Microsoft Entra ID and Privileged Identity Management
This fourth reflection will be focusing on Microsoft Entra ID. As an intern diving into the world of identity management, learning to use Microsoft Entra ID has been an exciting and insightful experience. My journey began with an introduction to the basics of identity and access management (IAM), setting the stage for understanding how Microsoft Entra ID fits into the broader IT systems.
My initial training involved understanding the core functionalities of Microsoft Entra ID, previously known as Azure Active Directory. I learned about its role in managing users, groups, and devices, as well as its importance in securing access to resources. The first hands-on task was using Privileged Identity Management. This was a foundation in learning how to escalate privileges when needed. There are usually four different roles that I have access to, each requiring a ticket number, a ticket system name and a description of why that privilege is being requested.
As I delved deeper, I explored key features such as Single Sign-On, Multi-Factor Authentication (MFA), and conditional access policies. Implementing SSO allowed me to see firsthand how users could access multiple applications with a single set of credentials. Configuring MFA demonstrated the additional layer of security provided to protect sensitive information. One of the most rewarding aspects was setting up and managing groups for users and devices. This exercise highlighted the efficiency of managing user permissions collectively rather than individually.
Conclusion
Learning to use Microsoft Entra ID has equipped me with a solid foundation in identity and access management. The hands-on experience has prepared me to contribute effectively to any IAM-related projects and onboarding. As I continue my journey, I am excited to apply and expand my skills in real-world scenarios, ensuring secure and efficient identity management for organizations.







Leave a Reply