| Concept | Description | Key Points |
|---|---|---|
| Tenant | Instance of Entra ID for organization | One per organization, has unique ID |
| Directory | Container for users, groups, apps | Flat structure (no OUs) |
| Subscription | Agreement to use Azure services | Linked to one directory, billing boundary |
| Management Group | Container for subscriptions | Hierarchical, policy inheritance |
| Type | Membership | Use Cases |
|---|---|---|
| Security Group | Assigned, Dynamic User, Dynamic Device | RBAC, resource access control |
| Microsoft 365 Group | Assigned, Dynamic User | Collaboration (Teams, SharePoint) |
| Assigned | Manually add/remove members | Static membership |
| Dynamic | Query-based (department = 'IT') | Automatic membership based on attributes |
• Entra ID is flat (no OUs, forests, domains)
• Uses REST API (not LDAP)
• Supports SAML, OAuth, OpenID Connect
• No Group Policy (use Intune instead)
| Component | Description | Example |
|---|---|---|
| Security Principal | Who needs access | User, Group, Service Principal, Managed Identity |
| Role Definition | Collection of permissions | Reader, Contributor, Owner, Custom |
| Scope | Where access applies | Management Group, Subscription, Resource Group, Resource |
| Role Assignment | Attachment of role to principal at scope | User X is Contributor on RG Y |
Management Group → Subscription → Resource Group → Resource
Permissions assigned at parent scope are inherited by child resources.
Role assignments are additive - effective permissions are the combination of all assignments.
| Component | Purpose | Examples |
|---|---|---|
| Policy Definition | Rules for compliance | Allowed locations, Required tags |
| Initiative | Collection of policies | Azure Security Benchmark |
| Assignment | Applies policy to scope | Initiative assigned to subscription |
| Exemption | Exclude resources from policy | Testing resources exempted |
| Lock Type | Can Read | Can Modify | Can Delete |
|---|---|---|---|
| CanNotDelete | Yes | Yes | No |
| ReadOnly | Yes | No | No |
Locks at parent scope apply to all child resources.
Most restrictive lock takes precedence.
Owner or User Access Administrator required to manage locks.