{"id":4123,"date":"2018-12-20T22:30:48","date_gmt":"2018-12-20T22:30:48","guid":{"rendered":"https:\/\/209.235.70.100\/?p=4123"},"modified":"2020-01-03T22:31:26","modified_gmt":"2020-01-03T22:31:26","slug":"azure-best-practices-account-and-identity-management","status":"publish","type":"post","link":"https:\/\/www.navisite.com\/blog\/azure-best-practices-account-and-identity-management\/","title":{"rendered":"Azure Best Practices: Account and Identity Management"},"content":{"rendered":"\n

Identity and access management in the world of cloud computing is a critical challenge and needs to be handled diligently at both the management and the data levels. As a key player in public cloud computing, Microsoft Azure facilitates centralized identity management using Azure Active Directory (Azure AD). The process of securing an Azure deployment starts at the subscription level.<\/p>\n\n\n\n

This can be expanded to the placement of resource groups, individual resources and their associated access permissions. Organizations that use Microsoft Active Directory Domain Services on-premises can integrate it easily with Azure AD to provide a seamless user access experience while implementing hybrid cloud architectures.<\/p>\n\n\n\n

The benefit here is that users don’t have to remember multiple credentials to access cloud native software as a service applications, or credentials hosted in on-premises data centers. Azure AD enables secure collaboration, single sign-on, and single-plane management capabilities that enhance your existing identity framework.<\/p>\n\n\n\n

As with any other technology, Azure AD should also be configured for optimal use, especially for large-scale deployments. This blog will explore some of the most crucial best practices to ensure an effective Azure AD deployment.<\/p>\n\n\n\n

What is Azure Active Directory (AD)?<\/h3>\n\n\n\n

Put simply, Azure AD<\/a> is an enterprise class multi-tenant Identity-as-a-Service (IDaaS) offering which can be used for identity management of your applications, as well as your infrastructure. It is offered as a complete cloud-based SaaS solution, and all elements of security and high availability are integrated into the offering.<\/p>\n\n\n\n

Azure platform-level access management can be performed only with accounts present in Azure AD. These accounts can be natively created in Azure AD, synchronized from an on-premises Windows Active Directory, or created as guest accounts for third-party collaborators using their public or corporate email IDs.<\/p>\n\n\n\n

The first step in implementing an optimal security policy in Azure is the segregation of resources into logical containers like subscription and resource groups. The next step is a clearly defining who should be given access to what resources, and assigning levels of privileges or roles.<\/p>\n\n\n\n

The most elementary best practice for Azure is providing the least required privileges to authorized users, thereby limiting them exclusively to the resources that they need to access or manage. For example, users in a development team may only require access to the Azure resources related to the project they are working on. The same access principle holds true for the subscription level, the resource-group level and the individual-resource level.<\/p>\n\n\n\n

Azure AD Role-Based Access Control (RBAC)<\/h3>\n\n\n\n

Role-Based Access Control<\/a> (RBAC) was one of the biggest changes in the Azure Resource Manager (ARM) architecture that replaced the classic Azure Service Management (ASM) model. The classic model offered a single co-administrator role \u2013 when assigned at subscription level, this co-admin role provided users full control for all resources in that subscription. There was no fine-grained access control at the resource level.<\/p>\n\n\n\n

In contrast, RBAC comes with several predefined roles \u2013 both generic and resource-specific \u2013 which regulate the level of access for users assigned to that role. The following are the three basic built-in roles that can be used across all resource types:<\/p>\n\n\n\n