πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-305 Domain 1
Domain 1 β€” Module 3 of 7 43%
3 of 30 overall

AZ-305 Study Guide

Domain 1: Design Identity, Governance, and Monitoring Solutions

  • Monitoring & Logging Design
  • Choosing Authentication Methods
  • Designing Identity Management
  • Authorizing Access to Resources
  • Secrets, Keys & Certificates
  • Governance at Scale
  • Compliance & Identity Governance

Domain 2: Design Data Storage Solutions

  • Relational Data: Choosing Your SQL Platform
  • Database Performance & Scalability
  • Database Security & Compliance
  • Cosmos DB & Semi-Structured Data
  • Blob, Data Lake & Azure Files
  • Data Integration & Analytics

Domain 3: Design Business Continuity Solutions

  • Recovery Objectives: RPO, RTO & SLA Free
  • Backup & Recovery for Compute Free
  • Backup for Databases & Unstructured Data Free
  • High Availability for Compute Free
  • High Availability for Data Free

Domain 4: Design Infrastructure Solutions

  • Compute Design: VMs & When to Use Them
  • Container Solutions: AKS, ACI & Container Apps
  • Serverless & Batch Processing
  • Messaging Architecture
  • Event-Driven Architecture
  • API Integration & Caching
  • App Configuration & Automated Deployment
  • Migration Strategy & Assessment
  • Executing Migrations
  • Network Connectivity: Internet & Hybrid
  • Network Security & Performance
  • Load Balancing & Routing

AZ-305 Study Guide

Domain 1: Design Identity, Governance, and Monitoring Solutions

  • Monitoring & Logging Design
  • Choosing Authentication Methods
  • Designing Identity Management
  • Authorizing Access to Resources
  • Secrets, Keys & Certificates
  • Governance at Scale
  • Compliance & Identity Governance

Domain 2: Design Data Storage Solutions

  • Relational Data: Choosing Your SQL Platform
  • Database Performance & Scalability
  • Database Security & Compliance
  • Cosmos DB & Semi-Structured Data
  • Blob, Data Lake & Azure Files
  • Data Integration & Analytics

Domain 3: Design Business Continuity Solutions

  • Recovery Objectives: RPO, RTO & SLA Free
  • Backup & Recovery for Compute Free
  • Backup for Databases & Unstructured Data Free
  • High Availability for Compute Free
  • High Availability for Data Free

Domain 4: Design Infrastructure Solutions

  • Compute Design: VMs & When to Use Them
  • Container Solutions: AKS, ACI & Container Apps
  • Serverless & Batch Processing
  • Messaging Architecture
  • Event-Driven Architecture
  • API Integration & Caching
  • App Configuration & Automated Deployment
  • Migration Strategy & Assessment
  • Executing Migrations
  • Network Connectivity: Internet & Hybrid
  • Network Security & Performance
  • Load Balancing & Routing
Domain 1: Design Identity, Governance, and Monitoring Solutions Premium ⏱ ~18 min read

Designing Identity Management

Managed identities, hybrid identity architecture, and Entra ID editions β€” design an identity management strategy that scales from 50 users to 50,000.

Why identity management design matters

β˜• Simple explanation

If authentication is the front door, identity management is the building directory. It answers: Who works here? What’s their role? How do services talk to each other without sharing keys?

Three design areas: Human identity (users, groups, lifecycle), workload identity (how apps and services authenticate without passwords), and hybrid identity (keeping on-prem AD and cloud Entra ID in sync).

Identity management architecture covers the lifecycle of all identity types in your Azure environment:

  • Managed identities: System-assigned vs user-assigned β€” eliminating credential management for Azure resources
  • Service principals: App registrations for non-Azure workloads that need Entra ID tokens
  • Entra Connect Sync: Synchronisation topology, filtering, writeback capabilities
  • Entra ID editions: Free, P1, P2 β€” feature differences that drive licensing architecture
  • Entra Domain Services: Managed domain controllers for legacy apps that need LDAP/Kerberos without deploying DCs in Azure

Managed identities: the credential-free future

Managed identities let Azure resources authenticate to other Azure services without storing credentials in code, config files, or Key Vault.

System-Assigned vs User-Assigned Managed Identity
FactorSystem-AssignedUser-Assigned
LifecycleTied to the resource β€” created and deleted with itIndependent β€” you create, assign, and delete separately
SharingOne identity per resource β€” cannot shareOne identity can be assigned to multiple resources
Use caseSingle resource needs access to one serviceMultiple resources need the same permissions
RBAC managementRole assignment per resourceRole assignment once, applies to all assigned resources
ExampleA VM that reads from Key Vault10 VMs in a scale set that all access the same Storage account
CleanupAutomatic when resource is deletedManual β€” must delete identity separately

πŸš€ Marcus’s pattern: NovaSaaS’s microservices use user-assigned managed identities grouped by functional boundary:

  • mi-api-backend β€” assigned to all API containers, has access to Cosmos DB and Storage
  • mi-worker-batch β€” assigned to batch processing Functions, has access to Queue Storage and SQL
  • mi-monitoring β€” assigned to monitoring services, has read access to Log Analytics
ℹ️ Design decision: Managed identity vs service principal vs Key Vault secrets

Priority order for workload authentication:

  1. Managed identity β€” best option when the workload runs ON Azure. Zero credential management.
  2. Workload identity federation β€” for workloads outside Azure (GitHub Actions, Kubernetes) that can present a token. No secrets stored.
  3. Service principal with certificate β€” when federation isn’t possible. Certificate is better than secret.
  4. Service principal with secret β€” last resort. Secrets expire and must be rotated.
  5. Connection strings / passwords β€” avoid. If you must, store in Key Vault with short expiry.

