πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-104 Domain 1
Domain 1 β€” Module 2 of 6 33%
2 of 27 overall

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery
Domain 1: Manage Azure Identities and Governance Free ⏱ ~14 min read

Users, Groups & Licenses

Every Azure journey starts with identity. Learn how to create and manage users, organise them into groups, assign licenses, invite external guests, and set up self-service password reset β€” the daily bread of an Azure administrator.

Creating and managing users

β˜• Simple explanation

Creating a user in Entra ID is like issuing a building pass.

On-prem, you’d open Active Directory Users and Computers, right-click an OU, and create a new user. In Entra ID, you do the same thing β€” just in the Azure portal or with PowerShell/CLI. The user gets a username (like alex@techcorp.com), a temporary password, and can immediately sign in to cloud services.

There are two types of users: member users (your employees) and guest users (external people you invite). Members have broader default directory permissions than guests, who get restricted access by default.

User accounts in Entra ID represent identities that can authenticate and be authorised to access resources. Each user has a User Principal Name (UPN), display name, and a set of properties including job title, department, usage location (required for licensing), and authentication methods.

Users can be created through multiple channels: the Azure portal, Microsoft Entra admin center, Microsoft Graph API, PowerShell (Microsoft.Graph module), or Azure CLI. Users can also be synced from on-prem AD DS via Microsoft Entra Connect.

User types: Member users are internal to the organisation. Guest users are external identities invited via B2B collaboration. The user type affects default permissions β€” guests have restricted directory read access compared to members.

Cloud users vs synced users

TypeSourceCreated HowPassword Managed
Cloud-onlyEntra IDPortal, PowerShell, Graph APIIn Entra ID
SyncedOn-prem AD DSMicrosoft Entra ConnectOn-prem (writeback optional)
GuestExternal tenant or emailInvitation (B2B)At their home organisation
Real-world: TechCorp's hybrid identity

TechCorp Solutions has 300 employees in on-prem AD. They installed Microsoft Entra Connect to sync all users to Entra ID. Now every employee has a cloud identity that matches their on-prem account. Password hash sync copies hashes from AD to Entra ID (one-way). With SSPR and password writeback enabled (requires P1), users can reset passwords in the cloud and the new password flows back to on-prem AD.

New contractors are created directly in Entra ID as cloud-only users β€” no need to create them on-prem first.

Working with groups

Groups in Entra ID organise users for easier management. Instead of assigning permissions to 50 individual users, assign them to one group.

Security groups vs Microsoft 365 groups
FeatureSecurity GroupsMicrosoft 365 Groups
Primary purposeAssign permissions (RBAC, app access)Collaboration (shared mailbox, Teams, SharePoint)
Can be used for RBAC?YesYes
Creates shared resources?NoYes (mailbox, calendar, SharePoint site, Teams channel)
Membership typesAssigned, Dynamic (P1)Assigned, Dynamic (P1)
Created byAdmins (or delegated users)Admins or end users (if allowed)

Dynamic groups

Dynamic groups automatically add or remove members based on user attributes. For example: β€œAll users where Department equals Marketing.”

Dynamic groups require Entra ID P1 or P2.

user.department -eq "Marketing" -and user.accountEnabled -eq true
πŸ’‘ Exam tip: Dynamic groups and licensing

A common exam scenario: β€œAutomatically assign Microsoft 365 E5 licenses to all users in the Sales department.” The answer is a dynamic group with group-based licensing. You need Entra ID P1 for dynamic groups.

Watch for trick answers that suggest manually assigning licenses or using Azure Policy (Policy manages Azure resources, not Entra licensing).

Managing licenses

License management in Entra ID controls which users get access to which Microsoft services.

Two ways to assign licenses:

  1. Direct assignment β€” assign a license to a specific user
  2. Group-based licensing β€” assign a license to a group; all members get it automatically

Group-based licensing is the preferred method at scale. Combine it with dynamic groups for fully automated license management.

Important: Users must have a usage location set before you can assign a license. This is because Microsoft services aren’t available in all countries, and licensing agreements vary by region.

