Explore 1.5M+ audiobooks & ebooks free for days

Only $12.99 CAD/month after trial. Cancel anytime.

A Comprehensive Guide to Cloud Infrastructure and Management: IT Books, #1
A Comprehensive Guide to Cloud Infrastructure and Management: IT Books, #1
A Comprehensive Guide to Cloud Infrastructure and Management: IT Books, #1
Ebook569 pages4 hoursIT Books

A Comprehensive Guide to Cloud Infrastructure and Management: IT Books, #1

Rating: 0 out of 5 stars

()

Read preview

About this ebook

This is a Comprehensive Guide to Cloud Infrastructure and Management using Microsoft Entra ID (Azure AD)

LanguageEnglish
PublisherMario Marinov
Release dateMar 5, 2025
ISBN9798230923022
A Comprehensive Guide to Cloud Infrastructure and Management: IT Books, #1

Other titles in A Comprehensive Guide to Cloud Infrastructure and Management Series (3)

View More

Read more from Mario Marinov

Related to A Comprehensive Guide to Cloud Infrastructure and Management

Titles in the series (3)

View More

Related ebooks

Technology & Engineering For You

View More

Related categories

Reviews for A Comprehensive Guide to Cloud Infrastructure and Management

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    A Comprehensive Guide to Cloud Infrastructure and Management - Mario Marinov

    Chapter 1: Introduction to Azure Cloud Services

    Overview of Microsoft Azure

    Microsoft Azure is a cloud computing platform and service offered by Microsoft. It provides a wide range of cloud-based solutions, including computing, storage, networking, security, and artificial intelligence (AI). Azure enables businesses and developers to build, deploy, and manage applications efficiently while taking advantage of the scalability and reliability of the cloud.

    Azure was launched in 2010 and has since grown into one of the leading cloud providers, competing with Amazon Web Services (AWS) and Google Cloud Platform (GCP). It supports multiple programming languages, frameworks, and tools, making it a versatile solution for enterprises, startups, and developers alike.

    Core Azure Services

    Azure provides a vast portfolio of cloud services categorized into:

    Compute: Virtual Machines (VMs), Azure Kubernetes Service (AKS), Azure Functions.

    Networking: Virtual Networks (VNet), Load Balancers, ExpressRoute.

    Storage: Blob Storage, Azure Files, Disk Storage.

    Databases: Azure SQL Database, Cosmos DB, MySQL, PostgreSQL.

    Security & Identity: Azure Active Directory (Azure AD), Role-Based Access Control (RBAC).

    AI & Machine Learning: Azure Cognitive Services, Machine Learning Studio.

    Monitoring & Management: Azure Monitor, Azure Security Center.

    Microsoft Azure offers a pay-as-you-go pricing model, allowing businesses to optimize costs based on usage. It also supports hybrid and multi-cloud strategies with tools like Azure Arc and Azure Stack.

    Key Benefits of Azure Cloud

    Azure provides several advantages for businesses and developers looking to modernize their IT infrastructure:

    1. Scalability and Flexibility

    Azure allows organizations to scale resources up or down based on demand. Whether you need to handle sudden spikes in web traffic or expand your infrastructure globally, Azure provides auto-scaling capabilities for applications and services.

    2. Cost Efficiency

    With its pay-as-you-go pricing model, Azure helps organizations optimize cloud expenses. Azure Reserved Instances and Azure Hybrid Benefit further reduce costs for long-term commitments and on-premises licensing.

    3. Global Reach

    Azure is available in multiple regions worldwide, allowing businesses to deploy applications closer to users for lower latency and improved performance.

    4. Security and Compliance

    Microsoft invests heavily in cybersecurity and compliance. Azure provides:

    Azure Security Center for threat protection.

    Role-Based Access Control (RBAC) to manage permissions.

    Compliance with industry standards like ISO, GDPR, HIPAA, and FedRAMP.

