MS 100T03A ENU TrainerHandbook PDF
MS 100T03A ENU TrainerHandbook PDF
MS-100T03
Microsoft 365 Identity
Management
MCT USE ONLY. STUDENT USE PROHIBITED
MS-100T03
Microsoft 365 Identity
Management
MCT USE ONLY. STUDENT USE PROHIBITED
MCT USE ONLY. STUDENT USE PROHIBITED
Contents
Welcome
Welcome to Microsoft 365 Identity Management
Welcome to Microsoft 365 Identity Management In this course, you will learn Learn how to manage
user security groups and licenses for cloud identities, and how to plan and implement identity synchroni-
zation, federated identities, applications, and external access. The course material is supported by a series
of hands-on lab exercises that allow you to gain invaluable experience configuring and managing your
identity environment and performing identity synchronization
By actively participating in this course, you will learn how to:
●● Manage user accounts and licenses in Microsoft 365
●● Manage admin roles and security groups in Microsoft 365
MCT USE ONLY. STUDENT USE PROHIBITED 2 Module 0 Course Introduction
Assigning a License
To assign a license, you can use the Microsoft 365 admin center or Windows PowerShell. To assign or
remove licenses for multiple users in the Microsoft 365 admin center, you should perform the following
steps:
1. On the Microsoft 365 admin center Home page, click Users, and then click Active Users.
2. Select the users that you want to assign or remove licenses, and in the More list, click Edit product
licenses.
3. On the Product Licenses page, you can change the user location, specify whether to replace or add
to existing licenses, and then select the services that you want to modify.
4. If you prefer to use Windows PowerShell, the Set-MsolUserLicense cmdlet enables you to add user
licenses, remove user licenses, and update licensing options. To add a license to a user, at the com-
mand prompt, type the following command, and then press Enter:
5. Set-MsolUserLicense -UserPrincipalName username@domainname –AddLicenses “license”
6. For example, to add an Enterprise Premium license for Stella Carrillo at Adatum Corp., you would run
the following command:
7. If you prefer to use Windows PowerShell, the Set-MsolUserLicense cmdlet enables you to add user
licenses, remove user licenses, and update licensing options. To add a license to a user, at the com-
mand prompt, type the following command, and then press Enter:
8. Set-MsolUserLicense –UserPrincipalName [email protected] –AddLicenses “Ada-
tum:ENTERPRISEPREMIUM”
2. Note how many licenses are valid and how many licenses have been assigned.
Using Windows PowerShell, you can use the Get-MsolAccountSku cmdlet to view the current licensing
information for your Microsoft 365 tenant, which includes the number of licenses that are currently
available and how many are in use. You can use the Get-MsolUser cmdlet with the -UnlicensedUsersOn-
ly switch to view a list of users who currently do not have a license.
You can also use Windows PowerShell to delete user accounts by using the Remove-MsolUser command
with the –ObjectId Guid or the –UserPrincipalName string parameters.
When you delete a user account, the account becomes inactive and the user cannot sign in to access
Microsoft 365 services. However, you might need to restore a user’s account after deletion. Microsoft 365
retains the account as a soft deleted inactive account for 30 days after deletion; this enables you to
restore the account.
To restore a user:
1. In the Microsoft 365 admin center, on the Users menu, click Deleted users.
2. Select the user that you want to restore and then click Restore.
3. Select how you want to assign the user password and then click Restore.
You can also use Windows PowerShell to restore deleted user accounts by using the Restore-MsolUser
cmdlet.
Let's play a quick game to test your knowledge of user accounts and licenses in Microsoft 365. Click on
the button below to open this review activity full screen.
LAUNCH ACTIVITY1
1 https://edxinteractivepage.blob.core.windows.net/miltstatic/MS100.3/20190329-071223255/static/CLD273x_M01_L01_cw_AcctsLicensestu-
torial.html
MCT USE ONLY. STUDENT USE PROHIBITED 8 Module 1 Managing User Security Groups and Licenses
Dynamics 365 service adminis- This role can manage instances Used if you need to configure
trator in the Dynamics 365 admin and manage Dynamics 365.
center and is able to assign users
to manage Dynamics 365 at the
tenant level.
Exchange administrator Manages mailboxes and an- Used if you need to manage
ti-spam policies for your busi- mailbox related settings and
ness, using the Exchange admin attributes such as mailbox size or
center. Can view all the activity mail flow connectors.
reports in the Microsoft 365
admin center.
Password administrator Resets passwords, manages For administrators that need to
service requests, and monitors reset passwords or manage
service health. Password admins service requests.
are limited to resetting pass-
words for users.
Skype for Business administra- Configures Skype for Business For administrators that need to
tor for your organization and can manage Skype for Business.
view all the activity reports in the
Microsoft 365 admin center.
Power BI administrator The Power BI admin role will For administrators that want to
have access to Microsoft 365 manage Power BI.
Power BI usage metrics. They'll
also be able to control your
organization's usage of Power BI
features.
Service administrator Can open support requests with This role is ideal for your first or
Microsoft and views the service second level support staff that
dashboard and message center. manages Microsoft 365 prob-
lems and incidents.
They have “view only” permis-
sions except for opening support
tickets and reading them.
SharePoint administrator Manages the document storage For administrators that need to
for your business on SharePoint manage SharePoint Online.
Online. They do this in the
SharePoint admin center. They
can also assign other people to
be Site Collection administrators
and Term Store administrators.
People in this role can also view
all the activity reports in the
Microsoft 365 admin center.
MCT USE ONLY. STUDENT USE PROHIBITED 10 Module 1 Managing User Security Groups and Licenses
User management administra- Resets passwords, monitors Good for your user helpdesk that
tor service health, adds and deletes manage user related issues.
user accounts, and manages
service requests. The user
management admin can’t delete
a global admin, create other
admin roles, or reset passwords
for global, billing, Exchange,
SharePoint, Compliance, and
Skype for Business admins.
