Skip to content

Commit

Permalink
Add files via upload
Browse files Browse the repository at this point in the history
  • Loading branch information
staleycyn authored Nov 30, 2023
1 parent b78c418 commit 3e51a4e
Show file tree
Hide file tree
Showing 2 changed files with 373 additions and 0 deletions.
191 changes: 191 additions & 0 deletions New Instructions/Lab/LAB_01-Manage_Entra_ID_Identities.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,191 @@
---
lab:
title: 'Lab 01: Manage Microsoft Entra ID Identities'
module: 'Administer Identity'
---

# Lab 01 - Manage Microsoft Entra ID Identities

# Student lab manual

## Lab scenario

Your organization is building out a new lab environment for pre-production testing of apps and services. A few engineers are being hired to manage the lab environment, including the virtual machines. In order to allow the engineers to authenticate by using Microsoft Entra ID, you have been tasked with provisioning users and group accounts. To minimize administrative overhead, membership of the groups should be updated automatically based on job titles. You also need to know how to delete users to prevent access after an engineer leaves your organization.

**Note:** An **[interactive lab simulation](https://mslabs.cloudguides.com/guides/AZ-104%20Exam%20Guide%20-%20Microsoft%20Azure%20Administrator%20Exercise%201)** is available that allows you to click through this lab at your own pace. You may find slight differences between the interactive simulation and the hosted lab, but the core concepts and ideas being demonstrated are the same.

## Objectives

In this lab, you will:

+ Task 1: Create and configure users
+ Task 2: Create groups
+ Task 3: Create a resource group
+ Task 4: Assign an Azure built-in role
+ Task 5: Delete a user

## Estimated timing: 30 minutes

## Architecture diagram
![image](./media/az104-lab1-user-and-groups2.png)

### Instructions

## Exercise 1

## Task 1: Create and configure users

In this task, you will create and configure user accounts. User accounts will store all of the user's information such as their name, department, location, and contact information.

1. Sign in to the [Azure portal](https://portal.azure.com).

1. In the Azure portal, search for and select **Microsoft Entra ID**.

1. On the Microsoft Entra ID blade, scroll down to the **Manage** section, click **User settings**, and review available configuration options.

1. On the Microsoft Entra ID blade, in the **Manage** section, click **Users**, and then click your user account to display its **Profile** settings.

1. Click **Edit properties**, and then in the **Settings** tab, set **Usage location** to **United States** and click **Save** to apply the change.

>**Note**: This is necessary in order to assign an Microsoft Entra ID license to an account.
1. Navigate back to the **Users - All users** blade, and then click **+ New user**.

1. Create a new user with the following settings (leave others with their defaults):

| Setting | Value |
| --- | --- |
| User principal name | `az104-user1` |
| Display name | `az104-user1` |
| Auto-generate password | de-select |
| Initial password | **Provide a secure password** |
| Job title (Properties tab) | `Cloud Administrator` |
| Department (Properties tab) | `IT` |
| Usage location (Properties tab) | **United States** |

>**Note**: **Copy to clipboard** the full **User Principal Name** (user name plus domain). You will need it later in this task.

![image](./media/az104-lab1-create-user.png)

1. In the list of users, click the newly created user account to display its blade.

1. Review the options available in the **Manage** section and note that you can identify the roles assigned to the user account as well as the user account's permissions to Azure resources.

1. In the **Manage** section, click **Assigned roles**, then click **+ Add assignment** button and assign the **User administrator** role to **az104-user1**.

>**Note**: You also have the option of assigning roles when provisioning a new user.
1. Open an **InPrivate** browser window and sign in to the [Azure portal](https://portal.azure.com) using the newly created user account. When prompted to update the password, change the password to a secure password of your choosing.

>**Note**: Rather than typing the user name (including the domain name), you can paste the content of Clipboard.
1. In the **InPrivate** browser window, in the Azure portal, search for and select **Microsoft Entra ID**.

>**Note**: While this user account can access the tenant, it does not have any access to Azure resources. This is expected, since such access would need to be granted explicitly by using Azure Role-Based Access Control.
1. In the **InPrivate** browser window, on the Microsoft Entra ID blade, scroll down to the **Manage** section, click **User settings**, and note that you do not have permissions to modify any configuration options.

1. In the **InPrivate** browser window, on the Microsoft Entra ID blade, in the **Manage** section, click **Users**, and then click **+ New user**.

