🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-104 Domain 1
Domain 1 — Module 1 of 6 17%
1 of 27 overall

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery
Domain 1: Manage Azure Identities and Governance Free ⏱ ~12 min read

Microsoft Entra ID: Your Identity Foundation

Before you manage a single Azure resource, you need to understand identity. Microsoft Entra ID is the identity service that controls who can access what — and it works very differently from the Active Directory you know on-prem.

What is Microsoft Entra ID?

☕ Simple explanation

Think of Entra ID as the security guard at a building entrance — except the building is your entire cloud.

If you’ve worked with Active Directory on-prem, you know it as the thing that lets people log in to their computers and access file shares. Entra ID does the same job, but for cloud services. When someone opens Outlook, Teams, or the Azure portal, Entra ID checks who they are and what they’re allowed to do.

The big difference? On-prem AD uses protocols like Kerberos and LDAP. Entra ID uses modern web protocols like OAuth 2.0 and SAML. It’s built for a world where people log in from phones, home laptops, and coffee shops — not just domain-joined PCs in the office.

Microsoft Entra ID (formerly Azure Active Directory) is Microsoft’s cloud-based identity and access management service. It provides authentication and authorisation for Microsoft 365, Azure, and thousands of third-party SaaS applications.

Entra ID is a multi-tenant, cloud-native identity provider. Unlike Active Directory Domain Services (AD DS), which requires domain controllers, DNS zones, and Group Policy Objects running on Windows Server, Entra ID is a fully managed service — no infrastructure to maintain.

Core capabilities include: user and group management, application registration, conditional access policies, multi-factor authentication (MFA), self-service password reset, and identity governance features like access reviews and Privileged Identity Management.

Active Directory DS vs Microsoft Entra ID

If you’re an on-prem admin, this is the comparison you need. These are not the same product — they solve similar problems in very different ways.

AD DS vs Entra ID — they share a name but not much else
FeatureActive Directory DS (On-Prem)Microsoft Entra ID (Cloud)
Where it runsWindows Server domain controllers you manageMicrosoft-managed cloud service
Authentication protocolsKerberos, NTLMOAuth 2.0, SAML, OpenID Connect, WS-Federation
StructureForests, domains, OUsFlat tenant (no OUs, no forests)
Device managementGroup Policy Objects (GPOs)Intune + Conditional Access
Query languageLDAPMicrosoft Graph API (REST)
ScopeOn-prem network resourcesCloud apps, SaaS, Azure resources, on-prem (with sync)
High availabilityYou manage replication between DCsBuilt-in global redundancy
💡 Exam tip: AD DS and Entra ID can coexist

In the real world (and on the exam), most organisations use both. Microsoft Entra Connect syncs on-prem AD identities to Entra ID, giving users a single identity across on-prem and cloud. This is called hybrid identity.

TechCorp Solutions runs exactly this setup — their 300 employees log in with the same credentials whether they’re accessing the on-prem file server or SharePoint Online. Password hash sync copies hashes from on-prem AD to Entra ID. If you enable SSPR with writeback (P1), cloud password resets also flow back to on-prem AD. The exam tests whether you understand that Entra Connect is the bridge, not a replacement.

Tenants, subscriptions, and Entra ID

Here’s where it clicks for Azure admins:

  • Tenant = one instance of Entra ID. Your organisation gets one when you sign up for any Microsoft cloud service. It’s your identity boundary.
  • Subscription = a billing container for Azure resources. It trusts exactly one Entra ID tenant.
  • Management groups = containers for organising subscriptions (covered in Module 4).

The key relationship: Every Azure subscription trusts one Entra ID tenant. Users in that tenant can be granted access to resources in that subscription via RBAC (covered in Module 3).

Real-world scenario: Meridian Financial's multi-subscription setup

Meridian Financial (5000+ employees) has one Entra ID tenant but twelve Azure subscriptions — Production, Dev, Test, Staging for each of their three business units. All twelve subscriptions trust the same Entra ID tenant, so employees only need one set of credentials. RBAC controls who can access which subscription.

This is a common enterprise pattern the exam expects you to understand.

Entra ID editions

Microsoft offers three main editions. The exam expects you to know what’s included in each:

FeatureFreeP1P2
User and group managementYesYesYes
SSO to SaaS appsYes (limited)UnlimitedUnlimited
Self-service password reset (cloud)YesYesYes
Conditional AccessNoYesYes
Self-service password reset (on-prem writeback)NoYesYes
Microsoft Entra Connect (hybrid sync)YesYesYes
Dynamic groupsNoYesYes
Privileged Identity Management (PIM)NoNoYes
Identity Protection (risk-based CA)NoNoYes
Access reviewsNoNoYes
💡 Exam tip: Know what requires P1 vs P2

The most commonly tested distinction: Conditional Access requires P1. PIM and Identity Protection require P2. If a scenario says “you need to require MFA only when users sign in from outside the office,” that’s Conditional Access — which means P1.

Alex, our admin, learned this the hard way — he tried to set up Conditional Access on a free tenant and couldn’t find the menu option.

What lives inside an Entra ID tenant

Your tenant contains more than just users:

  • Users — cloud-only or synced from on-prem AD
  • Groups — security groups, Microsoft 365 groups, dynamic groups
  • App registrations — your custom applications that use Entra for auth
  • Enterprise applications — SaaS apps integrated via SSO
  • Devices — registered, joined, or hybrid-joined devices
  • Roles — Entra ID roles (Global Administrator, User Administrator, etc.)
Question

What is a tenant in Microsoft Entra ID?

Click or press Enter to reveal answer

Answer

A tenant is a dedicated, trusted instance of Entra ID that an organisation receives when they sign up for a Microsoft cloud service. It represents the organisation and contains all their users, groups, apps, and devices. Each tenant is isolated from other tenants.

Click to flip back

Question

What protocol does Entra ID use for authentication — Kerberos or OAuth 2.0?

Click or press Enter to reveal answer

Answer

OAuth 2.0 (along with SAML, OpenID Connect, and WS-Federation). Kerberos is used by on-prem Active Directory Domain Services. Entra ID is built for cloud and web-based authentication.

Click to flip back

Question

Which Entra ID edition is required for Conditional Access policies?

Click or press Enter to reveal answer

Answer

Microsoft Entra ID P1. Conditional Access is not available in the free edition. P2 adds Identity Protection (risk-based Conditional Access) and PIM.

Click to flip back

Question

Can an Azure subscription be associated with more than one Entra ID tenant?

Click or press Enter to reveal answer

Answer

No. An Azure subscription trusts exactly one Entra ID tenant at a time. However, one tenant can have multiple subscriptions. A subscription can be transferred to a different tenant, but it can only trust one at a time.

Click to flip back

Knowledge check

Knowledge Check

TechCorp Solutions is migrating from on-prem Active Directory to a hybrid setup. Their IT manager asks Alex: 'Will our existing Group Policy Objects work in the cloud?' What should Alex tell them?

Knowledge Check

Meridian Financial has 12 Azure subscriptions and one Entra ID tenant. A new developer needs access to only the Dev subscription. Where is the developer's identity created?

Knowledge Check

CloudFirst Labs wants to set up risk-based Conditional Access that blocks sign-ins when a user's account shows signs of compromise. Which Entra ID edition do they need?

🎬 Video coming soon

Next →

Users, Groups & Licenses

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.