    5. Hybrid Cloud and Edge Computing

    Azure supports hybrid cloud models, allowing businesses to integrate on-premises data centers with the cloud. Azure Arc extends cloud management to on-premises and multi-cloud environments.

    6. High Availability and Disaster Recovery

    Azure guarantees 99.95% uptime through its Service Level Agreements (SLAs). Services like Azure Backup and Site Recovery provide disaster recovery solutions for business continuity.

    7. Developer and AI Integration

    Azure offers a robust development environment with Azure DevOps, GitHub integration, and AI-powered solutions through Azure Cognitive Services and Machine Learning Studio.

    Azure Global Infrastructure

    Microsoft Azure operates a vast network of data centers across the globe, ensuring reliable and low-latency services.

    1. Azure Regions and Availability Zones

    Regions: Azure has over 60+ regions worldwide, each consisting of multiple data centers.

    Availability Zones: Each region can have multiple availability zones, ensuring redundancy and high availability.

    2. Azure Edge Locations

    Microsoft has edge locations globally to deliver content faster and improve performance for users worldwide. Azure Content Delivery Network (CDN) ensures quick access to data and applications.

    3. Compliance and Data Sovereignty

    Azure ensures compliance with data sovereignty laws, allowing customers to choose where their data is stored and processed. Azure Government and Azure China provide dedicated services for compliance-sensitive environments.


    Conclusion

    Microsoft Azure is a powerful cloud computing platform that enables businesses to build, deploy, and manage applications globally. With a strong infrastructure, cost-effective pricing, and enterprise-grade security, Azure is a leading choice for cloud computing solutions.

    A blue text on a white background AI-generated content may be incorrect.

    Azure Active Directory (Azure AD)

    What is Azure Active Directory?

    Azure AD vs. On-Premises Active Directory

    Azure AD Tenant Configuration

    Integrating Azure AD with On-Premises AD

    Chapter 2: Azure Active Directory (Azure AD)

    What is Azure Active Directory?

    Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management (IAM) service. It helps organizations securely manage user identities, authenticate access to applications, and enforce security policies. Azure AD is a fundamental service for managing users, groups, and permissions across cloud-based and hybrid environments.

    Key Features of Azure AD:

    Single Sign-On (SSO): Users can access multiple cloud applications (like Microsoft 365, Azure, and third-party SaaS apps) with one set of credentials.

    Multi-Factor Authentication (MFA): Enhances security by requiring additional verification steps beyond passwords.

    Conditional Access: Enforces security policies based on user roles, device status, or location.

    Self-Service Password Reset (SSPR): Allows users to reset their passwords without IT intervention.

    Identity Protection: Detects and mitigates identity-related threats using AI and risk analysis.

    Integration with Hybrid Environments: Supports seamless authentication between on-premises AD and Azure AD.

    Azure AD is essential for organizations adopting a cloud-first approach while maintaining secure and scalable identity management.


    Azure AD vs. On-Premises Active Directory

    Microsoft’s traditional Active Directory (AD) has been the backbone of identity management for enterprises. However, Azure AD is designed for cloud environments with significant differences in functionality.

    Key Differences:

    Azure AD is not a direct replacement for on-prem AD but extends identity services to the cloud.

    Unlike traditional AD, Azure AD does not use Group Policy Objects (GPOs) to manage devices; instead, it relies on Microsoft Intune.

    Azure AD supports hybrid identity by integrating with on-prem AD through Azure AD Connect.

    Organizations using legacy applications may need Azure AD Domain Services (AAD DS) to enable domain-join capabilities similar to on-prem AD.


    Azure AD Tenant Configuration

    A tenant in Azure AD represents a dedicated instance of Azure AD that an organization uses to manage identities and access controls. Configuring an Azure AD tenant involves several steps.

    Step 1: Creating an Azure AD Tenant

    Sign in to the Azure Portal.

    Navigate to Azure Active Directory Create a Tenant.

    Choose Azure AD as the directory type.

    Provide a unique Tenant Name (e.g., myorganization.onmicrosoft.com).