Additional admin roles such as Compliance Administrator and Company Administrator are available but
are managed using either the Security & Compliance admin center or Windows PowerShell. A list of all
available admin roles is available by running the Get-MsolRole cmdlet in Windows PowerShell.
All admin roles are not mutually exclusive, but they can be combined. You can assign one or more admin
roles to a user, such as the Exchange admin, SharePoint admin, and User Management administrator
roles.
Several built-in groups are created when you create a site collection in SharePoint Online. These are
referred to as default SharePoint Online groups. Which default SharePoint Online groups are created
depends on the site template that is used to create the site. For example, the Team Site template contains
the following default SharePoint Online groups: Team Site Visitors, Team Site Members, and Team Site
Owners.
You can also use Windows PowerShell to create security groups for Microsoft 365 by using the
New-MsolGroup cmdlet.
Important: You cannot use the Microsoft 365 admin center to edit security groups if they are synchro-
nized with your on-premises Active Directory. You must use local Active Directory management tools for
this purpose.
Role activation
To activate a role, an eligible admin requests a time-bound “activation” for the role. The activation can be
requested using the Activate my role option in Azure AD Privileged Identity Management. An admin who
wants to activate a role needs to initialize Azure AD Privileged Identity Management in the Azure portal.
Role activation is also customizable. In the Privileged Identity Management settings, you can determine
the length of the activation and what information the admin needs to provide to activate the role.
Additional reading. For more information, see the following article on How to activate or deactivate
roles in Azure AD Privileged Identity Management4.
2 https://portal.azure.com/
3 https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-add-role-to-user
4 https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-activate-role
MCT USE ONLY. STUDENT USE PROHIBITED 16 Module 1 Managing User Security Groups and Licenses
Let's play a quick game to test your knowledge of administrator roles and security groups in Microsoft
365. Click on the button below to open this review activity full screen.
LAUNCH ACTIVITY5
5 https://edxinteractivepage.blob.core.windows.net/miltstatic/MS100.3/20190329-071223255/static/CLD273x_M01_L02_match_AdminRoles-
tutorial.html
MCT USE ONLY. STUDENT USE PROHIBITED
Password Management in Microsoft 365 17
If a user does not change his or her password before the expiration time has elapsed, they can still
change it by using the Password update page that appears the next time they sign in. Alternatively, you
can reset their password for them.
You also have the option on the Password update page to set user passwords to never expire. This
disables password expiration for all users. However, disabling password expiration for all your users is not
recommended because of the potential that a password will be hacked or leaked over time.
To disable password expiration for single users using PowerShell, you need to use the Set-MsolUser
cmdlet with the -PasswordNeverExpires parameter.
can sign in to Microsoft 365. You can also enable users who authenticate from a federated, on-premises
directory for multi-factor authentication.
The tenant administrator enables MFA in the Microsoft 365 admin center by performing the following
steps:
1. In the Microsoft 365 admin center, on the Settings menu, click Services & add-ins.
2. On the Services & add-ins page, click Azure multi-factor authentication.
3. On the Azure multi-factor authentication page, click Manage multi-factor authentication.
4. On the multi-factor authentication page, select the users that you need to enable for multi-factor
authentication, and then click Enable.
You can also use Windows PowerShell to enable MFA for a user. This is done by using the Set-MsolUser
cmdlet and the -StrongAuthenticationRequriement parameter, as seen in the following example:
$st = New-Object -TypeName Microsoft.Online.Administration.StrongAuthenti-
cationRequirement$st.RelyingParty = "*"$st.State = “Enabled”$sta = @($st)
Set-MsolUser -UserPrincipalName [email protected] -StrongAu-
thenticationRequirements $sta
After the administrator enables users for multi-factor authentication, they must configure their second
authentication factor at their next sign-in. You can use the following options as the second authentication
factor:
●● Call to phone. Users receive a phone call with instructions for the users to press the pound key. After
they press the pound key, users are signed in.
●● Text message to phone. Users receive a text message containing a six-digit code that they must
enter into the Office 365 portal.
●● Notification through mobile app. Users configure a smartphone app that receives a notification that
users need to confirm to sign in to Microsoft 365. Smartphone apps are available for Windows phone,
iPhone, and Android devices.
●● Verification code from mobile app. Users configure a smartphone app and enter the six-digit code
from the app into the portal.
The multi-factor authentication methods can be configured in the service settings of the Microsoft 365
admin center as the following screen shot indicates.
MCT USE ONLY. STUDENT USE PROHIBITED
Password Management in Microsoft 365 21
Additional reading. For more information, see the following article on how to Deploy cloud-based
Azure Multi-Factor Authentication6.
6 https://go.microsoft.com/fwlink/?LinkId=627442
MCT USE ONLY. STUDENT USE PROHIBITED 22 Module 1 Managing User Security Groups and Licenses
Password writeback
Paid subscriptions for Microsoft 365 store user information in Azure AD Basic. Azure AD Basic is unable to
write back a password change from Azure AD to on-premises AD DS. If you purchase Azure AD Premium,
it includes the ability to write back passwords. This enables you to implement self-service password reset
for synchronized identities and federated identities. This also enhances AD DS by providing a portal for
password reset.
Additional reading. For more information about SSPR, see the following article on resetting your work
or school password7.
Prerequisites
Access reviews are available with the Premium P2 edition of Azure AD, which is included in Microsoft
Enterprise Mobility + Security, E5.
Additional reading. For more information, see Azure Active Directory editions8.
7 https://docs.microsoft.com/en-us/azure/active-directory/active-directory-passwords
8 https://docs.microsoft.com/en-us/azure/active-directory/active-directory-editions
MCT USE ONLY. STUDENT USE PROHIBITED
Password Management in Microsoft 365 23
9 https://portal.azure.com/
10 https://portal.azure.com/
11 https://docs.microsoft.com/en-us/azure/active-directory/active-directory-azure-ad-controls-create-access-review
MCT USE ONLY. STUDENT USE PROHIBITED 24 Module 1 Managing User Security Groups and Licenses
5. Ask the reviewers to give input. By default, they each receive an email from Azure AD with a link to the
access panel, where they perform their access review12.
