for identity provided in the Microsoft Cloud from Microsoft Entra ID and to Microsoft 365. You start with the basics of authentication, authorization, and access tokens. This builds a firm foundation of what an identity is, why it is important. Then we move into governance and lifecycle management of your identities and identity solutions. The final topic opens up the term zero trust to see how it should be applied to your identity solutions.

  • Explain the identity landscape
  • Explore zero trust with identity
  • Discuss identity as a control plane
  • Explore why we have identity
  • Define identity administration
  • Contrast decentralized identity with central identity systems
  • Discuss identity management solutions
  • Explain Microsoft Entra Business to Business
  • Compare Microsoft identity providers
  • Define identity licensing
  • Explore authentication
  • Discuss authorization
  • Explain auditing in identity

Implement initial configuration of Microsoft Entra ID

Learn to create an initial Azure Active Directory configuration to ensure all the identity solutions available in Azure are ready to use. This module explores how to build and configure an Azure AD system.

  • Configure company brand
  • Configure and manage Microsoft Entra roles
  • Exercise manage users roles
  • Configure delegation by using administrative units
  • Analyze Microsoft Entra role permissions
  • Configure and manage custom domains
  • Configure tenant-wide setting
  • Exercise - setting tenant-wide properties
  • Summary and resources

Create, configure, and manage identities

Access to cloud-based workloads needs to be controlled centrally by providing a definitive identity for each user and resource. You can ensure employees and vendors have just enough access to do their job.

  • Create, configure, and manage users
  • Exercise - assign licenses to users
  • Exercise - restore or remove deleted users
  • Create, configure, and manage groups
  • Exercise - add groups in Microsoft Entra ID
  • Configure and manage device registration
  • Manage licenses
  • Exercise - change group license assignments
  • Exercise - change user license assignments
  • Create custom security attributes
  • Explore automatic user creation
  • Summary and resources

Implement and manage external identities

Inviting external users to use company Azure resources is a great benefit, but you want to do it in a secure way. Explore how to enable secure external collaboration.

  • Describe guest access and Business to Business accounts
  • Manage external collaboration
  • Exercise - configure external collaboration
  • Invite external users - individually and in bulk
  • Exercise - add guest users to directory
  • Exercise - invite guest users bulk
  • Demo - manage guest users in Microsoft Entra ID
  • Manage external user accounts in Microsoft Entra ID
  • Manage external users in Microsoft 365 workloads
  • Exercise - explore dynamic groups
  • Implement and manage Microsoft Entra Verified ID
  • Configure identity providers
  • Implement cross-tenant access controls
  • Summary and resources

Implement and manage hybrid identity

Creating a hybrid-identity solution to use your on-premises active directory can be challenging. Explore how to implement a secure hybrid-identity solution.

  • Plan, design, and implement Microsoft Entra Connect
  • Implement manage password hash synchronization (PHS)
  • Implement manage pass-through authentication (PTA)
  • Demo - Manage pass-through authentication and seamless single sign-on (SSO)
  • Implement and manage federation
  • Trouble-shoot synchronization errors
  • Implement Microsoft Entra Connect Health
  • Manage Microsoft Entra Health
  • Summary and resources

Secure Microsoft Entra users with multifactor authentication

Learn how to use multifactor authentication with Microsoft Entra ID to harden your user accounts.

  • What is Microsoft Entra multifactor authentication?
  • Plan your multifactor authentication deployment
  • Exercise - Enable Microsoft Entra multifactor authentication
  • Configure multi-factor authentication methods

Manage user authentication

There are multiple options for authentication in Azure AD. Learn how to implement and manage the right authentications for users based on business needs.

  • Administer FIDO2 and passwordless authentication methods
  • Explore Authenticator app and OATH tokens
  • Implement an authentication solution based on Windows Hello for Business
  • Exercise configure and deploy self-service password reset
  • Deploy and manage password protection
  • Configure smart lockout thresholds
  • Exercise - Manage Microsoft Entra smart lockout values
  • Implement Kerberos and certificate-based authentication in Microsoft Entra ID
  • Configure Microsoft Entra user authentication for virtual machines
  • Summary and resources

Plan, implement, and administer Conditional Access

Conditional Access gives a fine granularity of control over which users can do specific activities, access which resources, and how to ensure data and systems are safe.

  • Plan security defaults
  • Exercise - Work with security defaults
  • Plan Conditional Access policies
  • Implement Conditional Access policy controls and assignments
  • Exercise - Implement Conditional Access policies roles and assignments
  • Test and troubleshoot Conditional Access policies
  • Implement application controls
  • Implement session management
  • Exercise - Configure authentication session controls
  • Implement continuous access evaluation
  • Summary and resources

Manage Microsoft Entra Identity Protection

Protecting a user's identity by monitoring their usage and sign-in patterns will ensure a secure cloud solution. Explore how to design and implement Microsoft Entra Identity protection.

