Add files via upload

This commit is contained in:
staleycyn 2023-11-30 05:54:30 -08:00 committed by GitHub
parent b78c418f79
commit 3e51a4e64d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 373 additions and 0 deletions

View File

@ -0,0 +1,191 @@
---
lab:
title: 'Lab 01: Manage Microsoft Entra ID Identities'
module: 'Administer Identity'
---
# Lab 01 - Manage Microsoft Entra ID Identities
# Student lab manual
## Lab scenario
Your organization is building out a new lab environment for pre-production testing of apps and services. A few engineers are being hired to manage the lab environment, including the virtual machines. In order to allow the engineers to authenticate by using Microsoft Entra ID, you have been tasked with provisioning users and group accounts. To minimize administrative overhead, membership of the groups should be updated automatically based on job titles. You also need to know how to delete users to prevent access after an engineer leaves your organization.
**Note:** An **[interactive lab simulation](https://mslabs.cloudguides.com/guides/AZ-104%20Exam%20Guide%20-%20Microsoft%20Azure%20Administrator%20Exercise%201)** is available that allows you to click through this lab at your own pace. You may find slight differences between the interactive simulation and the hosted lab, but the core concepts and ideas being demonstrated are the same.
## Objectives
In this lab, you will:
+ Task 1: Create and configure users
+ Task 2: Create groups
+ Task 3: Create a resource group
+ Task 4: Assign an Azure built-in role
+ Task 5: Delete a user
## Estimated timing: 30 minutes
## Architecture diagram
![image](./media/az104-lab1-user-and-groups2.png)
### Instructions
## Exercise 1
## Task 1: Create and configure users
In this task, you will create and configure user accounts. User accounts will store all of the user's information such as their name, department, location, and contact information.
1. Sign in to the [Azure portal](https://portal.azure.com).
1. In the Azure portal, search for and select **Microsoft Entra ID**.
1. On the Microsoft Entra ID blade, scroll down to the **Manage** section, click **User settings**, and review available configuration options.
1. On the Microsoft Entra ID blade, in the **Manage** section, click **Users**, and then click your user account to display its **Profile** settings.
1. Click **Edit properties**, and then in the **Settings** tab, set **Usage location** to **United States** and click **Save** to apply the change.
>**Note**: This is necessary in order to assign an Microsoft Entra ID license to an account.
1. Navigate back to the **Users - All users** blade, and then click **+ New user**.
1. Create a new user with the following settings (leave others with their defaults):
| Setting | Value |
| --- | --- |
| User principal name | `az104-user1` |
| Display name | `az104-user1` |
| Auto-generate password | de-select |
| Initial password | **Provide a secure password** |
| Job title (Properties tab) | `Cloud Administrator` |
| Department (Properties tab) | `IT` |
| Usage location (Properties tab) | **United States** |
>**Note**: **Copy to clipboard** the full **User Principal Name** (user name plus domain). You will need it later in this task.
![image](./media/az104-lab1-create-user.png)
1. In the list of users, click the newly created user account to display its blade.
1. Review the options available in the **Manage** section and note that you can identify the roles assigned to the user account as well as the user account's permissions to Azure resources.
1. In the **Manage** section, click **Assigned roles**, then click **+ Add assignment** button and assign the **User administrator** role to **az104-user1**.
>**Note**: You also have the option of assigning roles when provisioning a new user.
1. Open an **InPrivate** browser window and sign in to the [Azure portal](https://portal.azure.com) using the newly created user account. When prompted to update the password, change the password to a secure password of your choosing.
>**Note**: Rather than typing the user name (including the domain name), you can paste the content of Clipboard.
1. In the **InPrivate** browser window, in the Azure portal, search for and select **Microsoft Entra ID**.
>**Note**: While this user account can access the tenant, it does not have any access to Azure resources. This is expected, since such access would need to be granted explicitly by using Azure Role-Based Access Control.
1. In the **InPrivate** browser window, on the Microsoft Entra ID blade, scroll down to the **Manage** section, click **User settings**, and note that you do not have permissions to modify any configuration options.
1. In the **InPrivate** browser window, on the Microsoft Entra ID blade, in the **Manage** section, click **Users**, and then click **+ New user**.
1. Create a new user with the following settings (leave others with their defaults):
| Setting | Value |
| --- | --- |
| User principal name | `az104-user2` |
| Display name | `az104-user2` |
| Auto-generate password | de-select |
| Initial password | **Provide a secure password** |