6. If the reviewers haven't given input, you can ask Azure AD to send them a reminder. By default, Azure
AD automatically sends a reminder halfway to the end date to reviewers who haven't yet responded.
7. After the reviewers give input, stop the access review and apply the changes. For more information,
see Complete an access review13.
12 https://docs.microsoft.com/en-us/azure/active-directory/active-directory-azure-ad-controls-perform-access-review
13 https://docs.microsoft.com/en-us/azure/active-directory/active-directory-azure-ad-controls-complete-access-review
14 https://docs.microsoft.com/en-us/azure/active-directory/active-directory-azure-ad-controls-perform-access-review
15 https://docs.microsoft.com/en-us/azure/active-directory/active-directory-azure-ad-controls-perform-access-review
16 https://docs.microsoft.com/en-us/azure/active-directory/active-directory-azure-ad-controls-complete-access-review
MCT USE ONLY. STUDENT USE PROHIBITED
Password Management in Microsoft 365 25
Let's play a quick game to test your knowledge of password management in Microsoft 365. Click on the
button below to open this review activity full screen.
LAUNCH ACTIVITY17
17 https://edxinteractivepage.blob.core.windows.net/miltstatic/MS100.3/20190329-071223255/static/CLD273x_M01_L03_fill_Passwordtutorial.
html
MCT USE ONLY. STUDENT USE PROHIBITED 26 Module 1 Managing User Security Groups and Licenses
18 https://openedx.microsoft.com/courses/course-v1:Microsoft+MS-100.3+2018_T3/info
MCT USE ONLY. STUDENT USE PROHIBITED
Non-Graded Practice Lab 1 27
5. NOTE: Do not perform Lab 2 at this point. You will perform Lab 2 at the end of Module 2.
MCT USE ONLY. STUDENT USE PROHIBITED
Module 2 Planning and Implementing Identity
Synchronization
In Microsoft 365, directory synchronization is commonly used to synchronize in one direction (from
on-premises to Azure AD). However, some features in Azure AD Connect allow it to write-back specific
objects and attributes to the on-premises directory; therefore, creating some sort of two-way synchroni-
zation. In addition to directory objects, directory synchronization can provide two-way synchronization of
MCT USE ONLY. STUDENT USE PROHIBITED
Introduction to Identity Synchronization 31
user passwords as well. Directory synchronization tools that perform this synchronization, such as Azure
AD Connect, should be installed on a dedicated computer in your on-premises environment.
Integrating your on-premises directories with Azure AD allows your users to improve productivity by
reducing the amount of time spent typing in passwords for accessing both cloud and on-premises
resources.
With this integration, users and organizations can take advantage of the following:
●● Hybrid identity. Organizations can provide users with a common hybrid identity across on-premises
or cloud-based services, including consistent group membership, by leveraging Active Directory and
then connecting to Azure AD.
●● AD Policies. Administrators can use policies set through Active Directory to provide conditional
access based on application resource, device and user identity, network location, and multi-factor
authentication without having to perform additional tasks in the cloud.
●● Leverage identity. Users can leverage their common identity through accounts in Azure AD to Office
365, Intune, SaaS apps, and non-Microsoft applications.
●● Single-sign-on (SSO). Security will have confidence in knowing that user identities and information
are protected because all the servers and services used in SSO are mastered and controlled on-prem-
ises.
●● Multi-factor authentication (MFA). Security will have greater confidence when they have the option
to use strong authentication, also called multi-factor authentication (MFA), with the cloud service.
●● Common identity model. Developers can build applications that leverage the common identity
model, integrating applications into on-premises Active Directory when leveraging (such as Azure AD
App Proxy or Azure for cloud-based applications).
Additional reading. For more information, see the following article titled Get started with conditional
access in Azure Active Directory1.
1 https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access-azure-portal-get-started
MCT USE ONLY. STUDENT USE PROHIBITED 32 Module 2 Planning and Implementing Identity Synchronization
●● Attributes of existing user, group, and contact objects that are modified in on-premises Active
Directory are modified in Microsoft 365; however, not all on-premises Active Directory attributes are
synchronized to Microsoft 365.
●● Existing user, group, and contact objects that are deleted from on-premises Active Directory are
subsequently deleted from Microsoft 365.
●● Existing user objects that are disabled on-premises are subsequently disabled in Microsoft 365;
however, licenses are not automatically unassigned.
Additionally, Azure AD Connect supports the following scenarios:
●● Multiple Active Directory forest environments.
●● Multiple Exchange organizations to one Microsoft 365 tenant.
Azure AD requires a single source of authority for every object. Therefore, in the scenario in which you
have deployed Azure AD Connect for Active Directory synchronization, there are two things that are
important to understand:
●● The source of authority is the on-premises Active Directory.
●● You are mastering objects from within your on-premises Active Directory by using whatever manage-
ment tools you are using today, such as Active Directory Users and Computers or Windows Power-
Shell.
In this scenario, after the first synchronization cycle has completed, the source of authority is transferred
from the cloud to the on-premises Active Directory. All subsequent changes to cloud objects (except for
licensing) are mastered from the on-premises Active Directory tools. The corresponding cloud objects are
read-only, and Microsoft 365 administrators cannot edit cloud objects if the source of authority is
on-premises.
Active Directory environment without sending password hashes to Microsoft 365. For more informa-
tion, see the following article on Azure Active Directory Passthrough Authentication2.
●● Password writeback. Will allow your users to change and reset their passwords in the cloud and have
your on-premises password policy applied.
●● Group writeback. Allows all Microsoft 365 groups to be synchronized to your Active Directory.
●● Device writeback. Will allow a device registered in Azure AD to be written back to on-premises
Active Directory so it can be used for conditional access.
●● Directory extension attribute sync. Directory extensions allows you to extend the schema in Azure
AD with your own attributes from on-premises Active Directory.
●● Prevent accidental deletes. Is turned on by default and protects your cloud directory from numerous
deletes at the same time. By default, it allows 500 deletes per run. You can change this setting de-
pending on your organization size.