  • Review identity protection basics
  • Implement and manage user risk policy
  • Exercise enable sign-in risk policy
  • Exercise configure Azure Active Directory multifactor authentication registration policy
  • Monitor, investigate, and remediate elevated risky users
  • Implement security for workload identities
  • Explore Microsoft Defender for Identity
  • Summary and resources

Implement access management for Azure resources

Explore how to use built-in Azure roles, managed identities, and RBAC-policy to control access to Azure resources. Identity is the key to secure solutions.

  • Assign Azure roles
  • Configure custom Azure roles
  • Create and configure managed identities
  • Access Azure resources with managed identities
  • Analyze Azure role permissions
  • Configure Azure Key Vault RBAC policies
  • Retrieve objects from Azure Key Vault
  • Explore Microsoft Entra Permissions Management
  • Summary and resources

Plan and design the integration of enterprise apps for SSO

Enterprise app deployment enables control over which users can access the apps, easily log into apps with single-sign-on, and provide integrated usage reports.

  • Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report
  • Configure connectors to apps
  • Exercise implement access management for apps
  • Design and implement app management roles
  • Exercise create a custom role to manage app registration
  • Configure preintegrated gallery SaaS apps
  • Implement and manage policies for OAuth apps
  • Summary and resources

Implement and monitor the integration of enterprise apps for SSO

Deploying and monitoring enterprise applications to Azure solutions can ensure security. Explore how to deploy on-premises and cloud based apps to users.

  • Implement token customizations
  • Implement and configure consent settings
  • Integrate on-premises apps with Microsoft Entra application proxy
  • Integrate custom SaaS apps for single sign-on
  • Implement application-based user provisioning
  • Monitor and audit access to Microsoft Entra integrated enterprise applications
  • Create and manage application collections
  • Summary and resources

Implement app registration

Line of business developed in-house need registration in Microsoft Entra ID and assigned to users for a secure Azure solution. Explore how to implement app registration.

  • Plan your line of business application registration strategy
  • Implement application registration
  • Register an application
  • Configure permission for an application
  • Grant tenant-wide admin consent to applications
  • Implement application authorization
  • Exercise add app roles to an application and receive tokens
  • Manage and monitor application by using app governance
  • Summary and resources

Plan and implement entitlement management

When new users or external users join your site, quickly assigning them access to Azure solutions is a must. Explore how to entitle users to access your site and resources.

  • Define access packages
  • Exercise create and manage a resource catalog with Microsoft Entra entitlement management
  • Configure entitlement management
  • Exercise add terms of use acceptance report
  • Exercise manage the lifecycle of external users with Microsoft Entra identity governance
  • Configure and manage connected organizations
  • Review per-user entitlements
  • Summary and resources

Plan, implement, and manage access review

Once identity is deployed, proper governance using access reviews is necessary for a secure solution. Explore how to plan for and implement access reviews.

  • Plan for access reviews
  • Create access reviews for groups and apps
  • Create and configure access review programs
  • Monitor access review findings
  • Automate access review management tasks
  • Configure recurring access reviews
  • Summary and resources

Plan and implement privileged access

Ensuring that administrative roles are protected and managed to increase your Azure solution security is a must. Explore how to use PIM to protect your data and resources.

  • Define a privileged access strategy for administrative users
  • Configure Privileged Identity Management for Azure resources
  • Exercise configure Privileged Identity Management for Microsoft Entra roles
  • Exercise assign Microsoft Entra roles in Privileged Identity Management
  • Exercise assign Azure resource roles in Privileged Identity Management
  • Plan and configure Privileged Access Groups
  • Analyze Privileged Identity Management audit history and reports
  • Create and manage emergency access accounts
  • Summary and resources

Monitor and maintain Microsoft Entra ID

Audit and diagnostic logs within Microsoft Entra ID provide a rich view into how users are accessing your Azure solution. Learn to monitor, troubleshoot, and analyze sign-in data.

  • Analyze and investigate sign-in logs to troubleshoot access issues
  • Review and monitor Microsoft Entra audit logs
  • Exercise connect data from Microsoft Entra ID to Microsoft Sentinel
  • Export logs to third-party security information and event management system
  • Analyze Microsoft Entra workbooks and reporting
  • Monitor security posture with Identity Secure Score
  • Summary and resources

The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.

This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization.

Contact Us
  • Address:
    U2U nv/sa
    Z.1. Researchpark 110
    1731 Zellik (Brussels)
    BELGIUM
  • Phone: +32 2 466 00 16
  • Email: info@u2u.be
  • Monday - Friday: 9:00 - 17:00
    Saturday - Sunday: Closed
Say Hi
© 2024 U2U All rights reserved.