Exam pattern: If the scenario says the workload is an Azure service (VM, App Service, Function), managed identity is almost always correct.

Entra Connect Sync: hybrid identity architecture

Synchronisation topology

Entra Connect Sync (formerly Azure AD Connect) synchronises identities from on-premises AD to Entra ID.

TopologyDescriptionWhen to Use
Single forest, single tenantOne AD forest syncs to one Entra tenantMost common β€” single organisation
Multiple forests, single tenantMultiple AD forests sync to one Entra tenantPost-merger, multi-division organisations
Single forest, multiple tenantsOne AD forest syncs to multiple Entra tenantsDev/test isolation (rare, complex)
Staging serverPassive Entra Connect server ready for failoverAll production deployments (HA)

πŸ—οΈ Priya’s challenge: After GlobalTech acquired a smaller company, they have two AD forests. Priya designed multiple forests β†’ single tenant with one Entra Connect Sync server reaching both forests (using multi-forest connector configuration), matching accounts by email address (mail attribute). A staging server provides failover.

Entra Connect Cloud Sync vs Entra Connect Sync

Entra Connect Sync vs Cloud Sync
FactorEntra Connect SyncEntra Connect Cloud Sync
ArchitectureHeavy agent on-prem (Windows Server)Lightweight agent (provisioning agent)
Multi-forestYes β€” full supportYes β€” simpler config
Password writebackYesYes
Group writebackYesLimited
Device writebackYesNo
Exchange hybridFull supportLimited
HA modelStaging server (manual failover)Multiple agents (automatic)
Best forComplex hybrid with Exchange, device syncSimpler sync needs, multi-forest, easier HA
πŸ’‘ Exam tip: Cloud Sync is newer and simpler, but not always the answer

Cloud Sync is Microsoft’s newer, lighter synchronisation tool with automatic HA. However, it doesn’t support all scenarios β€” device writeback and complex Exchange hybrid still require the traditional Entra Connect Sync. If the exam scenario mentions Exchange hybrid or device sync, choose Entra Connect Sync.

Entra Domain Services: LDAP and Kerberos in the cloud

Some legacy applications need LDAP, NTLM, or Kerberos β€” protocols that Entra ID doesn’t speak. Entra Domain Services (Entra DS) provides managed domain controllers in Azure.

ScenarioSolution
Cloud app uses OAuth/OIDC/SAMLEntra ID β€” native cloud identity
Legacy app needs LDAP bind or Kerberos authEntra Domain Services β€” managed DCs
App needs full AD control (custom schema, trusts)Self-managed DCs in Azure VMs

🏦 Elena’s scenario: FinSecure Bank has a legacy risk calculation engine that authenticates via LDAP. Migrating to modern auth would take 18 months. Elena deployed Entra Domain Services as a bridge β€” the app gets LDAP/Kerberos, and identities sync from Entra ID (which syncs from on-prem AD). No domain controllers to manage.

Entra ID editions and licensing

Entra ID Editions
FeatureFreeP1P2
Basic SSO and MFAYes (security defaults)YesYes
Conditional AccessNoYesYes
Dynamic groupsNoYesYes
Self-service password resetCloud users onlyFull (with writeback)Full (with writeback)
Application Proxy (on-prem apps)NoYesYes
Identity Protection (risk-based CA)NoNoYes
PIM (just-in-time admin)NoNoYes
Access ReviewsNoNoYes
Entitlement ManagementNoNoYes
Best forSmall orgs, basic cloud identityMost enterprises β€” CA + dynamic groupsRegulated industries β€” full governance

Design impact: Your Entra ID edition choice constrains your entire identity architecture. If you design Conditional Access into your solution, you need P1. If you design PIM or access reviews, you need P2. Always map features to licensing early.

Knowledge check

Question

When should you recommend a user-assigned managed identity over system-assigned?

Click or press Enter to reveal answer

Answer

When multiple resources need the same set of permissions. A user-assigned identity is created independently and can be assigned to multiple resources (e.g., all VMs in a scale set). System-assigned is one-to-one: one identity per resource, deleted when the resource is deleted.

Click to flip back

Question

What does Entra Domain Services provide that Entra ID doesn't?

Click or press Enter to reveal answer

Answer

LDAP, Kerberos, and NTLM authentication β€” legacy protocols needed by older applications. Entra ID only supports modern protocols (OAuth 2.0, OIDC, SAML). Entra DS provides managed domain controllers without you deploying and managing Windows Server DCs.

Click to flip back

Question

What Entra ID feature requires P2 licensing?

Click or press Enter to reveal answer

Answer

Identity Protection (risk-based Conditional Access), Privileged Identity Management (PIM), Access Reviews, and Entitlement Management all require P2. Standard Conditional Access and dynamic groups only require P1.

Click to flip back

Knowledge Check

πŸš€ NovaSaaS deploys 30 microservices on Azure Container Apps. All services need to read from the same Cosmos DB account and write to the same Storage account. Which identity approach should Marcus recommend?

Knowledge Check

πŸ—οΈ GlobalTech has a legacy HR application that authenticates users via LDAP. The app will take 12 months to modernise. In the meantime, it needs to run in Azure and authenticate against the corporate directory. What should Priya recommend?

🎬 Video coming soon


Next up: Identities are managed β€” now let’s control what they can do β€” Authorizing Access to Resources.

← Previous

Choosing Authentication Methods

Next β†’

Authorizing Access to Resources

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.