    Click Create to provision the new directory.

    Step 2: Configuring Custom Domains

    By default, Azure AD tenants use *.onmicrosoft.com domains. To use a custom domain (e.g., company.com):

    Go to Azure AD → Custom Domain Names → Add Custom Domain.

    Verify domain ownership via TXT record in DNS settings.

    Once verified, set the custom domain as Primary.

    Step 3: Creating and Managing Users

    Add users manually via the Azure Portal or bulk import via CSV files.

    Assign roles (User, Global Administrator, Application Administrator, etc.).

    Configure Multi-Factor Authentication (MFA) for security.

    Step 4: Assigning Licenses

    Azure AD Free, Premium P1, and Premium P2 offer different levels of identity management.

    Assign licenses to users based on business requirements.

    Step 5: Implementing Security Policies

    Enable Conditional Access policies to restrict login based on user risk.

    Configure Self-Service Password Reset (SSPR) for password recovery.

    Implement Identity Protection to detect suspicious activities.

    Integrating Azure AD with On-Premises AD

    Many enterprises operate in a hybrid identity model, where they integrate on-premises Active Directory with Azure AD. This is achieved using Azure AD Connect.

    What is Azure AD Connect?

    Azure AD Connect is a synchronization tool that:

    Syncs on-prem AD user accounts to Azure AD.

    Enables password hash synchronization or pass-through authentication.

    Supports Single Sign-On (SSO) for seamless authentication.

    Steps to Integrate Azure AD with On-Prem AD

    1. Install Azure AD Connect

    Download Azure AD Connect from the Microsoft website.

    Install it on a domain-joined Windows Server with internet access.

    2. Choose Authentication Method

    Azure AD Connect supports multiple authentication options:

    Password Hash Synchronization (PHS): Hashes of passwords are synced to Azure AD.

    Pass-Through Authentication (PTA): On-prem AD verifies credentials without storing passwords in Azure AD.

    Federation with ADFS: Requires Active Directory Federation Services (ADFS) for advanced SSO capabilities.

    3. Configure Synchronization

    Select Organizational Units (OUs) to sync users and groups.

    Enable Hybrid Identity to allow users to authenticate with on-prem AD credentials in the cloud.

    Configure Password Writeback to allow password resets from Azure AD to reflect in on-prem AD.

    4. Monitor and Troubleshoot

    Use Azure AD Connect Health to monitor sync status.

    Troubleshoot sync errors using the Synchronization Service Manager.

    Conclusion

    Azure AD is a critical component of modern identity management, providing secure authentication, user management, and hybrid identity capabilities. By integrating Azure AD with on-prem AD, organizations can enable seamless access across cloud and on-prem environments, ensuring better security, scalability, and efficiency.

    A blue text on a white background AI-generated content may be incorrect.

    Azure AD Users & Groups

    Creating and Managing Azure AD Users

    Azure AD Groups: Types and Best Practices

    Assigning Licenses to Users and Groups

    Self-Service Password Reset (SSPR)

    Chapter 3: Azure AD Users & Groups

    Creating and Managing Azure AD Users

    Azure Active Directory (Azure AD) allows organizations to create and manage user identities, ensuring secure access to resources and applications.

    1. Creating Users in Azure AD

    Users can be created in multiple ways:

    Azure Portal (manual creation)

    PowerShell (bulk operations)

    Azure CLI

    Azure AD Connect (sync with on-prem AD)

    Using the Azure Portal

    Sign in to the Azure Portal.

    Navigate to Azure Active Directory Users.

    Click + New user.

    Choose between:

    Create user: For a new account.

    Invite user: For external (guest) users.

    Provide user details:

    User principal name (UPN): [email protected]

    Display name

    Initial password (user must reset on first login)

    Click Create to finalize.

    Using PowerShell

    To create a user with PowerShell, use:

    PowerShell

    A close-up of a logo AI-generated content may be incorrect.

