🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-900 Domain 2
Domain 2 — Module 10 of 11 91%
17 of 26 overall

AZ-900 Study Guide

Domain 1: Describe Cloud Concepts

  • What is Cloud Computing? Free
  • Cloud Models: Public, Private, and Hybrid Free
  • Cloud Pricing: Consumption, Serverless, and Pay-as-You-Go Free
  • High Availability and Scalability Free
  • Reliability, Security, and Manageability Free
  • IaaS, PaaS, and SaaS Explained Free
  • Choosing the Right Cloud Service Free

Domain 2: Describe Azure Architecture and Services

  • Azure Regions, Zones, and Datacenters
  • Resources, Resource Groups, and Subscriptions
  • Azure Virtual Machines
  • Azure Compute: Containers, Functions, and App Service
  • Azure Networking: VNets, Subnets, and Peering
  • Connecting to Azure: VPNs, ExpressRoute, and DNS
  • Azure Storage Services
  • Data Migration: Moving to Azure
  • Microsoft Entra ID: Your Identity Hub
  • Authentication and External Identities
  • Azure Security: RBAC, Zero Trust, and Defender

Domain 3: Describe Azure Management and Governance

  • What Affects Your Azure Bill
  • Pricing Calculators: TCO and Azure Pricing
  • Cost Management and Tags
  • Azure Governance: Purview, Policy, and Locks
  • The Azure Portal and Cloud Shell
  • Infrastructure as Code: ARM, Bicep, and Arc
  • Azure Advisor and Service Health
  • Azure Monitor: Logs, Alerts, and Insights

AZ-900 Study Guide

Domain 1: Describe Cloud Concepts

  • What is Cloud Computing? Free
  • Cloud Models: Public, Private, and Hybrid Free
  • Cloud Pricing: Consumption, Serverless, and Pay-as-You-Go Free
  • High Availability and Scalability Free
  • Reliability, Security, and Manageability Free
  • IaaS, PaaS, and SaaS Explained Free
  • Choosing the Right Cloud Service Free

Domain 2: Describe Azure Architecture and Services

  • Azure Regions, Zones, and Datacenters
  • Resources, Resource Groups, and Subscriptions
  • Azure Virtual Machines
  • Azure Compute: Containers, Functions, and App Service
  • Azure Networking: VNets, Subnets, and Peering
  • Connecting to Azure: VPNs, ExpressRoute, and DNS
  • Azure Storage Services
  • Data Migration: Moving to Azure
  • Microsoft Entra ID: Your Identity Hub
  • Authentication and External Identities
  • Azure Security: RBAC, Zero Trust, and Defender

Domain 3: Describe Azure Management and Governance

  • What Affects Your Azure Bill
  • Pricing Calculators: TCO and Azure Pricing
  • Cost Management and Tags
  • Azure Governance: Purview, Policy, and Locks
  • The Azure Portal and Cloud Shell
  • Infrastructure as Code: ARM, Bicep, and Arc
  • Azure Advisor and Service Health
  • Azure Monitor: Logs, Alerts, and Insights
Domain 2: Describe Azure Architecture and Services Premium ⏱ ~12 min read

Authentication and External Identities

SSO, MFA, passwordless, B2B, B2C, and Conditional Access — Azure offers multiple ways to verify identity and control access. Here's how they work together.

How does Azure verify who you are?

☕ Simple explanation

Think of three levels of security at an airport.

Password (single factor) = showing your boarding pass. Anyone who has your pass could board your flight.

MFA (multi-factor) = showing your boarding pass AND your passport. Even if someone steals your pass, they can’t get through without your passport.

Passwordless = biometric scanning. No pass needed — your fingerprint or face IS your identity. Faster AND more secure.

SSO (Single Sign-On) = one security check at the entrance gets you into all the airport shops, lounges, and gates. You don’t show your ID at every door.

Conditional Access = the security rules change based on context. If you’re a known frequent flyer, you get fast-tracked. If you’re flagged as suspicious, you get extra screening.

Azure and Entra ID support multiple authentication methods:

Single sign-on (SSO) authenticates users once, then provides access to multiple applications without re-entering credentials. Reduces password fatigue and improves security.

Multi-factor authentication (MFA) requires two or more verification factors: something you know (password), something you have (phone/token), or something you are (biometrics). Blocks 99.9% of account compromise attacks.

Passwordless authentication eliminates passwords entirely, using Windows Hello (biometrics), FIDO2 security keys, or the Microsoft Authenticator app. More secure than passwords because there’s nothing to steal, guess, or phish.

Conditional Access policies evaluate signals (user, device, location, risk level) and enforce access decisions (allow, block, require MFA).

Authentication methods

Single sign-on (SSO)

SSO lets users sign in once and access multiple applications:

Without SSOWith SSO
Sign in to Azure portal (password)Sign in once to Entra ID
Sign in to Microsoft 365 (another password)✅ Azure portal — no additional sign-in
Sign in to Salesforce (yet another password)✅ Microsoft 365 — no additional sign-in
Sign in to ServiceNow (different password)✅ Salesforce — no additional sign-in
4 passwords to remember✅ ServiceNow — no additional sign-in

Benefits: Fewer passwords to remember, fewer help desk calls for password resets, better security (users don’t write passwords on sticky notes).

