Introduction To Azure EntraID
Azure Active Directory (Azure AD or AAD) now renamed to Entra ID is “Microsoft’s cloud-based identity and access management service.”
Azure AD can be used to access both:
External resources like Azure Portal, Office 365 and
Internal resources like on-premises applications.
Entra ID - Some Terminology:
Tenant - An instance of Entra ID and represents a single organization.
Entra ID Directory - Each tenant has a dedicated Directory. This is used to perform identity and access management functions for resources.
Subscriptions - It is used to pay for services. There can be multiple subscriptions in a Directory.
Core Domain - The initial domain name <tenant>.onmicrosoft.com is the core domain. It is possible to define custom domain names too.
Entra ID is not Azure. Entra ID is a product offering within Azure. Azure is Microsoft's cloud platform whereas Entra ID is enterprise identity service in Azure.
Azure Architecture
Management Groups
Management groups manage multiple subscriptions, and all subscriptions inherit the conditions applied to the management group.
Subscriptions within a management group belong to the same Azure tenant.
Management groups can be nested under other management groups, creating a hierarchy.
The Root management group is the top-level management group for each Azure directory.
Global administrators can elevate their privileges to the Root management group when necessary.
Subscriptions
An Azure subscription is a logical unit of Azure services linked to an Azure account.
It serves as a billing and/or access control boundary within an Entra ID Directory.
A single Entra ID Directory can have multiple subscriptions, but each subscription can only trust one directory.
Any Azure role assigned at the subscription level applies to all resources within that subscription.
Resource Groups and Resources
A resource is a deployable item in Azure, such as virtual machines (VMs), app services, or storage accounts.
A resource group acts as a container to organize resources.
All resources in Azure must belong to a single resource group.
Deleting a resource group deletes all the resources inside it.
Each resource group has its own Identity and Access Management (IAM) settings, and any role applied to the resource group will apply to all resources within it.
Managed Identity
Azure allows Managed Identities to be assigned to resources such as app services, function apps, and virtual machines.
Managed Identity uses Entra ID tokens to authenticate and access other resources like key vaults and storage accounts.
It functions as a special type of service principal that is integrated with Azure resources.
Managed Identities can be:
System-assigned: Tied to a specific resource and cannot be shared.
User-assigned: Has an independent lifecycle and can be shared across multiple resources.
Entra ID focuses on managing identities and access control for users, apps, and services, while Azure Resource Manager focuses on the deployment and management of Azure resources.
Entra ID governs who can access Azure services, whereas ARM governs how those services are created, managed, and structured.
In summary, Entra ID is about identity and access, while ARM is about managing the Azure resources those identities interact with.
Entra ID vs On-Prem AD
The only similarity between Entra ID and Azure Active Directory Domain Services is that both provide identity and access management solutions.
Although they may share similar terms, it's important to avoid viewing Entra ID through the lens of on-premises Active Directory (AD) concepts.
Entra ID is not a cloud-based directory service; that functionality is provided by Azure Active Directory Domain Services (AADDS), which offers a "domain controller as a service" experience.
It is possible to integrate on-premises AD with Entra ID for a hybrid identity solution, enabling seamless authentication and access across cloud and on-prem environments.
(Azure Role-Based Access Control) RBAC Roles
Azure RBAC Roles (or simply Azure roles) provides access management for Azure resources using the authorization system of ARM.
There are over more than 120 built-in roles (473 as per https://azure.permissions.cloud/builtinroles) and we can define custom roles too.

(Azure Role-Based Access Control) RBAC Assignments
Azure AD Object/Principal HAS Role ON Scope.

Security Principal: An entity in Entra ID, which could be a user, group, service principal, or managed identity that requires access to resources.
Role Definition: A set of permissions that defines what actions a security principal can perform (or be denied from performing), such as read, write, or delete.
Scope: The resource to which the role is applied, covering different levels of hierarchy such as Management Group -> Subscription -> Resource Group -> Resource. This defines where the role permissions take effect.

Azure Attribute Based Access Control (ABAC)
We can think of this as RBAC with conditional attributes.


Key Differences Between Azure RBAC and Entra ID Roles:
Feature
Azure RBAC Roles
Azure AD Roles
Scope
Azure resources (VMs, storage accounts, networks, etc.)
Azure AD resources (users, groups, apps, policies, etc.)
Used For
Managing access to Azure resources
Managing access to Azure AD directory and identity tasks
Assignment
Subscription, resource group, or resource level
Azure AD tenant level
Predefined Roles
Owner, Contributor, Reader, Virtual Machine Contributor, etc.
Global Admin, User Admin, Application Admin, Security Admin
Custom Roles
Full custom role support, can be scoped to any resource
Limited custom role support, mainly for Azure AD permissions
Focus
Resource management and operations (create, update, delete resources)
Identity and directory management (users, groups, apps)
Inherits Permissions
Yes, roles inherit permissions down the resource hierarchy
No, roles do not have scope-based inheritance
Common Entra ID Roles:
Global Administrator
User Administrator
Security Administrator
Privileged Role Administrator
Application Administrator
Common Azure RBAC Roles:
Owner
Contributor
Reader
User Access Administrator
Virtual Machine Contributor
Entra - Editions

Last updated