🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-305 Domain 1
Domain 1 — Module 2 of 7 29%
2 of 30 overall

AZ-305 Study Guide

Domain 1: Design Identity, Governance, and Monitoring Solutions

  • Monitoring & Logging Design
  • Choosing Authentication Methods
  • Designing Identity Management
  • Authorizing Access to Resources
  • Secrets, Keys & Certificates
  • Governance at Scale
  • Compliance & Identity Governance

Domain 2: Design Data Storage Solutions

  • Relational Data: Choosing Your SQL Platform
  • Database Performance & Scalability
  • Database Security & Compliance
  • Cosmos DB & Semi-Structured Data
  • Blob, Data Lake & Azure Files
  • Data Integration & Analytics

Domain 3: Design Business Continuity Solutions

  • Recovery Objectives: RPO, RTO & SLA Free
  • Backup & Recovery for Compute Free
  • Backup for Databases & Unstructured Data Free
  • High Availability for Compute Free
  • High Availability for Data Free

Domain 4: Design Infrastructure Solutions

  • Compute Design: VMs & When to Use Them
  • Container Solutions: AKS, ACI & Container Apps
  • Serverless & Batch Processing
  • Messaging Architecture
  • Event-Driven Architecture
  • API Integration & Caching
  • App Configuration & Automated Deployment
  • Migration Strategy & Assessment
  • Executing Migrations
  • Network Connectivity: Internet & Hybrid
  • Network Security & Performance
  • Load Balancing & Routing

AZ-305 Study Guide

Domain 1: Design Identity, Governance, and Monitoring Solutions

  • Monitoring & Logging Design
  • Choosing Authentication Methods
  • Designing Identity Management
  • Authorizing Access to Resources
  • Secrets, Keys & Certificates
  • Governance at Scale
  • Compliance & Identity Governance

Domain 2: Design Data Storage Solutions

  • Relational Data: Choosing Your SQL Platform
  • Database Performance & Scalability
  • Database Security & Compliance
  • Cosmos DB & Semi-Structured Data
  • Blob, Data Lake & Azure Files
  • Data Integration & Analytics

Domain 3: Design Business Continuity Solutions

  • Recovery Objectives: RPO, RTO & SLA Free
  • Backup & Recovery for Compute Free
  • Backup for Databases & Unstructured Data Free
  • High Availability for Compute Free
  • High Availability for Data Free

Domain 4: Design Infrastructure Solutions

  • Compute Design: VMs & When to Use Them
  • Container Solutions: AKS, ACI & Container Apps
  • Serverless & Batch Processing
  • Messaging Architecture
  • Event-Driven Architecture
  • API Integration & Caching
  • App Configuration & Automated Deployment
  • Migration Strategy & Assessment
  • Executing Migrations
  • Network Connectivity: Internet & Hybrid
  • Network Security & Performance
  • Load Balancing & Routing
Domain 1: Design Identity, Governance, and Monitoring Solutions Premium ⏱ ~20 min read

Choosing Authentication Methods

PHS, PTA, or federation? B2B or B2C? Passwordless or traditional MFA? Every Azure architecture starts with an authentication decision — and the wrong one creates technical debt for years.

Why authentication design matters

☕ Simple explanation

Authentication is the front door to your Azure solution. Get it wrong, and either nobody can get in (bad UX) or the wrong people get in (security breach).

The three big questions: How do users prove who they are? (passwords, MFA, passwordless), Where does identity live? (cloud-only, hybrid with on-prem AD), and Who are the users? (employees, partners, customers).

AZ-305 expects you to choose the right authentication topology for a given scenario — considering security requirements, user experience, and infrastructure constraints.

Microsoft Entra ID is the identity platform underpinning all Azure authentication. As an architect, you’re designing the authentication topology — not just enabling features. Key decisions include:

  • Hybrid identity synchronisation: Password Hash Sync (PHS), Pass-Through Authentication (PTA), or Active Directory Federation Services (ADFS)
  • External identity: B2B collaboration (partners accessing your tenant) vs B2C (customers with their own identity)
  • Authentication strength: Legacy passwords + MFA, or modern passwordless (FIDO2, Windows Hello, Authenticator)
  • Conditional Access: Risk-based policies, device compliance, location-based controls

Well-Architected Framework (Security pillar): Authentication is the first gate of Zero Trust. Design for “assume breach” — every authentication request should be verified, regardless of source.

