{"id":71345,"date":"2022-11-07T12:30:00","date_gmt":"2022-11-07T17:30:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=71345"},"modified":"2024-11-08T17:45:38","modified_gmt":"2024-11-08T22:45:38","slug":"azure-ad-best-practices","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/azure-ad-best-practices","title":{"rendered":"Azure AD Best Practices"},"content":{"rendered":"\n

Identity is the new perimeter<\/a>. Cyberattacks are becoming more advanced and cloud-focused. Identity providers (IdP) have responded by offering security controls that make it possible for small and medium-sized enterprises (SMEs) to be proactive and mitigate these threats. Many SMEs use Microsoft\u2019s Azure Active Directory (AAD), which has prescribed best practices<\/a> to secure identities. Microsoft reserves several features for its most premium subscriptions levels. IT administrators must determine which subscription tiers<\/a>, or mixture of supplemental services from an open directory, are most appropriate for their unique security requirements. <\/p>\n\n\n\n

This article outlines the fundamentals of securing identities in AAD with emphasis on understanding what options are available and tailoring security controls to your organization. Provisioning and identity and access management (IAM) is the starting point, followed by centralizing the identity management lifecycle, adding appropriate controls, and auditing.<\/p>\n\n\n\n

Identity and Access Control<\/h2>\n\n\n\n

There are three main paths for provisioning in AAD: <\/p>\n\n\n\n