    Using Azure CLI

    Sh

    2. Managing Users

    Updating user attributes: Modify user properties (e.g., job title, department).

    Resetting passwords: Admins can manually reset passwords or enable Self-Service Password Reset (SSPR).

    Blocking/unblocking users: Disable user accounts if needed.

    Deleting users: Remove inactive or deactivated accounts.


    Azure AD Groups: Types and Best Practices

    Azure AD Groups simplify user management by allowing administrators to apply permissions, roles, and policies collectively.

    1. Types of Azure AD Groups

    A screenshot of a computer AI-generated content may be incorrect.

    2. Creating Azure AD Groups

    Using the Azure Portal

    Navigate to Azure AD → Groups → New Group.

    Select Group Type (Security or Microsoft 365).

    Enter Group Name and Description.

    Choose Membership Type:

    Assigned: Manually add users.

    Dynamic User: Automatically add users based on rules.

    Dynamic Device: Automatically add devices.

    Click Create.

    Using PowerShell

    PowerShell

    New-AzureADGroup -DisplayName IT Department -MailEnabled $false -SecurityEnabled $true -MailNickName ITDept

    Using Azure CLI

    sh

    az ad group create—display-name IT Department—mail-nickname ITDept—security-enabled true

    3. Best Practices for Azure AD Groups

    Use Security Groups for RBAC and access control.

    Use Microsoft 365 Groups for collaboration (Teams, Outlook).

    Implement Dynamic Groups to automate membership updates.

    Assign roles at the group level instead of individual users.

    Enable group expiration policies to clean up unused groups.


    Assigning Licenses to Users and Groups

    Azure AD allows organizations to assign licenses (such as Microsoft 365, Azure AD Premium, or Dynamics 365) either to individual users or groups.

    1. Assigning Licenses to Individual Users

    Navigate to Azure AD → Users.

    Select a user and go to Licenses.

    Click + Assignments and select the required license.

    Click Save.

    2. Assigning Licenses to Groups (Recommended)

    Assigning licenses to groups simplifies user management. When a user is added to a licensed group, they automatically receive assigned licenses.

    Steps to Assign Licenses to Groups

    Navigate to Azure AD → Groups.

    Select the group and go to Licenses.

    Click + Assign Licenses.

    Choose the licenses and click Assign.

    3. Best Practices for License Management

    Assign licenses at the group level for scalability.

    Use dynamic groups to automate license provisioning.

    Regularly audit license usage to optimize costs.

    Monitor license assignments using Azure AD Reports.


    Self-Service Password Reset (SSPR)

    Self-Service Password Reset (SSPR) allows users to reset their passwords without IT intervention, improving security and productivity.

    1. Enabling SSPR in Azure AD

    Navigate to Azure AD → Password Reset.

    Select Users and choose All or Selected users.

    Under Authentication Methods, require users to provide at least one or two verification methods:

    Email

    Phone (SMS/Call)

    Security Questions

    Microsoft Authenticator App

    Click Save.

    2. User Experience for Resetting Passwords

    Users can reset their passwords by:

    Going to the Microsoft password reset page.

    Entering their email or username.

    Verifying their identity using the selected authentication method.

    Creating a new password.

    3. Enforcing Strong Password Policies

    Use Azure AD Password Protection to block common weak passwords.

    Implement Multi-Factor Authentication (MFA) for added security.

    Enable Password Writeback to sync changes to on-prem AD.

    4. Best Practices for SSPR

    Educate users on how to use SSPR.

    Enforce at least two authentication methods.

    Regularly monitor password reset activity via Azure AD reports.


    Conclusion

    In this chapter, we explored:

    ✅ How to create and manage Azure AD users.

    ✅ The different types of Azure AD Groups and best practices.

    ✅ How to assign licenses efficiently to users and groups.

    ✅ The importance of Self-Service Password Reset (SSPR) for user productivity and security.

    By following these guidelines, organizations can enhance identity management, improve security, and streamline user administration in Azure AD.

