Azure AD

Master this essential documentation concept

Quick Definition

Azure Active Directory - Microsoft's cloud-based identity and access management service used by enterprises to manage user authentication and permissions across applications.

How Azure AD Works

graph TD User([Corporate User]) -->|Login Request| AAD[Azure Active Directory] AAD -->|MFA Challenge| MFA[Multi-Factor Authentication] MFA -->|Token Issued| AAD AAD -->|SAML/OAuth Token| App1[Microsoft 365] AAD -->|SAML/OAuth Token| App2[Salesforce] AAD -->|SAML/OAuth Token| App3[Custom SaaS App] AAD -->|Conditional Access Check| CA[Conditional Access Policies] CA -->|Device Compliant?| Intune[Microsoft Intune] CA -->|Risk Score| IDP[Identity Protection] IDP -->|Block or Allow| AAD AAD -->|Audit Logs| Monitor[Azure Monitor / SIEM]

Understanding Azure AD

Azure Active Directory - Microsoft's cloud-based identity and access management service used by enterprises to manage user authentication and permissions across applications.

Key Features

  • Centralized information management
  • Improved documentation workflows
  • Better team collaboration
  • Enhanced user experience

Benefits for Documentation Teams

  • Reduces repetitive documentation tasks
  • Improves content consistency
  • Enables better content reuse
  • Streamlines review processes

Documenting Azure AD Configurations from Teams Recordings

When your IT or identity team configures Azure AD policies, conditional access rules, or application permissions, those working sessions often happen in Microsoft Teams calls. Screen shares, live walkthroughs of the Azure portal, and verbal explanations of role assignments get recorded — but that knowledge stays locked inside video files that are difficult to search or reference later.

The practical challenge is that Azure AD configurations change frequently. New applications get onboarded, guest access policies get updated, and security groups get restructured. When the explanation for a specific permission decision exists only in a 90-minute recording, your team has to scrub through timestamps to find why a particular conditional access policy was set up that way — or worse, the context gets lost entirely when team members leave.

Converting those Teams recordings into structured SOPs gives your Azure AD documentation a permanent, searchable home. A recording where an admin walks through setting up multi-factor authentication for a new application becomes a step-by-step procedure that any team member can follow independently. Decisions about group-based licensing or external user permissions get captured as written rationale, not buried audio.

If your team regularly records Azure AD onboarding sessions, policy reviews, or security audits in Teams, there's a more efficient path from those recordings to usable documentation.

Real-World Documentation Use Cases

Onboarding 500 Remote Contractors Without Issuing Corporate Credentials

Problem

A financial services firm needs to grant 500 temporary contractors access to specific SharePoint sites and a project management tool (Jira) without creating full Active Directory accounts, risking credential sprawl and orphaned accounts after contracts end.

Solution

Azure AD B2B Guest Access allows the firm to invite contractors using their existing email identities. Conditional Access policies restrict guest users to approved apps only, and access reviews automatically flag accounts for removal when contracts expire.

Implementation

['Configure Azure AD External Identities and enable B2B collaboration in the Azure portal under Identity > External Identities > External collaboration settings.', "Create a dedicated security group 'Contractors-2024' and assign it scoped permissions to only the SharePoint project site and Jira enterprise application in Azure AD.", 'Set up a Conditional Access policy that enforces MFA for all guest users and blocks access from non-compliant or unmanaged devices using Intune compliance signals.', "Schedule quarterly Azure AD Access Reviews targeting the 'Contractors-2024' group so team leads receive automated emails to confirm or revoke each contractor's access."]

Expected Outcome

Contractor onboarding time drops from 3 days (IT ticket queue) to 4 hours (self-service invite), and all 500 guest accounts are automatically reviewed and cleaned up at contract end, eliminating orphaned credential risk.

Enforcing Zero-Trust Access for Developers Connecting to Production Azure Resources

Problem

A DevOps team uses shared service account credentials stored in a shared password manager to access Azure subscriptions, making it impossible to audit who made which infrastructure change and violating SOC 2 audit requirements.

Solution

Azure AD Privileged Identity Management (PIM) replaces shared credentials with just-in-time role elevation. Developers request temporary 'Contributor' or 'Owner' roles for specific subscriptions, which are time-boxed and fully logged in Azure AD audit logs.