●● Automatic upgrade. Is enabled by default for express settings installations and ensures your Azure
AD Connect is always up to date with the latest release.
●● SSO using AD FS. Configures an Active Directory Federated Services environment to support sin-
gle-sign on (SSO) in Office 365.
●● Seamless single sign-on (SSO) using Pass-through authentication (PTA). Allows sign in to Azure
AD by directly validating the users’ passwords directly against on-premises Active Directory.
Note: As Azure AD Connect features continuously improve and change, it is important to regularly visit
the Azure AD Connect: Version release history3 site for information on recent changes.
2 https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-pass-through-authentication-how-it-works
3 https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-version-history
MCT USE ONLY. STUDENT USE PROHIBITED 34 Module 2 Planning and Implementing Identity Synchronization
Let's play a quick game to test your knowledge of identity synchronization. Click on the button below to
open this review activity full screen.
LAUNCH ACTIVITY4
4 https://edxinteractivepage.blob.core.windows.net/miltstatic/MS100.3/20190329-071223255/static/CLD273x_M02_L01_flip_IdentitySychtu-
torial.html
MCT USE ONLY. STUDENT USE PROHIBITED
Planning for Azure AD Connect 35
5 https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-pass-through-authentication-how-it-works
MCT USE ONLY. STUDENT USE PROHIBITED
Planning for Azure AD Connect 37
When a user accesses a cloud service that relies on Azure AD, he or she is presented with an Azure AD
login page. After a user enters his or her credentials into the Azure AD login page, the Azure AD service
checks if the connector for pass-through authentication is configured for the user’s domain. If it is,
credentials are placed on the connector queue for validation. A connector agent deployed on-premises
then retrieves user credentials and performs authentication against the locally deployed Active Directory.
Response from Active Directory is returned to the connector and the connector provides this response to
Azure AD. To enable Azure AD pass-through authentication:
●● Run the Azure AD Connect Setup Wizard
●● On the User Sign-in page, you should select the Pass-through authentication option
The first connector for pass-through authentication is deployed on the same server where Azure AD
Connect runs. However, it is recommended that you deploy an additional connector on at least one more
server to achieve load balancing between the set of available connectors for both high availability and
redundancy. For other servers, you can download the Azure AD Application Proxy Connector as a sepa-
rate installation.
In addition, you should ensure that all ports required for Azure AD pass-through authentication are
available, as listed in the table below.
Port Description
80 Enables outbound HTTP traffic for security
validation such as SSL certificate revocation lists.
443 Enables user authentication against Azure AD.
8080/443 Enables the Connector bootstrap sequence and
Connector automatic update.
9090 Enables Connector registration (required only for
the Connector registration process).
9091 Enables Connector trust certificate automatic
renewal.
9352, 5671 Enables communication between the Connector
and the Azure AD service for incoming requests.
9350 [Optional] Enables better performance for incom-
ing requests.
10100–10120 Enables responses from the connector back to
Azure AD.
MCT USE ONLY. STUDENT USE PROHIBITED 38 Module 2 Planning and Implementing Identity Synchronization
Additional reading. For more information, see User sign-in with Azure AD Pass-through Authentica-
tion6.
Let's play a quick game to test your knowledge of planning for Azure AD Connect. Click on the button
below to open this review activity full screen.
LAUNCH ACTIVITY7
6 https://aka.ms/lusqtt
7 https://edxinteractivepage.blob.core.windows.net/miltstatic/MS100.3/20190329-071223255/static/CLD273x_M02_L02_flash_PlanADcon-
necttutorial.html
MCT USE ONLY. STUDENT USE PROHIBITED
Implementing Azure AD Connect 39
Let's play a quick game to test your knowledge of implementing Azure AD Connect. Click on the button
below to open this review activity full screen.
LAUNCH ACTIVITY8
8 https://edxinteractivepage.blob.core.windows.net/miltstatic/MS100.3/20190329-071223255/static/CLD273x_M02_L03_tile_ImpADconnect-
tutorial.html
MCT USE ONLY. STUDENT USE PROHIBITED
Managing Synchronized Identities 41
After the synchronization completes, Microsoft 365 groups will appear in the on-premises container that
you selected during the configuration, and they will be represented as distribution groups in on-premises
Active Directory.
Note: The Group writeback feature does not involve security groups or distribution groups.
The synchronized groups will not show up in your on-premises Exchange Global Address List immediate-
ly, but you can use either of the following cmdlets to make them available quickly:
●● Run the Update-Recipient cmdlet
●● Run either the Update-AddressList or Update-GlobalAddressList cmdlet to force the synchronized
groups to appear; however, these cmdlets will require more cycles on the servers running Exchange
Server.
Synchronized groups from Azure AD to on-premises Active Directory also includes group membership if
the user accounts are created in your Active Directory. User accounts created in Azure AD are not
included. The name attribute of the synchronized groups is filled with the ObjectGUID attribute instead of
a humanly-readable name.
Additional reading. For more information, see the following article on how to enable group writeback
in Azure AD Connect9.
9 https://technet.microsoft.com/en-us/library/mt668829(v=exchg.150).aspx
MCT USE ONLY. STUDENT USE PROHIBITED
Managing Synchronized Identities 43
Let's play a quick game to test your knowledge of managing synchronized identities. Click on the button
below to open this review activity full screen.
MCT USE ONLY. STUDENT USE PROHIBITED 44 Module 2 Planning and Implementing Identity Synchronization
LAUNCH ACTIVITY10
10 https://edxinteractivepage.blob.core.windows.net/miltstatic/MS100.3/20190329-071223255/static/CLD273x_M02_L04_cw_SynchIdentities-
tutorial.html
MCT USE ONLY. STUDENT USE PROHIBITED
Non-Graded Practice Lab 2 45
11 https://openedx.microsoft.com/courses/course-v1:Microsoft+MS-100.3+2018_T3/info
MCT USE ONLY. STUDENT USE PROHIBITED
Module 3 Planning and Implementing Feder-
ated Identities
Let’s examine Claims-based authentication and Federated Trusts for a more in-depth understanding of
how these principles provide the basis for AD FS and SSO.