    A blue text on a white background AI-generated content may be incorrect.

    Azure Subscription Management

    Understanding Azure Subscriptions

    Creating and Managing Subscriptions

    Subscription Governance and Cost Management

    Azure Subscription Scopes and Limits

    Chapter 4: Azure Subscription Management

    Effective Azure Subscription Management ensures that cloud resources are allocated, governed, and optimized efficiently. This chapter covers the fundamentals of Azure subscriptions, management strategies, governance policies, and cost optimization techniques.


    Understanding Azure Subscriptions

    1. What is an Azure Subscription?

    An Azure Subscription is a logical container for Azure resources, including virtual machines, databases, and networking components. It provides:

    Access Control – Defines who can use Azure services.

    Billing and Cost Tracking – Consolidates charges for Azure services.

    Resource Organization – Segregates workloads, environments, or departments.

    2. Azure Account Structure

    Azure follows a hierarchical structure:

    Azure Account – Associated with a Microsoft Entra ID (formerly Azure AD) tenant and a billing account.

    Azure Subscription – A container where resources are deployed.

    Resource Groups – Logical grouping of resources within a subscription.

    Subscription Types in Azure
    A table with text on it AI-generated content may be incorrect.

    Creating and Managing Subscriptions

    1. Creating an Azure Subscription

    To create a new Azure subscription:

    Sign in to Azure Portal.

    Navigate to Cost Management + Billing Subscriptions.

    Click Add Subscription.

    Select a Subscription Offer (e.g., PAYG, EA).

    Enter Billing Information and confirm.

    2. Managing Azure Subscriptions

    Administrators can manage subscriptions using:

    Azure Portal – UI-based management.

    Azure PowerShell – Automate subscription tasks.

    Azure CLI – Command-line-based management.

    Azure Management APIs – Programmatic control over subscriptions.

    Using PowerShell to List Subscriptions

    PowerShell

    Get-AzSubscription

    Using Azure CLI to List Subscriptions

    sh

    az account list—output table

    3. Subscription Delegation and Access Control

    To manage who can create and manage subscriptions:

    Assign RBAC (Role-Based Access Control) roles like Owner, Contributor, or Reader.

    Use Azure Policy to enforce governance.

    Implement Management Groups to control multiple subscriptions.


    Subscription Governance and Cost Management

    1. What is Subscription Governance?

    Subscription Governance ensures security, compliance, and cost control across Azure environments. It includes:

    RBAC (Role-Based Access Control) – Restrict permissions to avoid over-provisioning.

    Azure Policy – Enforce security and compliance policies.

    Azure Blueprints – Standardize deployments across environments.

    Resource Locks – Prevent accidental deletion or modification of critical resources.

    2. Cost Management Strategies

    Cost management involves tracking, analyzing, and optimizing Azure spending.

    Key Features in Azure Cost Management

    Azure Cost Analysis – Monitor spending trends.

    Azure Budgets – Set cost thresholds and alerts.

    Azure Advisor (Cost Optimization) – Get recommendations to reduce costs.

    Using PowerShell to Check Subscription Usage

    PowerShell

    Get-AzConsumptionUsageDetail -BillingPeriodName 202403

    Best Practices for Cost Optimization

    Use Reserved Instances (RIs) for predictable workloads.

    Auto-scale VMs and App Services to avoid over-provisioning.

    Shut down non-production resources outside business hours.

    Use Spot VMs for non-critical workloads.


    Azure Subscription Scopes and Limits

    1. Azure Subscription Hierarchy

    Azure resources are organized into four scopes:

    Management Groups – Manage multiple subscriptions together.

    Subscriptions – Container for Azure resources.

    Resource Groups – Logical grouping of resources.

    Resources – Individual services like VMs, databases, etc.

    2. Subscription Limits and Quotas

    Each subscription has limits on resource usage, including:

    A screenshot of a table AI-generated content may be incorrect.