Hybrid identity: connecting on-prem AD to Entra ID

Most enterprises still have on-premises Active Directory. The question isn’t IF to connect them — it’s HOW.

Hybrid Identity Synchronisation Methods
FactorPassword Hash Sync (PHS)Pass-Through Authentication (PTA)Federation (ADFS)
How it worksHash of password hash synced to Entra IDAuth request forwarded to on-prem agent in real-timeAuth redirected to on-prem ADFS farm
On-prem dependency for authNone — Entra handles auth even if on-prem is downYes — needs on-prem agent runningYes — needs ADFS farm running
Infrastructure requiredEntra Connect Sync onlyEntra Connect Sync + PTA agents (2+ for HA)ADFS farm + WAP servers + certificates
Password policiesEntra ID policies (cloud)On-prem AD policies enforcedOn-prem AD policies enforced
Leaked credential detectionYes — Entra ID Protection checks hash against known breachesNo — password never leaves on-premNo — password never leaves on-prem
ComplexityLowMediumHigh
Best forMost organisations — simplest, most resilientOrgs requiring on-prem password policy enforcementOrgs needing advanced federation (smart cards, 3rd-party MFA)

🏗️ Priya’s decision: GlobalTech has 10,000 users on on-prem AD. Priya chose PHS + Seamless SSO because:

  • Cloud auth works even during the data centre migration (on-prem might have downtime)
  • Leaked credential detection catches compromised accounts immediately
  • Lowest infrastructure overhead — no PTA agents or ADFS farms to maintain
💡 Exam tip: PHS is almost always the recommended answer

Microsoft’s official guidance recommends PHS as the primary authentication method for most scenarios. PTA and ADFS are for specific requirements:

  • PTA: “Our security policy mandates that password hashes never leave our network” (regulatory requirement)
  • ADFS: “We need smart card authentication” or “We use a third-party MFA provider that requires federation”

If the exam scenario doesn’t mention a specific constraint that blocks PHS, choose PHS.

External identity: B2B vs B2C

Not all users are employees. Two distinct patterns for external access:

B2B Collaboration vs B2C Identity
FactorEntra ID B2BEntra External ID (B2C)
Who are the users?Partners, vendors, contractors — people with their own org identityConsumers, customers — people with personal accounts
Identity sourceGuest's home tenant, Google, Microsoft account, email OTPLocal accounts, social providers (Google, Facebook, Apple)
DirectoryGuest objects in YOUR tenantSeparate B2C tenant/directory
App registrationApps registered in your tenantApps registered in B2C tenant
BrandingYour tenant's sign-in pageFully customisable sign-in flows (user journeys)
ScaleThousands of partnersMillions of consumers
LicensingFree for first 50K MAU, then per-MAUFree for first 50K MAU, then per-MAU
Best forSharePoint sharing, Teams collaboration, Azure portal access for partnersCustomer-facing apps, e-commerce, SaaS platforms

🚀 Marcus’s architecture: NovaSaaS has two external identity needs:

  • B2B: Partner companies who integrate with NovaSaaS’s API — invited as guests, access the partner portal via their own corporate identity
  • B2C: End customers who sign up for the SaaS product — use Entra External ID with social logins (Google, Microsoft) + local email accounts

Passwordless authentication

The future of authentication. AZ-305 expects you to know when to recommend each method.