Claims-based authentication
When you consider identities such as Integrated Windows authentication, Kerberos authentication, or NT
LAN Manager (NTLM), you most likely think about Microsoft Windows user accounts and groups. When
you regard identities in Active Server Pages (ASP), such as the ASP.NET membership and roles provider,
you probably think about user names, passwords, and roles. When you determine what the different
authentication mechanisms have in common, you can abstract the individual elements of identity and
access control into two parts:
●● a single, general notion of claims
●● the concept of an issuer or an authority
A claim is a statement that one subject makes about itself or another subject. For example, the statement
can be about a name, identity, key, group, privilege, or capability. Claims are issued by a provider, are
given one or more values, and then packaged in security tokens that are issued by an issuer, commonly
known as a security token service (STS). You can think of a security token as an envelope that contains
claims about a user.
Thinking in terms of claims and issuers is a powerful abstraction that supports several unique ways of
securing your applications. Because claims involve an explicit trust relationship with an issuer, your
application trusts a claim about the current user only if it trusts the entity that issued the claim. Trust is
explicit in the claims-based approach—not implicit as in other authentication and authorization ap-
proaches with which you might be familiar. The following table shows the relationships between security
tokens, claims, and issuers.
The claims-based approach to identity makes it easier for users to sign in using Kerberos authentication
where it makes sense. However, it is just as easy for users to use one or more (perhaps more Inter-
net-friendly) authentication techniques without you having to recode, recompile, or even reconfigure
your applications. You can support almost any authentication method. Some of the more popular
authentication techniques are Kerberos authentication, forms authentication, X.509 certificates, smart
cards, and other information-type cards.
Here are a few situations in which claims-based identity might be the right choice for you.
●● You have web-facing applications that are used by people who do not have accounts in your Active
Directory domain.
●● Your company has merged with another company and you are having trouble authenticating across
two AD DS forests that do not have a trust relationship.
●● You have an application that needs to send email to the authenticating user or an email to their
manager.
Claims-based identity allows you to factor out the authentication logic from individual applications.
Instead of the application determining who the user is, it receives claims that identify the user. Not all
applications support claims, especially older applications. The support for claims-based authentication is
not solely with AD FS, but also with the application to consume the claim.
Federated trusts
At this point, you have learned about claims-based identity where the issuer directly authenticates users
to a claims-based application. However, you can take this one step further. You can expand your issuer’s
capabilities to accept a security token from another issuer, instead of requiring the user to authenticate
directly. Your issuer would issue security tokens and accept security tokens from other issuers that it
trusts. This enables you to federate identity with other realms, which are separate security domains. In
other words, a federation trust is the embodiment of a business-level agreement of partnership between
two organizations.
since the credentials are managed by the partner organization. You reconfigure one issuer and many
downstream applications become accessible to many new users. Additionally, if a partnership needs to be
terminated, it can be performed with a single trust policy change. Without AD FS, individual accounts for
each partner user would need to be deactivated.
Another feature of claims-based identity is that it enables you to decentralize authentication. Instead of
having your issuer authenticate remote users directly, you can set up a trust relationship with an issuer
from a separate company. Therefore, they would continue using the same SSO mechanism they have
always used in their company. In addition, your application still works because it continues to receive the
same security token it needs.
In summary, because of the federation trust, an application in the resource organization only accepts
security tokens that are signed by an issuer the resource federation server trusts. Remote users cannot
receive access if they try to send a token from their local issuer directly to the resource application.
MCT USE ONLY. STUDENT USE PROHIBITED
Introduction to Federated Identities 51
Additional reading. For more information, see the following article on Understanding Federation
Trusts1.
Overview of AD FS
Active Directory Federation Services (AD FS) provides the infrastructure that enables your users to
authenticate to multiple, related Web applications over the life of a single online session. With Microsoft
365 and Azure AD Connect installed, AD FS enables users to authenticate through their well-known
on-premises credentials in Active Directory, and then use an account in Microsoft 365 without requiring
any further authentication prompts, which is known as single-sign on (SSO).
When you implement AD FS, all password management and password policies are maintained by your
on-premises Active Directory Domain Services.
1 https://technet.microsoft.com/en-us/library/cc770993(v=ws.11).aspx
MCT USE ONLY. STUDENT USE PROHIBITED 52 Module 3 Planning and Implementing Federated Identities
The security token contains claims about the user, such as user name, group membership, user principal
name (UPN), email address, manager details, and phone number. The configuration of the federation
trust decides how to use these claims and how to make appropriate authorization decisions. The applica-
tion does not make authentication decisions, as these are made by your local Active Directory.
The trust between the parties is managed through certificates. While the certificates used for security
token signing and encryption can be self-signed by the AD FS server, typically HTTPS communications
between the issuer and the consuming application or service requires a public key infrastructure (PKI). A
primary example of this is AD FS as the issuer and Office 365 as the consuming application or service.
Let's play a quick game to test your knowledge of federated identities. Click on the button below to open
this review activity full screen.
LAUNCH ACTIVITY2
2 https://edxinteractivepage.blob.core.windows.net/miltstatic/MS100.3/20190329-071223255/static/CLD273x_M03_L01_match_FedIdentiti-
estutorial.html
MCT USE ONLY. STUDENT USE PROHIBITED
Planning an AD FS Deployment 55
Planning an AD FS Deployment
Lesson Introduction
Since Active Directory Federation Services (AD FS) requires some detailed configuration settings, network
connections, and server hardware, it is important that you plan the implementation carefully.
In this lesson, you will learn the key questions you need to ask to plan a successful AD FS implementation
for your organization.
After this lesson, you will be able to:
●● Plan an AD FS environment including best practices, high availability, and capacity planning.
●● Plan Active Directory Federation Services in Microsoft Azure
●● Identify requirements for an AD FS deployment.
Planning an AD FS deployment
ADFS Requirements
Let's play a quick game to test your knowledge of planning an AD FS deployment. Click on the button
below to open this review activity full screen.