    Checking Subscription Quotas

    Use the Azure CLI to check quotas:

    sh

    az vm list-usage—location eastus

    Requesting Quota Increases

    If you need more resources, request quota increases via Azure Support.


    Conclusion

    In this chapter, we explored:

    ✅ What an Azure Subscription is and the different subscription types.

    ✅ How to create and manage subscriptions using the Azure Portal, PowerShell, and CLI.

    Subscription governance using RBAC, policies, and cost management tools.

    Subscription scopes and limits, including resource quotas.

    By implementing best practices for governance and cost management, organizations can ensure efficient cloud resource utilization while maintaining security and compliance.

    A blue text on a white background AI-generated content may be incorrect.

    Azure Policy

    Introduction to Azure Policy

    Creating and Assigning Policies

    Policy Enforcement and Compliance

    Built-in vs. Custom Policies

    Chapter 5: Azure Policy

    Azure Policy is a governance tool that allows organizations to enforce compliance, manage security, and standardize resource configurations within Azure. This chapter will cover the fundamentals of Azure Policy, how to create and assign policies, enforce compliance, and differentiate between built-in and custom policies.


    Introduction to Azure Policy

    1. What is Azure Policy?

    Azure Policy is a governance service that allows administrators to:

    ✅ Define rules for resource compliance

    ✅ Enforce security standards

    ✅ Monitor and remediate non-compliant resources

    ✅ Apply organization-wide policies automatically

    2. Why Use Azure Policy?

    Organizations use Azure Policy to:

    Ensure compliance with industry standards like ISO, NIST, and CIS.

    Enforce security configurations (e.g., disallowing public storage accounts).

    Standardize resource deployments (e.g., enforcing tag policies).

    Automate remediation to fix non-compliant resources.

    3. Key Features of Azure Policy

    A close-up of a list AI-generated content may be incorrect.

    Creating and Assigning Policies

    1. How to Create an Azure Policy

    Azure provides two ways to create policies:

    Using the Azure Portal – User-friendly interface

    Using PowerShell or Azure CLI – Automate policy deployment

    Creating a Policy via Azure Portal

    Navigate to Azure Portal Policy.

    Click Definitions + Policy Definition.

    Define policy Name, Description, and Category.

    Write Policy Rule in JSON format.

    Save and assign the policy to a scope.

    Creating a Policy via PowerShell

    ––––––––

    PowerShell

    A close-up of a logo AI-generated content may be incorrect.

    ––––––––

    2. Assigning a Policy

    Once a policy is created, it must be assigned to a scope (Subscription, Resource Group, or Resource).

    Assigning a Policy via Azure Portal

    Go to Azure Portal Policy.

    Click Assignments + Assign Policy.

    Choose the Scope (Subscription/Resource Group).

    Select a Policy Definition.

    Configure Enforcement Mode (On/Off).

    Click Assign.

    Assigning a Policy via PowerShell

    PowerShell

    Policy Enforcement and Compliance

    1. How Azure Policy Enforces Compliance

    Azure Policy enforces compliance using policy effects:

    A close-up of a list of text AI-generated content may be incorrect.

    2. Checking Policy Compliance

    Once policies are assigned, Azure Policy continuously evaluates compliance.

    View Compliance Reports in Azure Portal under the Policy blade.

    ✅ Use PowerShell to check compliance:

    PowerShell

    Get-AzPolicyState -Scope /subscriptions/{subscriptionId}

    ✅ Use Azure CLI to check compliance:

    sh

    az policy state list—query [].{resource:resourceId, compliance:complianceState}

    3. Remediating Non-Compliant Resources

    If a policy detects non-compliance, remediation tasks can be created:

    Go to Azure Portal Policy Remediations.

    Select the non-compliant policy.

    Click Create Remediation Task.

    Choose resources to fix and execute the remediation.


    Built-in vs. Custom Policies

    1. Built-in Policies

    Azure provides over 800 built-in policies for common governance needs. Examples:

    Deny Public Storage Accounts

    Require Tag on Resources

    Enforce HTTPS on Web Apps

    View Built-in Policies via Azure Portal:

    Navigate to Azure Portal Policy.