| Job title | `System Administrator` |
| Department | `IT` |
| Usage location | **United States** |
1. Sign out as the az104-user1 user from the Azure portal and close the InPrivate browser window.
## Task 2: Create groups with assigned and dynamic membership
In this task, you will create a group. Groups are used for user accounts or devices. Some groups have members that are statically assigned. Some groups have members that are dynamically assigned. Dynamic groups update automatically based on the properties of user accounts or devices. Static groups require more administrative overhead (administrators have to add and remove members manually).
1. In the Azure portal, navigate to the Microsoft Entra ID tenant blade and click **Groups**.
1. Use the **+ New group** button to create a new group with the following settings:
| Setting | Value |
| --- | --- |
| Group type | **Security** |
| Group name | `IT Lab Administrators` |
| Group description | `Administrators that manage the IT lab` |
| Membership type | **Assigned** |
>**Note**: Your **Membership type** drop-down list might be grayed out. This is where you can switch from an assigned group to a dynamic group if you have an Entra ID Premium P1 or P2 license.
![image](./media/az104-lab1-create-assigned-group.png)
1. Click **No members selected**.
1. From the **Add members** blade, search for **IT Cloud Administrators**, click the checkbox to the left of it. Next, search for **IT System Administrators** groups, click the checkbox to the left of it and then click **Select**. Back on the **New Group** blade, click **Create**.
![image](./media/az104-lab1-add-member-to-group.png)
## Task 3: Create a new resource group
In this task, you will create a new resource group. A resource group is a grouping of related resources (such as all the resources for a project, a department, or an application). Resource groups provide a way to limit access to a subset of your organization's resources. In this case, we want the virtual machine administrators to only have access to virtual machines in the lab and not all of the organization's virtual machines.
1. In the Azure portal, search for and select **Resource groups**.
1. On the **Resource groups** blade, click **+ Create**, and specify the following setting:
| Setting | Value |
| --- | --- |
| Subscription name | the name of your Azure subscription |
| Resource group name | `az104-rg1` |
| Location | **East US** |
1. Click **Review + create** and then click **Create**.
>**Note**: Wait for the resource group to deploy. Use the **Notification** icon (top right) to track progress of the deployment.
1. Back on the **Resource groups** blade, refresh the page and verify your new resource group appears in the list of resource groups.
![image](./media/az104-lab1-create-resource-group.png)
## Task 4: Assign the Virtual Machine Contributor role.
In this task, you will assign an Azure role to an existing group. This will provide the ability to manage virtual machines to all members of the IT Lab Administrators group.
1. On the **Resource groups** blade, click the **az104-rg1** resource group entry.
1. On the **az104-rg1** blade, click **Access control (IAM)** in the middle pane.
1. On the **Add role assignment** blade, specify the following settings and click **Next** after each step:
| Setting | Value |
| --- | --- |
| Role in the search tab | **Virtual Machine Contributor** |
| Assign access to (Under Members pane) | **User, group, or service principal** |
| Select (+Select Members) | **IT Lab Administrators** |
![image](./media/az104-lab1-assign-role.png)
4. Click **Review + assign** twice to create the role assignment.
2. From the **Access control (IAM)** blade, select **Role assignments**.
3. On the **az104-rg1 | Access control (IAM)** blade, on the **Check access** tab, in the **Searcy by name or email address** text box, type `az104-user2`.
4. In the list of search results, select the user account of user2 and, on the **az104-user2 assignments - az104-rg1** blade, view the newly created assignment.
## Task 5: Delete a user.
In this task, you will delete an existing user account. You will commonly delete user accounts when users leave the company. And, you will delete user accounts that are being used as service accounts when they are no longer being used. Deleting user accounts is an important part of the user account lifecycle and reduces the risks of having dormant user accounts in the environment.
1. In your **All users** pane for Microsoft Entra organization, from the list, select **az104-user2**.
1. In the top menu bar, select **Delete**. If you don't see that option, select **More**.
1. Select **Delete** again to confirm deletion.
>**Note**: Some organizations opt to disable user accounts, reset the passwords, and remove them from all groups. After 90 days, the accounts get deleted permanently. This can be helpful when there is a need to retrieve data from the user's mailbox or computer.
#### Review
Congratulations! You created and configured user accounts, created a group, created a resource group, assigned a role to a user, and deleted a user account.