Multi-factor authentication (MFA)

MFA requires two or more verification factors from different categories:

Factor TypeCategoryExamples
Something you knowKnowledgePassword, PIN
Something you havePossessionPhone, security key, authenticator app
Something you areInherenceFingerprint, face recognition

Why MFA matters: Microsoft reports that MFA blocks 99.9% of automated account attacks. Even if a password is stolen, the attacker can’t get past the second factor.

Peak Roasters requires MFA for all 15 staff. When logging in, employees enter their password (knowledge) and approve a push notification on their phone (possession).

Passwordless authentication

Passwordless is the most secure option — no password to steal, phish, or guess:

MethodHow It Works
Windows Hello for BusinessFace recognition or fingerprint on your device
Microsoft AuthenticatorApprove a sign-in request on your phone
FIDO2 security keysPhysical USB/NFC key you tap to authenticate
ℹ️ Why passwordless is more secure than passwords + MFA

Passwords are the weakest link in authentication:

  • They can be guessed, stolen, phished, or brute-forced
  • Users reuse passwords across sites
  • Even with MFA, the password is still a target

Passwordless eliminates the password entirely. With Windows Hello, your biometrics never leave the device — they’re stored in a hardware security chip. There’s nothing for an attacker to steal remotely.

External identities

Azure supports identities beyond your own organisation:

B2B vs B2C external identities
FeatureB2B (Business-to-Business)B2C (Business-to-Consumer)
WhoPartners, contractors, vendorsCustomers, public users
They useTheir OWN identity (work email, Google, etc.)Social accounts (Google, Facebook) or local accounts
Access toYour organisation's apps and resourcesYour customer-facing applications
Managed inYour Entra ID tenant (as guest users)A separate B2C tenant
ExampleContractor accesses SharePoint with their GmailCustomer signs into your app with their Google account

Harbour Health’s B2B scenario: External specialists need access to patient case files. Rather than creating new accounts, Harbour Health invites them as B2B guest users — the specialists sign in with their own hospital’s credentials.

Conditional Access

Conditional Access policies are if-then rules that evaluate signals and enforce decisions:

Signal (IF) → Decision (THEN)

SignalExample
User or group”All managers” or “Marketing team”
Location”Outside the office network”
Device”Unmanaged personal device”
Application”Azure portal” or “HR system”
Risk level”High risk sign-in detected”
DecisionAction
AllowGrant access (possibly with conditions)
BlockDeny access completely
Require MFAAllow access only after MFA verification
Require compliant deviceAllow only from Intune-managed devices

Harbour Health’s Conditional Access policies

PolicySignalDecision
Policy 1Doctors accessing patient records from outside the hospitalRequire MFA + compliant device
Policy 2Any user with high-risk sign-inBlock access, notify security
Policy 3IT admins accessing Azure portalRequire MFA always, even from trusted locations
💡 Exam tip: Conditional Access requires Entra ID P1

Conditional Access is a premium feature — it requires Microsoft Entra ID P1 or P2 licensing. The free tier of Entra ID includes basic authentication and MFA but NOT Conditional Access policies.

If an exam question asks how to enforce location-based or device-based access rules, the answer is Conditional Access (not just MFA alone).

🎬 Video walkthrough

🎬 Video coming soon

Authentication and External Identities — AZ-900

Authentication and External Identities — AZ-900

~10 min

Flashcards

Question

What is single sign-on (SSO)?

Click or press Enter to reveal answer

Answer

Users authenticate once and gain access to multiple applications without re-entering credentials. Reduces password fatigue, help desk calls, and security risks from password reuse.

Click to flip back

Question

What three factor categories does MFA use?

Click or press Enter to reveal answer

Answer

Something you KNOW (password, PIN), something you HAVE (phone, security key), and something you ARE (fingerprint, face). MFA requires at least two different categories.

Click to flip back

Question

What is the difference between B2B and B2C identities?

Click or press Enter to reveal answer

Answer

B2B (Business-to-Business) = external partners/contractors using their OWN credentials to access YOUR resources. B2C (Business-to-Consumer) = customers signing into YOUR apps using social logins or local accounts.

Click to flip back

Question

What is Conditional Access?

Click or press Enter to reveal answer

Answer

If-then policies that evaluate signals (user, location, device, risk) and enforce decisions (allow, block, require MFA). Example: 'If signing in from outside the office, require MFA.' Requires Entra ID P1 or P2.

Click to flip back

Knowledge Check

Knowledge Check

Harbour Health wants to ensure that doctors accessing patient records from personal devices must complete MFA AND use a compliant device. Which Entra ID feature should they configure?

Knowledge Check

Peak Roasters wants external contractors to access their SharePoint site using the contractors' own email credentials. Which Entra ID feature enables this?


Next up: Azure Security — RBAC, Zero Trust, defence-in-depth, and Microsoft Defender for Cloud.

← Previous

Microsoft Entra ID: Your Identity Hub

Next →

Azure Security: RBAC, Zero Trust, and Defender

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.