🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-900 Domain 2
Domain 2 — Module 2 of 8 25%
6 of 28 overall

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit
Domain 2: Microsoft Entra Capabilities Premium ⏱ ~10 min read

Hybrid & External Identities

Most organisations live in two worlds — on-prem and cloud. Learn how hybrid identity bridges them, and how external identities let you collaborate safely with partners and customers.

Why hybrid identity?

☕ Simple explanation

Imagine you have a house key and an office key. Wouldn’t it be easier if one key opened both?

Most organisations have been using Active Directory on their own servers for years. All their user accounts, groups, and passwords live there. Now they also want to use Microsoft 365 and Azure — which live in the cloud and use Entra ID.

Hybrid identity connects these two worlds. Your on-prem accounts get synced to the cloud, so employees use one username and one password to access everything — the office file server AND Teams, Outlook, and SharePoint Online.

Hybrid identity is the model where user identities exist in both on-premises Active Directory Domain Services (AD DS) and Microsoft Entra ID, with synchronisation keeping them aligned.

This is necessary because most established organisations can’t simply abandon their on-prem AD. They have legacy applications, file servers, and infrastructure that depend on it. Hybrid identity lets them extend their existing investment to the cloud without a full migration.

The result: a single, consistent identity for each user across both environments.

How identities get to the cloud

Microsoft provides two tools to synchronise on-prem identities to Entra ID:

ToolWhat It Does
Microsoft Entra ConnectInstalled on a server in your environment. Syncs users, groups, and password hashes from AD DS to Entra ID. The original and most widely deployed sync tool.
Microsoft Entra Cloud SyncA lightweight agent — simpler to deploy, supports multi-forest scenarios. Uses the cloud provisioning service. Best for organisations wanting a less complex setup.

Both tools copy identity information from on-prem to the cloud. The on-prem AD remains the “source of truth” — changes made there flow up to Entra ID.

Three authentication methods for hybrid identity

Once identities are synced, the next question is: where does password verification happen? There are three approaches, and the exam tests all three:

Three ways to handle authentication in a hybrid setup
FeaturePassword Hash Sync (PHS)Pass-Through Auth (PTA)Federation (AD FS)
How it worksA hash of the password hash is synced to Entra IDEntra ID forwards the auth request to an on-prem agent in real timeA federation server (AD FS) handles all authentication on-prem
Where password is verifiedIn the cloud (Entra ID)On-premises (AD DS)On-premises (AD FS)
Requires on-prem infra for authNo — works even if on-prem is offlineYes — agent must be reachableYes — AD FS servers must be available
ComplexityLowestMediumHighest
Best forMost organisations — simple, resilientOrgs that need on-prem password policy enforcementOrgs with existing AD FS or advanced requirements
Microsoft recommendationPrimary recommendationAlternative to PHSOnly if PHS or PTA don't meet requirements

Key exam concept: Microsoft recommends password hash sync as the primary method for most organisations. It’s the simplest, most resilient option — and it enables advanced features like leaked credential detection in Identity Protection.

💡 Exam tip: 'passwords are synced to the cloud' — true or false?

This is a common exam trap. With password hash sync, your actual password is never synced to the cloud. What gets synced is a hash of a hash — a one-way mathematical transformation. Even if someone intercepted the synced data, they couldn’t reverse-engineer your password from it.

If an exam question says “PHS sends passwords to the cloud” — that option is wrong.

💡 Scenario: Raj decides on hybrid auth for Lakewood University

Lakewood University has 5,000 user accounts in on-premises Active Directory. They just bought Microsoft 365 E3. Raj needs to connect the two.

Decision 1: Raj installs Microsoft Entra Connect to sync all 5,000 identities to Entra ID.

Decision 2: He enables password hash sync. Why?

  • Staff and students sign in from home, coffee shops, and campus — cloud-based auth works everywhere
  • If the campus network goes down, cloud authentication still works
  • It’s the simplest to maintain — Raj is a team of one

Professor Chen doesn’t need to know or care. He signs in the same way he always has. Behind the scenes, his identity now works in both worlds.

External identities

Not everyone who needs access to your resources is an employee. Partners, vendors, contractors, and customers need access too — but they shouldn’t need a full account in your directory.

