🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-300 Domain 4
Domain 4 — Module 1 of 6 17%
22 of 27 overall

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free
Domain 4: Plan and Automate Identity Governance Free ⏱ ~13 min read

Entitlement Management: Catalogs & Access Packages

Plan entitlements, create and configure catalogs and access packages to streamline how users request and receive access to resources.

What is Entitlement Management?

☕ Simple explanation

Entitlement management is like a restaurant menu system for access.

Imagine a hospital cafeteria. Instead of letting everyone walk into the kitchen and grab whatever they want, you create a menu (catalog) with combo meals (access packages). A “Clinical Researcher Combo” might include access to the research SharePoint, the lab results app, and the data analysis Teams channel — all bundled together.

Staff browse the menu, request what they need, a manager approves it, and the system delivers everything at once. When the project ends, access is automatically cleaned up. No more chasing IT for five separate access requests.

Microsoft Entra Entitlement Management is an identity governance feature that automates access request workflows, access assignments, reviews, and expiration. It uses two core objects:

  • Catalogs — containers that group related resources (groups, apps, SharePoint sites) together for delegation and management
  • Access packages — bundles of resource roles from a catalog that users can request through a self-service portal (myaccess.microsoft.com)

Access packages support approval workflows, automatic assignment based on rules, time-limited access with expiration, and periodic access reviews. This moves organisations from ad-hoc “email IT for access” to governed, auditable, self-service access.

The building blocks

Entitlement management has a clear hierarchy. Understand this and the exam questions become straightforward:

ComponentWhat It IsAnalogy
CatalogContainer that groups resources togetherThe menu
ResourceA group, app, or SharePoint site added to a catalogAn individual ingredient
Access packageA bundle of resource roles users can requestA combo meal
PolicyRules for who can request, approval flow, and expirationThe ordering rules
AssignmentA user’s active access to a packageA served order

Catalogs — organising your resources

A catalog is a container of resources and access packages. Think of it as a boundary for delegation — you can make a department head the catalog owner so they manage their own resources without needing global admin rights.

Key facts about catalogs:

  • The General catalog is created automatically — it’s the default catch-all
  • You can create additional catalogs to separate resources by department, project, or partner
  • Catalog roles: Owner (full control), Reader (view only), Access package manager (create/manage packages), Access package assignment manager (manage assignments)
  • Resources must be added to a catalog before they can be included in access packages
ℹ️ Scenario: Priya creates a Clinical Research catalog

🔐 Priya Sharma at Meridian Health needs to manage access for 200+ clinical researchers across multiple projects. Instead of handling each request individually, she creates a Clinical Research catalog.

She adds these resources to the catalog:

  • Clinical Data Analysts security group (gives access to the data warehouse)
  • Research Portal enterprise app
  • Clinical Studies SharePoint site

She then assigns Dr. Chen (head of research) as a catalog owner. Now Dr. Chen can create access packages and manage assignments without involving IT for every request.

Exam tip: Catalog owners can manage everything in their catalog, but they can’t create new catalogs unless they have the Catalog creator role, the Identity Governance Administrator role, or are a Global Administrator.

Access packages — the combo meals

An access package bundles one or more resource roles from a single catalog. Users request access packages through myaccess.microsoft.com — the self-service portal.

What goes into an access package:

  1. Resource roles — which resources and what level of access (e.g., Member of a group, User role on an app)
  2. Policies — one or more policies that define:
    • Who can request — specific users/groups, all members, connected organisations, or anyone
    • Approval — none, single-stage, or multi-stage approval
    • Expiration — never, specific date, or number of days after approval
    • Access reviews — periodic review of who still needs access
ℹ️ Scenario: Building the Research Analyst access package

🔐 Priya creates an access package called Research Analyst Access in the Clinical Research catalog:

Resource roles included:

  • Clinical Data Analysts group → Member
  • Research Portal app → User
  • Clinical Studies SharePoint → Member

Policy settings:

  • Who can request: Members of the “Research Department” group
  • Approval: Required — first Dr. Chen, then Priya as fallback
  • Expiration: 365 days (researchers must re-request annually)
  • Access review: Every 90 days, reviewed by the user’s manager

Now when a new researcher joins, they go to myaccess.microsoft.com, request the Research Analyst Access package, Dr. Chen approves, and the researcher gets all three resources automatically. After 365 days, access expires unless renewed.

