Section 1 – Implement an Identity Management Solution – Implement initial configuration of Azure Active Directory

This is the first section of SC-300 study guide and starting with:

  • configure and manage Azure AD directory roles
  • configure and manage custom domains
  • configure and manage device registration options
  • configure delegation by using administrative units
  • configure tenant-wide settings

Configure and manage Azure AD directory roles

Categories of Azure AD roles

Azure AD built-in roles differ in where they can be used, which fall into the following three broad categories.

  • Azure AD-specific roles: These roles grant permissions to manage resources within Azure AD only. For example, User Administrator, Application Administrator, Groups Administrator all grant permissions to manage resources that live in Azure AD.
  • Service-specific roles: For major Microsoft 365 services (non-Azure AD), we have built service-specific roles that grant permissions to manage all features within the service. For example, Exchange Administrator, Intune Administrator, SharePoint Administrator, and Teams Administrator roles can manage features with their respective services. Exchange Administrator can manage mailboxes, Intune Administrator can manage device policies, SharePoint Administrator can manage site collections, Teams Administrator can manage call qualities and so on.
  • Cross-service roles: There are some roles that span services. We have two global roles – Global Administrator and Global Reader. All Microsoft 365 services honor these two roles. Also, there are some security-related roles like Security Administrator and Security Reader that grant access across multiple security services within Microsoft 365. For example, using Security Administrator roles in Azure AD, you can manage Microsoft 365 Defender portal, Microsoft Defender Advanced Threat Protection, and Microsoft Defender for Cloud Apps. Similarly, in the Compliance Administrator role you can manage Compliance-related settings in Microsoft 365 Compliance Center, Exchange, and so on.
The three categories of Azure AD built-in roles

How assign the roles?

Open Azure AD and choose Roles and administrators

Select Application developer. From there You can see permissions for the role.

When You choose assignments, You can add this role for a user.

And choose the designated user.

Assigning to a group

Screenshot of the Roles and administrators page

Restrictions for role-assignable groups

Role-assignable groups have the following restrictions:

  • You can only set the isAssignableToRole property or the Azure AD roles can be assigned to the group option for new groups.
  • The isAssignableToRole property is immutable. Once a group is created with this property set, it can’t be changed.
  • You can’t make an existing group a role-assignable group.
  • A maximum of 400 role-assignable groups can be created in a single Azure AD organization (tenant).

To use Role-assignable groups You need Azure AD Premium P1 license.

Custom domains

The person who creates the tenant is automatically the Global administrator for that tenant. The Global administrator can add additional administrators to the tenant.

Hard-coded limits for Custom domains

  • You can add no more than 5,000 managed domain names.
  • If you set up all of your domains for federation with on-premises Active Directory, you can add no more than 2,500 domain names in each tenant.

Adding a custom domain

When You are adding a custom domain You have the following options for verification:

Or MX

You can also share the DNS-settings via Email to someone who is responsible for the names records.

DNS changes may take up to 72 hours to propagate but rarely they do, most of the time it’s almost instant.

Removing a custom domain

Before you remove a domain name, we recommend that you read the following information:

  • The original contoso.onmicrosoft.com domain name that was provided for your directory when you signed up cannot be removed.
  • Any top-level domain that has subdomains associated with it cannot be removed until the subdomains have been removed. For example, you can’t remove adatum.com if you have corp.adatum.com or another subdomain that uses the top-level domain name. For more information, see the Support article “Domain has associated subdomains” or “You cannot remove a domain that has subdomains” error when you try to remove a domain from Office 365.
  • Have you activated directory synchronization? If so, a domain was automatically added to your account that looks similar to this: contoso.mail.onmicrosoft.com. This domain name can’t be removed.
  • Before you can remove a domain name, you must first remove the domain name from all user or email accounts associated with the domain. You can remove all of the accounts, or you can bulk edit user accounts to change their domain name information and email addresses. For more information, see Create or edit users in Azure AD. Remember to remove:
    • Any user that has the domain in their user name or email address
    • Any mail-enabled group that has the domain in its email address
    • Any application that has the domain as part of its reply URL
  • If you are hosting a SharePoint Online site on a domain name that is being used for a SharePoint Online site collection, you must delete the site collection before you can remove the domain name.

Configure and manage device registration options

The service includes support for iOS, Android, and Windows devices.

Open Devices from Azure portal.

And Device settings.

Note! Enrollment with Microsoft Intune or Mobile Device Management for Office 365 requires Workplace Join. If you have configured either of these services, ALL is selected and the NONE button is disabled.

You can also enforce MFA and set the maximum devices per user.

DNS-records

EntryTypeAddress
enterpriseregistration.contoso.comCNAMEenterpriseregistration.windows.net
enterpriseregistration.region.contoso.comCNAMEenterpriseregistration.windows.net

Administrators for joined devices

When you add users to the following group they will have admin rights to Azure AD joined windows devices but they do not have the ability to manage devices objects in Azure Active Directory

Configure delegation by using administrative units

Using administrative units requires an Azure AD Premium P1 license for each administrative unit administrator, and Azure AD Free licenses for administrative unit members.