Microsoft Entra External ID handles two distinct scenarios:

B2B collaboration (business-to-business)

B2B lets you invite external users as guests in your tenant. They sign in with their own identity — their company’s Entra ID, a Google account, or even a one-time email passcode.

How it works:

  1. Raj sends a guest invitation to a researcher at a partner university
  2. The researcher accepts and signs in with their own university credentials
  3. Entra ID creates a guest user object in Lakewood’s directory
  4. Raj controls exactly which resources the guest can access
  5. When the project ends, Raj removes the guest

The guest never gets a Lakewood password. Their own organisation manages their credentials.

B2C (business-to-customer)

B2C is for customer-facing applications. It’s a separate Entra ID service that lets customers create accounts and sign in using their social identities (Google, Facebook, Apple) or a local email account.

Think of it as the sign-in experience you see on retail websites: “Sign in with Google” or “Create an account.”

B2B is for partners. B2C is for customers.
FeatureB2B CollaborationB2C (Customer Identity)
Who uses itExternal partners, vendors, contractorsEnd customers, public users
How they sign inWith their own corporate or personal identityWith social accounts (Google, Apple) or local sign-up
Where the guest livesGuest object in your Entra ID tenantSeparate Entra External ID (B2C) tenant
Use casePartner accessing your SharePoint or TeamsCustomer logging into your web app or store
Who manages the identityThe guest's own organisationYou control the sign-up and sign-in experience
💡 Scenario: Sam uses B2B and B2C at BrightStar

B2B use: BrightStar Retail works with a distribution company. Sam invites the distributor’s account manager as a B2B guest so they can view the shared inventory spreadsheet in SharePoint — nothing else.

B2C use: Sam is building an online loyalty programme for customers. Shoppers create an account using their Google login or email address. This uses Entra External ID (B2C) — completely separate from BrightStar’s internal directory.

The distributor’s account manager and the loyalty programme shopper are both external identities — but they use different mechanisms for very different purposes.

When to use each approach

ScenarioSolution
Employees need one identity for on-prem and cloudHybrid identity with Entra Connect + password hash sync
On-prem password policies must be enforced during cloud sign-inHybrid identity with pass-through authentication
Organisation has existing AD FS investment and complex auth rulesFederation with AD FS
External partner needs access to your Teams or SharePointB2B collaboration (guest invitation)
Customers need to sign in to your public web applicationB2C with Entra External ID

🎬 Video walkthrough

🎬 Video coming soon

Hybrid and External Identities — SC-900 Domain 2

Hybrid and External Identities — SC-900 Domain 2

~10 min

Flashcards

Question

What is hybrid identity?

Click or press Enter to reveal answer

Answer

A model where user identities exist in both on-premises Active Directory and Microsoft Entra ID, synchronised by Entra Connect or Cloud Sync. Employees get one username and password for both environments.

Click to flip back

Question

What are the three hybrid authentication methods?

Click or press Enter to reveal answer

Answer

1) Password hash sync (PHS) — hash of hash synced to cloud (recommended). 2) Pass-through authentication (PTA) — auth requests forwarded to on-prem in real time. 3) Federation (AD FS) — on-prem federation server handles all auth. PHS is simplest and most resilient.

Click to flip back

Question

What is the difference between B2B and B2C in Entra ID?

Click or press Enter to reveal answer

Answer

B2B = business partners and guests. They sign in with their own corporate identity and get guest access to your tenant. B2C = customers. They sign in with social accounts or local sign-up to your customer-facing apps. Different audiences, different tenants.

Click to flip back

Question

Does password hash sync send actual passwords to the cloud?

Click or press Enter to reveal answer

Answer

No. It syncs a hash of the password hash — a one-way mathematical transformation. The actual password never leaves the on-premises environment. Even if the synced data were intercepted, the original password cannot be recovered from it.

Click to flip back

Knowledge Check

Knowledge Check

Lakewood University's campus network goes down due to a power outage. Students still need to access Microsoft 365 from home. Which hybrid authentication method will continue to work?

Knowledge Check

Sam needs to give a distribution partner's account manager view access to a single SharePoint folder. The partner already has their own Microsoft 365 tenant. What should Sam use?

Knowledge Check

Which statement about Microsoft Entra Connect is correct?

← Previous

Microsoft Entra ID: Your Identity Hub

Next →

Authentication: Passwords, MFA & Passwordless

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.