LAUNCH ACTIVITY3
3 https://edxinteractivepage.blob.core.windows.net/miltstatic/MS100.3/20190329-071223255/static/CLD273x_M03_L02_fill_PlanADFStutorial.
html
MCT USE ONLY. STUDENT USE PROHIBITED
Implementing AD FS 57
Implementing AD FS
Lesson Introduction
As an administrator in your organization, you need to manage federation services as well as identity
management. This includes properly installing and configuring the AD FS environment.
In this lesson, you will examine various administrative tasks that must be performed to successfully
deploy AD FS, including installing and configuring AD FS, Web Application Proxy (WAP) for AD FS, and
Azure AD Connect for Microsoft 365. Additionally, it is important that you know how to troubleshoot
your AD FS environment.
After this lesson, you will be able to:
●● Install and configure an AD FS environment
●● Install and configure a Web Application Proxy for AD FS
●● Configure AD FS by using Azure AD Connect
●● Switch between federated authentication and password sync
●● Troubleshoot your AD FS environment
The Azure AD Connect wizard guides you through the next steps for directory synchronization, which you
already covered in the prior module. We will skip these steps in this topic.
Back at the Azure AD Connect Configuration for Federation Services, you can see the AD FS farm screen
in the wizard. You should then perform the following steps:
1. Choose between Configure a new AD FS farm and Use an existing AD FS farm. if this is your first
AD FS farm, select Configure a new AD FS farm. If you choose Use an existing AD FS farm, you are
taken directly to the Configuring the trust relationship between AD FS and Azure AD page.
MCT USE ONLY. STUDENT USE PROHIBITED 60 Module 3 Planning and Implementing Federated Identities
2. Specify your SSL certificate to secure the communication between clients and AD FS. To do this, there
are two options available:
●● Provide a password-protected PFX certificate file. Choose this option if Azure AD Connect
should store the PFX file locally. Ensure that a strong password has been used to protect the
certificate.
●● Use a certificate installed on the federation servers. Select this option if your SSL certificate
with the private key is present on each AD FS and AD FS proxy server selected for configuration.
3. If password authentication is not a strong enough security measure for your organization, you should
consider the second option (use a certificate installed on the federation servers) for your productive
AD FS deployment.
4. At the AD FS servers screen, type a server name or IP address to add your AD FS servers to your
configuration.
5. The next page lets you add the Web Application Proxy servers. Proceed as in the last step and select
your WAP servers.
6. Enter your Domain Administrator credentials to enable Azure AD Connect to perform the configu-
ration of federation services, such as adding a SPN record, and other configurations.
7. In the AD FS service account step, you have three options that control how to configure the AD FS
service account:
●● Create a group Managed Service Account. Specify your enterprise admin credentials to create
the necessary KDS root key.
●● Use an existing group Managed Service Account. Type in your existing gMSA account name,
such as ADATUM\adfs_gmsa$.
●● Use a domain user account. Type in your existing domain user account and password.
8. Select your Azure AD Domain to federate with your on-premises directory from the drop-down
menu. Azure AD Connect provides you with the necessary information to verify an unverified domain.
This step is required to ensure that your organization owns the custom domain name. Sign in to your
domain name registrar to update the DNS zone file for the domain by adding the DNS entry provided
to you by Azure AD Connect. If you do not have access to update the DNS entry, ask the person or
team who has this access to complete the verification step. The domain will be converted from a
managed domain into a federated domain, and user logons will be disrupted during this operation.
This page only allows you to configure a single domain in the initial installation. You can configure
more domains later by running Azure AD Connect again.
9. Click Next.
10. The Ready to configure wizard displays information about the detailed steps that will be performed
if you click Install.
11. The Installation complete page lets you verify the configuration. For this task, you must create both
intranet and extranet DNS records to resolve your federation service, such as sts.adatum.com. Click
Verify and you can see if your configuration was successful.
Note: Please keep in mind that the previous planning aspects and high availability considerations are the
same, even if you are using Azure AD Connect to install and configure your AD FS farm within your
organization.
MCT USE ONLY. STUDENT USE PROHIBITED
Implementing AD FS 61
Troubleshooting AD FS
For example, if you want to switch the domain adatum.com from federated to managed, you should run
the following cmdlet:
Set-MsolDomainAuthentication -DomainName adatum.com -Authentication Managed
Note: The authentication change from federated to managed and vice versa can take up to two hours to
complete; however, once done, your users can login using their on-premises credentials.
After the issues in your AD FS environment are fixed, you can switch back from password hash synchroni-
zation to federation by running the following cmdlet:
Set-MsolDomainAuthentication -DomainName <domain> -Authentication
Federated
MCT USE ONLY. STUDENT USE PROHIBITED 62 Module 3 Planning and Implementing Federated Identities
To permanently switch a domain from federated to managed with password hash synchronization, you
need to convert the domain in Azure AD. This can be done using the following cmdlet on your AD FS
server:
Convert-MsolDomainToStandard -DomainName <domain> -SkipUserConversion
$false -PasswordFile <file> `
where:
●● SkipUserConversion $false. Converts your users in Azure AD from federated to managed. Keep in
mind that user conversion can take some time, depending on the number of users.
●● PasswordFile. Specifies the file where converted users’ user names and temporary passwords are
recorded.
Let's play a quick game to test your knowledge of implementing AD FS. Click on the button below to
open this review activity full screen.
LAUNCH ACTIVITY4
4 https://edxinteractivepage.blob.core.windows.net/miltstatic/MS100.3/20190329-071223255/static/CLD273x_M03_L03_flip_ImpADFStutori-
al.html
MCT USE ONLY. STUDENT USE PROHIBITED
Module 4 Implementing Application and Ex-
ternal Access
Adding an Application
Enterprise developers and software-as-a-service (SaaS) providers can develop commercial cloud services
or line-of-business applications that can be integrated with Azure Active Directory (Azure AD) to provide
secure sign-in and authorization for their services. To integrate an application or service with Azure AD, a
developer must first register the application with Azure AD.