Passwordless Authentication Methods
MethodFIDO2 Security KeysWindows Hello for BusinessMicrosoft Authenticator (Passwordless)
Form factorPhysical USB/NFC keyBuilt into Windows device (biometric/PIN)Phone app push notification
Works onAny device with USB/NFC + browser supportWindows 10/11 devices onlyiOS/Android phone required
Phishing resistant?Yes — hardware-bound, origin-verifiedYes — device-bound, TPM-backedPartially — number matching helps, but phone-based
Best forShared workstations, kiosks, high-security environmentsCorporate-managed Windows devicesBYOD, mobile workforce, broad rollout
Infrastructure needsKey purchasing + registrationWindows Hello provisioning, TPMAuthenticator app deployment
💡 Exam tip: Phishing-resistant MFA

AZ-305 increasingly tests awareness of phishing-resistant authentication. Traditional MFA (SMS, phone call) can be intercepted via SIM-swap or social engineering. FIDO2 and Windows Hello for Business are hardware/device-bound and verify the origin of the authentication request — making phishing nearly impossible. If a scenario mentions “high security” or “prevent credential phishing,” recommend FIDO2 or Windows Hello.

Conditional Access: context-aware authentication

Conditional Access policies are the engine of Zero Trust authentication. They evaluate signals (user, device, location, risk) and enforce controls (allow, block, require MFA, require compliant device).

Design patterns

PatternSignalsControlExample
Risk-based MFASign-in risk (Entra ID Protection)Require MFA when risk is medium+Unusual travel triggers MFA challenge
Device complianceIntune compliance statusRequire compliant deviceBlock unmanaged devices from sensitive apps
Location-basedNamed locations (IP ranges, countries)Block or require MFA outside trusted locationsAllow office IPs, require MFA from home
App-basedTarget specific cloud appsDifferent controls per appAzure portal requires MFA; Teams allows SSO

🏦 Elena’s layered approach: FinSecure Bank’s Conditional Access design:

  1. All users: MFA required for all cloud apps (baseline)
  2. Admins: Phishing-resistant MFA (FIDO2 only) + compliant device required
  3. External access: Block all countries except operating regions
  4. High-risk sign-ins: Automatic password reset + MFA
ℹ️ Well-Architected Framework connection

Security: Conditional Access is the primary implementation mechanism for Zero Trust “verify explicitly” principle. Every access request is evaluated against multiple signals.

Reliability: Design Conditional Access with “break glass” emergency access accounts excluded from all policies. If your MFA provider goes down, you still need admin access.

User Experience (Operational Excellence): Overly aggressive CA policies create friction. Use risk-based policies to challenge only when the signal warrants it — not every single sign-in.

Knowledge check

Question

What is the Microsoft-recommended hybrid identity synchronisation method for most organisations?

Click or press Enter to reveal answer

Answer

Password Hash Sync (PHS). It's the simplest, most resilient option — auth works even if on-prem is down, and it enables leaked credential detection. PTA and ADFS are for specific regulatory or technical requirements.

Click to flip back

Question

When should you recommend Entra External ID (B2C) instead of B2B?

Click or press Enter to reveal answer

Answer

B2C is for consumer-facing applications where customers sign up with personal/social identities at scale (millions of users). B2B is for partner collaboration where guests use their own organisational identity. Key signal: if users are CUSTOMERS (not partners), it's B2C.

Click to flip back

Question

Which passwordless methods are considered phishing-resistant?

Click or press Enter to reveal answer

Answer

FIDO2 security keys and Windows Hello for Business. Both are hardware/device-bound and verify the origin of the authentication request. Microsoft Authenticator with number matching is strong but not fully phishing-resistant since it's phone-based.

Click to flip back

Knowledge Check

🏗️ GlobalTech is migrating 10,000 users to Azure. Their security team requires that password hashes never leave the corporate network, and they need real-time enforcement of on-premises password policies. Which hybrid identity approach should Priya recommend?

Knowledge Check

🚀 NovaSaaS needs to let partner companies access their API portal using their own corporate credentials, while also allowing consumer customers to sign up with Google or email accounts. Which combination should Marcus recommend?

🎬 Video coming soon


Next up: Authentication tells you WHO someone is. Now let’s design HOW identities are managed — Designing Identity Management.

← Previous

Monitoring & Logging Design

Next →

Designing Identity Management

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.