1. Create a new user with the following settings (leave others with their defaults):

| Setting | Value |
| --- | --- |
| User principal name | `az104-user2` |
| Display name | `az104-user2` |
| Auto-generate password | de-select |
| Initial password | **Provide a secure password** |
| Job title | `System Administrator` |
| Department | `IT` |
| Usage location | **United States** |

1. Sign out as the az104-user1 user from the Azure portal and close the InPrivate browser window.

## Task 2: Create groups with assigned and dynamic membership

In this task, you will create a group. Groups are used for user accounts or devices. Some groups have members that are statically assigned. Some groups have members that are dynamically assigned. Dynamic groups update automatically based on the properties of user accounts or devices. Static groups require more administrative overhead (administrators have to add and remove members manually).

1. In the Azure portal, navigate to the Microsoft Entra ID tenant blade and click **Groups**.

1. Use the **+ New group** button to create a new group with the following settings:

| Setting | Value |
| --- | --- |
| Group type | **Security** |
| Group name | `IT Lab Administrators` |
| Group description | `Administrators that manage the IT lab` |
| Membership type | **Assigned** |

>**Note**: Your **Membership type** drop-down list might be grayed out. This is where you can switch from an assigned group to a dynamic group if you have an Entra ID Premium P1 or P2 license.
![image](./media/az104-lab1-create-assigned-group.png)


1. Click **No members selected**.

1. From the **Add members** blade, search for **IT Cloud Administrators**, click the checkbox to the left of it. Next, search for **IT System Administrators** groups, click the checkbox to the left of it and then click **Select**. Back on the **New Group** blade, click **Create**.

![image](./media/az104-lab1-add-member-to-group.png)

## Task 3: Create a new resource group

In this task, you will create a new resource group. A resource group is a grouping of related resources (such as all the resources for a project, a department, or an application). Resource groups provide a way to limit access to a subset of your organization's resources. In this case, we want the virtual machine administrators to only have access to virtual machines in the lab and not all of the organization's virtual machines.

1. In the Azure portal, search for and select **Resource groups**.

1. On the **Resource groups** blade, click **+ Create**, and specify the following setting:

| Setting | Value |
| --- | --- |
| Subscription name | the name of your Azure subscription |
| Resource group name | `az104-rg1` |
| Location | **East US** |

1. Click **Review + create** and then click **Create**.

>**Note**: Wait for the resource group to deploy. Use the **Notification** icon (top right) to track progress of the deployment.
1. Back on the **Resource groups** blade, refresh the page and verify your new resource group appears in the list of resource groups.

![image](./media/az104-lab1-create-resource-group.png)

## Task 4: Assign the Virtual Machine Contributor role.

In this task, you will assign an Azure role to an existing group. This will provide the ability to manage virtual machines to all members of the IT Lab Administrators group.

1. On the **Resource groups** blade, click the **az104-rg1** resource group entry.

1. On the **az104-rg1** blade, click **Access control (IAM)** in the middle pane.

1. On the **Add role assignment** blade, specify the following settings and click **Next** after each step:

| Setting | Value |
| --- | --- |
| Role in the search tab | **Virtual Machine Contributor** |
| Assign access to (Under Members pane) | **User, group, or service principal** |
| Select (+Select Members) | **IT Lab Administrators** |

![image](./media/az104-lab1-assign-role.png)

4. Click **Review + assign** twice to create the role assignment.

2. From the **Access control (IAM)** blade, select **Role assignments**.
3. On the **az104-rg1 | Access control (IAM)** blade, on the **Check access** tab, in the **Searcy by name or email address** text box, type `az104-user2`.
4. In the list of search results, select the user account of user2 and, on the **az104-user2 assignments - az104-rg1** blade, view the newly created assignment.

## Task 5: Delete a user.

In this task, you will delete an existing user account. You will commonly delete user accounts when users leave the company. And, you will delete user accounts that are being used as service accounts when they are no longer being used. Deleting user accounts is an important part of the user account lifecycle and reduces the risks of having dormant user accounts in the environment.

1. In your **All users** pane for Microsoft Entra organization, from the list, select **az104-user2**.

1. In the top menu bar, select **Delete**. If you don't see that option, select **More**.

1. Select **Delete** again to confirm deletion.

>**Note**: Some organizations opt to disable user accounts, reset the passwords, and remove them from all groups. After 90 days, the accounts get deleted permanently. This can be helpful when there is a need to retrieve data from the user's mailbox or computer.
#### Review

Congratulations! You created and configured user accounts, created a group, created a resource group, assigned a role to a user, and deleted a user account.
Loading

0 comments on commit 3e51a4e

Please sign in to comment.