Real-world: CloudFirst Labs automates licensing

CloudFirst Labs (50 staff) uses dynamic groups and group-based licensing:

  • A dynamic group catches all users with user.jobTitle -contains "Developer" β†’ assigns Azure DevOps licenses
  • Another catches user.department -eq "Marketing" β†’ assigns Microsoft 365 E3
  • When a new developer joins and HR sets their job title, the license is assigned automatically within minutes

No admin intervention needed. Alex just monitors the license assignment report for errors.

External users (guest access)

External users are invited to your tenant via Microsoft Entra B2B collaboration. They sign in with their own credentials (their home organisation’s identity or a personal Microsoft/Google account) but appear in your directory as guest users.

Key facts for the exam:

  • Guest users have limited directory permissions by default (can’t browse other users/groups unless explicitly allowed)
  • You can restrict who can invite guests (all members, specific admins only, or nobody)
  • Guest invite settings are in: Entra ID β†’ External Identities β†’ External collaboration settings
  • Guests can be assigned RBAC roles on Azure resources just like members
πŸ’‘ Exam tip: Guest user default permissions

By default, guest users in Entra ID cannot enumerate other users and groups in the directory. This is different from member users, who can. If a question asks about restricting guest access to directory data, the answer is usually about the default guest permissions β€” not about creating a separate tenant.

Self-service password reset (SSPR)

SSPR lets users reset their own passwords without calling the helpdesk. This is a significant exam topic.

SSPR configuration checklist:

  1. Enable SSPR β€” for all users, selected groups, or none
  2. Authentication methods β€” choose at least one: mobile app notification, mobile app code, email, mobile phone, office phone, security questions
  3. Number of methods required β€” 1 or 2
  4. Registration β€” require users to register MFA methods at next sign-in
  5. On-prem writeback β€” requires Entra ID P1 + Entra Connect (so the cloud password syncs back to AD DS)
SSPR SettingWhat It Controls
Enabled forAll users, selected groups, or none
Methods required1 or 2 authentication methods
Methods availableMobile app, email, phone, security questions
RegistrationRequire registration at next sign-in
Password writebackSync reset passwords back to on-prem AD (requires P1)
Real-world: TechCorp's SSPR rollout

TechCorp Solutions used to get 40+ password reset calls per week. Alex configured SSPR with these settings:

  • Enabled for all users (phased rollout β€” pilot group first, then everyone)
  • Two methods required: mobile app + phone
  • Password writeback enabled (so on-prem passwords update too)

Result: helpdesk password calls dropped 85% in the first month. The only calls remaining were locked-out accounts that needed admin intervention.

Question

What is the difference between a member user and a guest user in Entra ID?

Click or press Enter to reveal answer

Answer

Member users are internal to the organisation (created in or synced to the tenant). Guest users are external identities invited via B2B collaboration. Members have full default directory permissions; guests have restricted directory access by default.

Click to flip back

Question

What is required before you can assign a license to a user in Entra ID?

Click or press Enter to reveal answer

Answer

The user must have a usage location set. This is a required property because licensing agreements and service availability vary by country/region.

Click to flip back

Question

What Entra ID feature do you need for dynamic group membership?

Click or press Enter to reveal answer

Answer

Microsoft Entra ID P1 (or P2). Dynamic groups use rules based on user attributes to automatically add and remove members. This is a premium feature not available in the free edition.

Click to flip back

Question

What does SSPR password writeback require?

Click or press Enter to reveal answer

Answer

Microsoft Entra ID P1 license AND Microsoft Entra Connect installed and configured. Writeback syncs cloud password resets back to on-premises Active Directory, so hybrid users can reset from the cloud and use the new password on-prem.

Click to flip back

Knowledge check

Knowledge Check

Alex needs to ensure that all new Marketing department employees automatically receive a Microsoft 365 E5 license. What should he configure?

Knowledge Check

TechCorp Solutions has configured SSPR for all users with two authentication methods required. A user reports they can't reset their password. They've only registered their mobile phone. What's the most likely issue?

Knowledge Check

Meridian Financial wants to invite an external auditor to review Azure resources. The auditor should be able to view resources in the Production subscription but NOT browse other users in the Entra ID directory. What should Alex do?

🎬 Video coming soon

← Previous

Microsoft Entra ID: Your Identity Foundation

Next β†’

RBAC: Who Can Do What in Azure

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.