    Click Definitions Filter by Type: Built-in.

    List Built-in Policies using PowerShell

    PowerShell

    Get-AzPolicyDefinition | Where-Object {$_.Properties.PolicyType -eq BuiltIn}

    List Built-in Policies using Azure CLI

    sh

    az policy definition list—query [?policyType=='BuiltIn']

    2. Custom Policies

    If built-in policies don’t meet specific requirements, custom policies can be created.

    Example: Custom Policy to Restrict VM Sizes

    json

    A computer code with blue text AI-generated content may be incorrect.

    Steps to Deploy Custom Policies:

    Navigate to Azure Policy Definitions.

    Click + Create Policy Definition.

    Enter Definition Name & Description.

    Copy and paste the JSON policy rule.

    Save and assign to a scope.


    Conclusion

    In this chapter, we explored:

    Azure Policy fundamentals and why it’s crucial for governance.

    How to create and assign policies using Azure Portal and PowerShell.

    Enforcement and compliance monitoring to track violations.

    Difference between built-in and custom policies.

    By leveraging Azure Policy, organizations can enforce security, standardize configurations, and ensure compliance across their cloud environment.

    A blue text on a white background AI-generated content may be incorrect.

    Azure Role-Based Access Control (RBAC)

    Understanding RBAC in Azure

    Built-in Roles and Custom Roles

    Assigning Roles to Users, Groups, and Applications

    Best Practices for RBAC Implementation

    Chapter 6: Azure Role-Based Access Control (RBAC)

    Azure Role-Based Access Control (RBAC) is a fundamental security feature that enables organizations to manage who has access to what resources and what actions they can perform. This chapter covers RBAC concepts, built-in vs. custom roles, role assignment processes, and best practices for secure implementation.


    Understanding RBAC in Azure

    1. What is RBAC?

    RBAC is an authorization system that controls access to Azure resources by assigning roles to users, groups, or applications at different scopes (Subscription, Resource Group, or Resource).

    2. Why Use RBAC?

    🔹 Least Privilege Access – Users only get the permissions they need.

    🔹 Granular Access Control – Assign roles at different levels (Subscription, Resource Group, or Resource).

    🔹 Security & Compliance – Helps enforce organizational security policies.

    🔹 Centralized Management – Easily manage access across Azure.

    3. RBAC Key Concepts

    A close-up of a list of words AI-generated content may be incorrect.

    4. RBAC Scope Levels

    RBAC roles can be assigned at different levels:

    Subscription Level – Access to all resources in the subscription.

    Resource Group Level – Access to resources within a specific resource group.

    Resource Level – Access to an individual resource (e.g., a single VM).

    Permissions are inherited – A role assigned at the Subscription level applies to all Resource Groups and Resources within it.


    Built-in Roles and Custom Roles

    1. Built-in Azure Roles

    Azure provides over 120 built-in roles to simplify access control. The most common ones include:

    A white rectangular box with black text AI-generated content may be incorrect.

    View Built-in Roles in Azure Portal:

    Navigate to Azure Portal IAM (Identity & Access Management).

    Click Roles Select a Role to view permissions.

    List Built-in Roles using PowerShell:

    PowerShell

    Get-AzRoleDefinition | Select-Object Name

    List Built-in Roles using Azure CLI:

    sh

    az role definition list—query [].roleName


    2. Creating Custom Roles

    If built-in roles don't meet your needs, custom roles can be created.

    Steps to Create a Custom Role

    Define role permissions in JSON format.

    Assign the role to users/groups at the required scope.

    Example: Custom Role for Read-Only Storage Access

    json

    A blue text on a white background AI-generated content may be incorrect.

    Create the Custom Role using PowerShell:

    PowerShell

    New-AzRoleDefinition -InputFile custom-role.json

    Create the Custom

    Enjoying the preview?
    Page 1 of 1