Implementation

['Enable Azure AD PIM in the Azure portal and onboard all Azure subscription roles (Owner, Contributor, Reader) into PIM management under Identity Governance > Privileged Identity Management.', "Configure eligible role assignments for each developer's individual Azure AD account, replacing shared service account usage. Set maximum activation duration to 2 hours with mandatory justification field.", "Add approval workflows for the 'Owner' role requiring sign-off from the team lead's Azure AD account before activation is granted, preventing unilateral privilege escalation.", 'Connect Azure AD audit logs to Microsoft Sentinel or Splunk via the Azure Monitor Diagnostics Settings to generate SOC 2 compliance reports showing per-user, time-stamped access records.']

Expected Outcome

The organization passes its SOC 2 Type II audit with complete per-user audit trails. Shared credentials are fully eliminated, and the blast radius of any compromised developer account is limited to a 2-hour window on a single subscription.

Enabling Single Sign-On for a Newly Acquired Company's SaaS Portfolio

Problem

After acquiring a startup, the parent company's IT team discovers employees use 14 separate SaaS tools (Slack, Zoom, GitHub, Figma, etc.) each with independent credentials. Password reset tickets spike 40% and phishing risk increases due to credential reuse.

Solution

Azure AD's pre-built enterprise application gallery provides SAML 2.0 and OIDC integrations for all 14 tools. Configuring SSO centralizes authentication so acquired employees log in once via Azure AD and access all tools without re-entering credentials.

Implementation

["Inventory all 14 SaaS tools and verify each exists in the Azure AD Enterprise Application gallery (covers 3,000+ pre-integrated apps). For any custom tools, prepare SAML metadata XML from the app's admin panel.", 'Migrate the highest-risk apps first (GitHub, Slack) by adding them as Enterprise Applications, configuring SAML attribute mappings (email, department, role) to match what each app expects, and testing with a pilot group of 10 users.', "Provision the acquired company's user accounts into Azure AD via SCIM sync or Azure AD Connect if they have an on-premises AD, ensuring UPNs match the primary SAML NameID format each app requires.", 'Deploy the My Apps portal (myapps.microsoft.com) as the unified app launcher and communicate the change to employees with a 2-week parallel-run period before revoking legacy credentials.']

Expected Outcome

Password reset tickets drop by 65% within 30 days of full rollout. All 14 apps are accessible from a single Azure AD login, and IT can immediately deprovision all app access for a departing employee by disabling one Azure AD account.

Blocking Risky Sign-Ins from Compromised Credentials in Real Time

Problem

A healthcare organization's security team discovers employee credentials for sale on the dark web after a third-party breach. They have no automated mechanism to detect or block sign-in attempts using these credentials before patient data is accessed.

Solution

Azure AD Identity Protection continuously monitors sign-in risk signals including leaked credential databases, impossible travel, and anonymous IP usage. High-risk sign-ins trigger automatic block or step-up MFA challenges without requiring manual SOC intervention.

Implementation

["Enable Azure AD Identity Protection under Security > Identity Protection in the Azure portal and configure the 'User risk policy' to automatically require password reset when user risk level is 'High'.", "Set the 'Sign-in risk policy' to block access or require MFA when sign-in risk is 'Medium or above', covering scenarios like sign-ins from Tor exit nodes, unfamiliar locations, or credential spray patterns.", 'Integrate Azure AD Identity Protection alerts with Microsoft Sentinel by enabling the Microsoft Entra ID data connector, creating an analytic rule that pages the on-call security engineer when a high-risk user is detected.', "Run a monthly review of the 'Risky Users' report in the Identity Protection dashboard and remediate any users flagged as compromised by forcing password reset and revoking all active refresh tokens via PowerShell (Revoke-AzureADUserAllRefreshToken)."]

Expected Outcome

The organization detects and automatically blocks 3 credential-stuffing attacks in the first month. Mean time to respond to a compromised credential drops from 72 hours (manual SOC review) to under 2 minutes (automated policy enforcement), meeting HIPAA breach prevention requirements.

Best Practices

Enable Conditional Access Policies Before Enforcing MFA Organization-Wide

Deploying MFA without Conditional Access creates a binary experience where all users face friction regardless of risk level. Conditional Access lets you require MFA only when signals indicate elevated risk, such as sign-ins from unfamiliar countries, unmanaged devices, or outside corporate IP ranges. This balances security with user productivity and reduces MFA fatigue.