Approval workflows

Access packages support flexible approval:

Approval TypeHow It WorksBest For
No approvalAutomatic — request = instant accessLow-risk resources, internal teams
Single-stageOne approver must approveStandard departmental access
Multi-stageFirst approver → then second approverSensitive resources, compliance-heavy environments

Each stage can have:

  • Specific approvers (named users)
  • Manager as approver (the requestor’s manager)
  • Sponsor as approver (connected org sponsor)
  • Fallback approvers if the primary doesn’t respond within the timeout
💡 Exam tip: Requestor justification

Policies can require a justification from the requestor. This is a free-text field where the user explains why they need access. The justification appears in the approval request and in audit logs — important for compliance.

The exam may test whether justification is required by default (it’s not — you must enable it in the policy).

Automatic assignment policies

Beyond request-based access, you can create automatic assignment policies that grant access based on user attributes — no request needed.

For example: “All users where Department = Research AND jobTitle contains ‘Analyst’ automatically get the Research Analyst Access package.”

This uses the same attribute-based rules as dynamic groups. When a user matches the rule, they get the package. When they no longer match (e.g., they change departments), access is automatically removed.

💡 Exam tip: Automatic vs request-based

An access package can have both automatic assignment policies and request-based policies simultaneously. Automatic policies are great for baseline access, while request-based policies handle exceptions and special cases.

Separation of duties

Entitlement management supports incompatible access packages — you can mark two packages as incompatible so a user can’t hold both simultaneously.

Example: A user can’t have both “Financial Auditor Access” and “Financial Data Entry Access” — that would violate separation of duties.

If a user already has Package A and requests incompatible Package B, the request is blocked.

FeatureCatalogsAccess Packages
PurposeOrganise and delegate resourcesBundle resource roles for request
ContainsResources + access packagesResource roles + policies
Who managesCatalog owners, Global Admin, Identity Governance AdminAccess package managers, catalog owners
User-facingNo — admin concept onlyYes — visible in myaccess.microsoft.com
Limit7,500 per tenant20,000 per tenant

Video Lesson

🎬 Video coming soon

Entitlement Management: Catalogs & Access Packages

Entitlement Management: Catalogs & Access Packages

~10 min

Key Concepts

Question

What is a catalog in entitlement management?

Click or press Enter to reveal answer

Answer

A catalog is a container that groups related resources (groups, apps, SharePoint sites) and access packages together. It enables delegation — a catalog owner can manage their resources without needing Global Admin rights.

Click to flip back

Question

What is an access package?

Click or press Enter to reveal answer

Answer

An access package is a bundle of resource roles from a single catalog that users can request through myaccess.microsoft.com. It includes policies defining who can request, approval flow, expiration, and access reviews.

Click to flip back

Question

Where do users request access packages?

Click or press Enter to reveal answer

Answer

Users request access packages at myaccess.microsoft.com — the self-service My Access portal. They browse available packages, submit requests with justification (if required), and track approval status.

Click to flip back

Question

What is an automatic assignment policy?

Click or press Enter to reveal answer

Answer

An automatic assignment policy grants an access package based on user attributes (like department or job title) without requiring a request. When a user matches the rule, they get access. When they no longer match, access is removed.

Click to flip back

Knowledge Check

Knowledge Check

Priya needs clinical researchers to automatically receive access to the research portal, data warehouse group, and SharePoint site when they join the Research department — without submitting a request. What should she configure?

Knowledge Check

Jake at Coastline Creative wants to bundle access to the Design Tools app, Creative Assets SharePoint site, and the Designers group into a single requestable package. He's already created a catalog with these resources. What should he create next?

Knowledge Check

Meridian Health's compliance team requires that no employee can have both the 'Financial Auditor' and 'Financial Data Entry' access packages at the same time. How should Priya enforce this?


Next up: Access Requests, Terms of Use & External Lifecycle — how to manage the request experience, enforce terms of use, and control the lifecycle of external guest users.

← Previous

Defender for Cloud Apps: Policies & OAuth Governance

Next →

Access Requests, Terms of Use & External Lifecycle

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.