Current support for administrative unit scenarios

Administrative unit management

PermissionsGraph/PowerShellAzure portalMicrosoft 365 admin center
Creating and deleting administrative unitsSupportedSupportedNot supported
Adding and removing administrative unit members individuallySupportedSupportedNot supported
Adding and removing administrative unit members in bulk by using CSV filesNot supportedSupportedNo plan to support
Assigning administrative unit-scoped administratorsSupportedSupportedNot supported
Adding and removing administrative unit members dynamically based on attributesNot supportedNot supportedNot supported

User management

PermissionsGraph/PowerShellAzure portalMicrosoft 365 admin center
Administrative unit-scoped management of user properties, passwordsSupportedSupportedSupported
Administrative unit-scoped management of user licensesSupportedNot SupportedSupported
Administrative unit-scoped blocking and unblocking of user sign-insSupportedSupportedSupported
Administrative unit-scoped management of user multifactor authentication credentialsSupportedSupportedNot supported

Group management

PermissionsGraph/PowerShellAzure portalMicrosoft 365 admin center
Administrative unit-scoped management of group properties and membershipSupportedSupportedNot supported
Administrative unit-scoped management of group licensingSupportedSupportedNot supported

Adding AU in Azure

From Azure portal You will open Administrative units and add.

and You have following roles available.

You can add either M365 and security groups or Users to an Administrative unit.

When You add a user to a AU they can access resources inside that Unit.

Limitations

  • Administrative units can’t be nested.
  • Administrative unit-scoped user account administrators can’t create or delete users.
  • A scoped role assignment doesn’t apply to members of groups added to an administrative unit, unless the group members are directly added to the administrative unit. For more information, see Add members to an administrative unit.
  • Administrative units are currently not available in Azure AD Identity Governance.
  • An Azure AD resource can be a member of no more than 30 administrative units.

Administrative units apply scope only to management permissions. They don’t prevent members or administrators from using their default user permissions to browse other users, groups, or resources outside the administrative unit. In the Microsoft 365 admin center, users outside a scoped admin’s administrative units are filtered out. But you can browse other users in the Azure portal, PowerShell, and other Microsoft services.

Configure tenant-wide settings

External collaboration settings

This setting determines whether guests have full access to enumerate all users and group memberships (most inclusive), limited access to other users and memberships, or no access to other users and group memberships including groups they are a member of (most restrictive).

This setting controls who can invite guests to your directory to collaborate on resources secured by your Azure AD, such as SharePoint sites or Azure resources.

Yes means that you can enable self-service sign up for guests via user flows associated with applications in your directory. No means that applications cannot be enabled for self-service sign up by guests and require them to be invited to your directory.

Collaboration settings will affect SPO and OneDrive sharing settings. Example when I add google.com to deny invitations.

And look at the settings from SPO admin portal, I can see it there also.

GAL

You can display external users in your Global Address List (GAL) by either:

  • Inviting users as guests using Azure AD B2B (Recommended)
  • Using GAL Synchronization (Not recommended)

Other properties that are tenant wide

  • Tenant display name
  • View the Country and Region associated with our Tenant
  • View the Location associated with our Tenant
  • View / Edit Notification Language
  • View / Change the Technical contact, add your privacy info, Global privacy contact, and Privacy statement URL
  • Company Branding
  • User settings
  • App and Enterprise application settings

Things to remember

Different Azure AD-specific roles and their permissions.

Roles can be assigned to a user or a group and it’s requires at least Azure AD P1

Hard-coded limits for Custom domains

  • You can add no more than 5,000 managed domain names.
  • If you set up all of your domains for federation with on-premises Active Directory, you can add no more than 2,500 domain names in each tenant.

Custom domain verification can be done with TXT and MX records.

DNS changes may take up to 72 hours to propagate

Device administrators group members will have admin rights to Azure AD joined windows devices but they do not have the ability to manage devices objects in Azure Active Directory

Administrative units:

  • Administrative units can’t be nested.
  • Administrative unit-scoped user account administrators can’t create or delete users.
  • A scoped role assignment doesn’t apply to members of groups added to an administrative unit, unless the group members are directly added to the administrative unit. For more information, see Add members to an administrative unit.
  • Administrative units are currently not available in Azure AD Identity Governance.
  • An Azure AD resource can be a member of no more than 30 administrative units

Tenant wide settings include but not limited to.

  • Tenant display name
  • View the Country and Region associated with our Tenant
  • View the Location associated with our Tenant
  • View / Edit Notification Language
  • View / Change the Technical contact, add your privacy info, Global privacy contact, and Privacy statement URL
  • Company Branding
  • User settings
  • App and Enterprise application settings

Link to main post

Author: Harri Jaakkonen

Leave a Reply

Your email address will not be published. Required fields are marked *