Note: Sometimes the meaning of the term “application” can be misunderstood when used in the context
of Azure AD. An application that has been integrated with Azure AD has implications that go beyond the
software aspect. "Application" is frequently used as a conceptual term, referring to not only the applica-
tion software, but also its Azure AD registration and its role in authentication/authorization “conversa-
MCT USE ONLY. STUDENT USE PROHIBITED 64 Module 4 Implementing Application and External Access
tions” at runtime. By definition, an application can function in a client1 role (consuming a resource), a
resource server2 role (exposing APIs to clients), or even both.
As previously mentioned, any application that wants to use the capabilities of Azure AD must first be
registered in an Azure AD tenant. This registration process involves giving Azure AD details about your
application, such as the URL where it’s located, the URL to send replies after a user is authenticated, the
URL that identifies the app, and so on.
4.
5. When the Create page appears, enter your application's registration information:
●● Name: Enter a meaningful application name
●● Application type:
●● Select Native for client applications4 that are installed locally on a device. This setting is used
for OAuth public native clients5.
●● Select Web app / API for client applications6 and resource/API applications7 that are
installed on a secure server. This setting is used for OAuth confidential web clients8 and public
1 https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-dev-glossary
2 https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-dev-glossary
3 https://portal.azure.com/
4 https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-dev-glossary
5 https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-dev-glossary
6 https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-dev-glossary
7 https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-dev-glossary
8 https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-dev-glossary
MCT USE ONLY. STUDENT USE PROHIBITED
Implementing Applications in Azure AD 65
user-agent-based clients9. The same application can also expose both a client and resource/
API.
●● Sign-On URL: For Web app / API applications, provide the base URL of your app. For example,
http://localhost:31544 might be the URL for a web app running on your local machine. Users
would use this URL to sign in to a web client application.
●● Redirect URL: For Native applications, provide the URL used by Azure AD to return token respons-
es. Enter a value specific to your application, such as http://MyFirstAADApp.
6.
7. Additional reading. For specific examples of web applications and native applications, see the Get
Started section of the Azure Active Directory for developers10 site.
8. When finished, click Create.
After clicking Create, Azure AD assigns a unique Application ID to your application, and you're taken to
your application's main registration page. Depending on whether your application is a web or native
application, different options are provided to add additional capabilities to your application. See the next
section for an overview of consent, and details on enabling additional configuration features in your
application registration (credentials, permissions, enable sign-in for users from other tenants.)
Updating an Application
9 https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-dev-glossary
10 https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-developers-guide
MCT USE ONLY. STUDENT USE PROHIBITED 66 Module 4 Implementing Application and External Access
tions. This section discusses how to modify the configuration of a single-tenant application to make it a
multi-tenant application.
It’s important to note the differences between a single-tenant and multi-tenant application:
●● A single-tenant application is intended for use in one organization. It's typically a line-of-business
(LoB) application written by an enterprise developer. A single-tenant application can only be accessed
by users with accounts in the same tenant as the application registration. As a result, it only needs to
be provisioned in one directory.
●● A multi-tenant application is intended for use in many organizations. Referred to as a software-
as-a-service (SaaS) web application, it's typically written by an independent software vendor (ISV).
Multi-tenant applications must be provisioned in each tenant where users need access. For tenants
other than the one where the application is registered, user or administrator consent is required to
register them. Note that native client applications are multi-tenant by default as they are installed on
the resource owner's device.
Making an application multi-tenant requires both application registration changes, as well as changes to
the web application itself. This information is covered in the following sections.
11 https://portal.azure.com/
MCT USE ONLY. STUDENT USE PROHIBITED
Implementing Applications in Azure AD 67
Removing an Application
Now that we’ve examined how to register an application in Azure AD, let’s look at the flip-side and see
how to remove an application's registration from your Azure AD tenant.
Applications that your organization has registered appear under the My apps filter on your tenant's main
App registrations page. These applications are ones you registered manually through the Azure portal, or
programmatically through PowerShell or the Graph API. More specifically, they are represented by both
an Application and Service Principal object in your tenant.
Additional reading. For more information, see Application Objects and Service Principal Objects16.
Let’s take a moment now and see how to remove both single-tenant and multi-tenant applications.
12 https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-integrating-applications
13 https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-devhowto-multi-tenant-overview
14 https://azure.microsoft.com/documentation/samples/?service=active-directory&term=multi-tenant
15 https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/customize-branding
16 https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-application-objects
17 https://portal.azure.com/
MCT USE ONLY. STUDENT USE PROHIBITED 68 Module 4 Implementing Application and External Access
3. In the left-hand navigation pane, click the Azure Active Directory service, click App registrations,
then find/click the application you want to configure. You are taken to the application's main registra-
tion page, which opens up the Settings page for the application.
4. From the application's main registration page, click Delete.
5. Click Yes in the confirmation message.
18 https://portal.azure.com/
19 http://go.microsoft.com/fwlink/?LinkId=294151
20 https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-application-objects
MCT USE ONLY. STUDENT USE PROHIBITED
Implementing Applications in Azure AD 69
Let's play a quick game to test your knowledge of implementing applications in Azure AD. Click on the
button below to open this review activity full screen.
LAUNCH ACTIVITY21
21 https://edxinteractivepage.blob.core.windows.net/miltstatic/MS100.3/20190329-071223255/static/CLD273x_M04_L01_flash_ImplAppstuto-
rial.html
MCT USE ONLY. STUDENT USE PROHIBITED 70 Module 4 Implementing Application and External Access
22 https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis
23 https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/application-proxy-configure-single-sign-on-with-kcd
24 https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/application-proxy-configure-connectors-with-proxy-servers
MCT USE ONLY. STUDENT USE PROHIBITED
Configuring Azure AD Application Proxy 71
25 https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/application-proxy-connectors
26 https://www.microsoft.com/download/details.aspx?id=41653
MCT USE ONLY. STUDENT USE PROHIBITED 72 Module 4 Implementing Application and External Access
Let's play a quick game to test your knowledge of configuring Azure AD App Proxy. Click on the button
below to open this review activity full screen.