✓ Do: Create named locations for trusted office IP ranges and configure Conditional Access to require MFA only for sign-ins outside those locations or from non-Intune-enrolled devices. Use report-only mode for 2 weeks before enforcing.
✗ Don't: Do not enable the legacy per-user MFA toggle in the Azure portal (under Users > Multi-Factor Authentication). This older method bypasses Conditional Access logic and cannot be scoped by application, location, or device compliance state.

Use Azure AD Groups for Application Access Instead of Direct User Assignments

Assigning individual users directly to enterprise applications creates an unmanageable web of permissions that is impossible to audit at scale and creates orphaned access when employees change roles. Dynamic Azure AD groups with membership rules based on department, job title, or employeeType attributes ensure access is automatically granted and revoked as user attributes change in HR systems. This approach scales to thousands of users without manual IT intervention.

✓ Do: Create dynamic security groups with rules like (user.department -eq 'Engineering') and assign those groups to enterprise applications and Azure RBAC roles. Connect your HR system (Workday, SAP SuccessFactors) via Azure AD inbound provisioning to keep attributes current.
✗ Don't: Do not assign individual user accounts directly to enterprise applications or Azure subscription roles. Direct assignments require manual cleanup during offboarding and cannot automatically reflect role changes, leaving former employees with access to systems they no longer need.

Protect Azure AD Global Administrator Accounts with Dedicated Cloud-Only Identities

Global Administrator accounts are the highest-privilege identities in Azure AD and are primary targets for phishing and credential theft. Using synced on-premises accounts for Global Admin roles means a single domain controller compromise can escalate to full Azure AD takeover. Dedicated cloud-only admin accounts with no email, no productivity app access, and hardware FIDO2 keys create an isolated privileged identity that cannot be compromised via phishing.

✓ Do: Create 2-4 dedicated cloud-only Global Administrator accounts named with a convention like admin-globaladmin-01@yourtenant.onmicrosoft.com, register FIDO2 hardware security keys (YubiKey) as the only authentication method, and store credentials in a physical safe. Use PIM for day-to-day privileged tasks.
✗ Don't: Do not use your regular work account (john.smith@company.com) as a Global Administrator. Never assign Global Admin to accounts synced from on-premises Active Directory, as an on-premises compromise would immediately grant attackers cloud-wide control.

Configure Azure AD Diagnostic Settings to Export Logs Before You Need Them

Azure AD audit logs and sign-in logs are retained for only 30 days (7 days for free tier tenants) by default. Security incidents, compliance audits, and forensic investigations routinely require log data from 90 days or more in the past. By the time an incident is discovered, the relevant Azure AD logs may already be purged. Configuring log export at tenant setup ensures continuous retention without gaps.

✓ Do: Immediately configure Azure AD Diagnostic Settings (under Azure AD > Monitoring > Diagnostic settings) to stream AuditLogs, SignInLogs, RiskyUsers, and UserRiskEvents to a Log Analytics Workspace and/or Azure Storage Account. Set retention to 90 days minimum for compliance frameworks like SOC 2 or ISO 27001.
✗ Don't: Do not rely on the Azure AD portal's built-in log viewer as your only log retention mechanism. Do not wait until after a security incident or audit request to configure log export, as retroactive log retrieval is impossible once the default retention window has passed.

Implement Azure AD Access Reviews on a Recurring Schedule for Privileged Roles

Privileged role assignments in Azure AD accumulate over time as employees change teams, take on temporary projects, or leave the organization. Without periodic reviews, former project leads retain Owner access to Azure subscriptions and ex-employees retain Privileged Role Administrator access long after offboarding. Azure AD Access Reviews automate the recertification process by sending role owners a list of current assignees and requiring explicit approval to maintain each assignment.

✓ Do: Configure quarterly Access Reviews in Azure AD Identity Governance targeting all PIM-eligible and active assignments for high-privilege roles (Global Administrator, Privileged Role Administrator, Security Administrator). Set the default action on reviewer non-response to 'Remove access' to ensure stale assignments are cleaned up even when reviewers are unresponsive.
✗ Don't: Do not treat privileged role assignment as a one-time provisioning task with no expiry. Do not configure Access Reviews with 'Approve access' as the auto-apply decision on non-response, as this defeats the purpose of the review by defaulting to preserving potentially stale or unauthorized access.

How Docsie Helps with Azure AD

Build Better Documentation with Docsie

Join thousands of teams creating outstanding documentation

Start Free Trial