LAUNCH ACTIVITY27
27 https://edxinteractivepage.blob.core.windows.net/miltstatic/MS100.3/20190329-071223255/static/CLD273x_M04_L02_tile_AppProxytutori-
al.html
MCT USE ONLY. STUDENT USE PROHIBITED 74 Module 4 Implementing Application and External Access
●● Azure AD B2B collaboration-invited users can be picked from OneDrive/SharePoint Online sharing
dialog boxes. OneDrive/SharePoint Online-invited users also show up in Azure AD after they redeem
their invitations.
●● To manage external sharing in OneDrive/SharePoint Online with Azure AD B2B collaboration, set the
OneDrive/SharePoint Online external sharing setting to Only allow sharing with external users
already in the directory. Users can go to externally shared sites and pick from external collaborators
that the admin has added. The admin can add the external collaborators through the B2B collabora-
tion invitation APIs.
●●
access to paid Azure AD features, B2B collaboration guest users must be licensed with appropriate Azure
AD licenses.
Specifically:
●● Azure AD Free capabilities are available for guest users without additional licensing.
●● If you want to provide B2B users with access to paid Azure AD features, you must have enough
licenses to support those B2B guest users.
●● An inviting tenant with an Azure AD paid license has B2B collaboration use rights to an additional five
B2B guest users invited to the tenant.
The customer who owns the inviting tenant must be the one to determine how many B2B collaboration
users need paid Azure AD capabilities. Depending on the paid Azure AD features you want for your guest
users, you must have enough Azure AD paid licenses to cover B2B collaboration users in the same 5:1
ratio.
A B2B collaboration guest user is added as a user from a partner company, not an employee of your
organization or an employee of a different business in your conglomerate. A B2B guest user can sign in
with external credentials or credentials owned by your organization.
In other words, B2B licensing is set not by how the user authenticates, but rather by the relationship of
the user to your organization. If these users are not partners, they are treated differently in licensing
terms. They are not considered to be a B2B collaboration user for licensing purposes even if their User-
Type is marked as “Guest.” They should be licensed normally, at one license per user. These users include:
●● Your employees
●● Staff who sign in using external identities
●● An employee of a different business in your conglomerate
Licensing examples
Example #1
A customer wants to invite 100 B2B collaboration users to its Azure AD tenant. The customer assigns
access management and provisioning for all users, but 50 users also require multi-factor authentication
(MFA) and conditional access. This customer must purchase 10 Azure AD Basic licenses and 10 Azure AD
Premium P1 licenses to cover these B2B users correctly. If the customer plans to use Identity Protection
features with B2B users, they must have Azure AD Premium P2 licenses to cover the invited users in the
same 5:1 ratio.
Example #2
A customer has 10 employees who are all currently licensed with Azure AD Premium P1. They now want
to invite 60 B2B users who all require MFA. Under the 5:1 licensing rule, the customer must have at least
12 Azure AD Premium P1 licenses to cover all 60 B2B collaboration users. Because they already have 10
Premium P1 licenses for their 10 employees, they have rights to invite 50 B2B users with Premium P1
features like MFA. In this example, they must then purchase 2 additional Premium P1 licenses to cover the
remaining 10 B2B collaboration users.
The customer who owns the inviting tenant must be the one to determine how many B2B collaboration
users need paid Azure AD capabilities. Depending on which paid Azure AD features you want for your
MCT USE ONLY. STUDENT USE PROHIBITED
Designing Solutions for External Access 77
guest users, you must have enough Azure AD paid licenses to cover B2B collaboration users in the 5:1
ratio.
Current Limitations
Azure Active Directory B2B collaboration is currently subject to the following limitations:
●● Possible double multi-factor authentication. With Azure AD B2B, you can enforce multi-factor
authentication at the resource organization (the inviting organization). The reasons for this approach
are detailed in Conditional access for B2B collaboration users28. If a partner already has multi-factor
authentication set up and enforced, their users might have to perform the authentication once in their
home organization and then again in yours.
●● Instant-on. In the B2B collaboration flows, users are added to the directory and dynamically update
them during invitation redemption, app assignment, and so on. The updates and writes ordinarily
happen in one directory instance and must be replicated across all instances. Replication is completed
once all instances are updated. Sometimes when the object is written or updated in one instance and
the call to retrieve this object is to another instance, replication latencies can occur. If that happens,
click refresh or retry to help. If you are writing an app using Microsoft’s API, then retries with some
back-off is a good, defensive practice to alleviate this issue.
28 https://docs.microsoft.com/en-us/azure/active-directory/b2b/conditional-access
MCT USE ONLY. STUDENT USE PROHIBITED 78 Module 4 Implementing Application and External Access
●●
●● If you have recently modified these settings or assigned the Guest Inviter role to a user, there might
be a 15 to 60 minute delay before the changes take effect.
●● One of the external users that you invited is receiving an error during redemption. Common errors
include:
●● Invitee’s Admin has disallowed EmailVerified Users from being created in their tenant. When
inviting users whose organization is using Azure Active Directory, but where the specific user’s
account does not exist (for example, the user does not exist in Azure AD contoso.com). The
administrator of contoso.com may have a policy in place preventing users from being created. The
user must check with his or her admin to determine if external users are allowed. The external
user’s admin may need to allow Email Verified users in their domain.
MCT USE ONLY. STUDENT USE PROHIBITED
Designing Solutions for External Access 79
●●
●● External user does not exist already in a federated domain. If you are using federation authen-
tication and the user does not already exist in Azure Active Directory, the user cannot be invited.
To resolve this issue, the external user’s admin must synchronize the user’s account to Azure Active
Directory.
Let's play a quick game to test your knowledge of designing solutions for external access. Click on the
button below to open this review activity full screen.
LAUNCH ACTIVITY29
29 https://edxinteractivepage.blob.core.windows.net/miltstatic/MS100.3/20190329-071223255/static/CLD273x_M04_L03_cw_ExtAccesstutori-
al.html