View File

@ -0,0 +1,182 @@
---
lab:
title: 'Lab 02a: Manage Subscriptions and RBAC'
module: 'Administer Governance and Compliance'
---
# Lab 02a - Manage Subscriptions and RBAC
# Student lab manual
## Lab requirements
This lab requires permissions to create users, create custom Azure Role Based Access Control (RBAC) roles, and assign these roles to users. Not all lab hosters provide this capability. Ask your instructor for the availability of this lab.
## Lab scenario
In order to simplify management of Azure resources in your organization, you have been tasked with implementing the following functionality:
- Creating a management group that includes all your Azure subscriptions
- Granting permissions to submit support requests for all subscriptions in the management group to a designated user. That user's permissions should be limited only to:
- Creating support request tickets
- Viewing resource groups
**Note:** An **[interactive lab simulation](https://mslabs.cloudguides.com/guides/AZ-104%20Exam%20Guide%20-%20Microsoft%20Azure%20Administrator%20Exercise%202)** is available that allows you to click through a similar lab at your own pace. You may find slight differences between the interactive simulation and the hosted lab, but the core concepts and ideas being demonstrated are the same.
## Objectives
In this lab, you will:
+ Task 1: Implement management groups
+ Task 2: Create custom RBAC roles
+ Task 3: Assign RBAC roles
## Estimated timing: 30 minutes
## Architecture diagram
<!-- Update diagram - simplify names, get rid of custom role JSON-->
![image](./media/az104-lab2a-architecture.png)
# Instructions
## Exercise 1
## Task 1: Implement Management Groups
In this task, you will create and configure management groups. Management groups are used to logically organize subscriptions. Subscriptions should be segmented as part of the [Microsoft Well-Architected Framework](https://learn.microsoft.com/en-us/azure/well-architected/), and allow for RBAC and Azure Policy to be assigned and inherited to other management groups and subscriptions. For example, if your organization has a dedicated support team for Europe, you can organize European subscriptions into a management group to provide the support staff access to those subscriptions (without providing access to all subscriptions).
1. Sign in to the [**Azure portal**](http://portal.azure.com).
1. Search for and select **Management groups** to navigate to the **Management groups** blade.
1. Review the messages at the top of the **Management groups** blade. If you are seeing the message stating **You are registered as a directory admin but do not have the necessary permissions to access the root management group**, perform the following sequence of steps:
1. In the Azure portal, search for and select **Microsoft Entra ID**.
1. On the blade displaying properties of your tenant, in the vertical menu on the left side, in the **Manage** section, select **Properties**.
1. On the **Properties** blade of your tenant, in the **Access management for Azure resources** section, select **Yes** and then select **Save**.
1. Navigate back to the **Management groups** blade, and select **Refresh**.
1. On the **Management groups** blade, click **+ Create**.
>**Note**: If you have not previously created management groups, select **Start using management groups**
1. Create a management group with the following settings:
| Setting | Value |
| --- | --- |
| Management group ID | `az104-mg1` |
| Management group display name | `az104-mg1` |
![image](./media/az104-lab2a-create-mgmt-group.png)
1. In the list of management groups, click the entry representing the newly created management group.
1. On the **az104-mg1** blade, click **Subscriptions**.
1. On the **az104-mg1 \| Subscriptions** blade, click **+ Add**, on the **Add subscription** blade, in the **Subscription** drop-down list, select the subscription you are using in this lab and click **Save**.
![image](./media/az104-lab2a-mgmt-add-subscription.png)
## Task 2: Create custom RBAC roles
In this task, you will create a custom RBAC role. Custom roles are a core part of implementing the principle of least privilege for an environment. Built-in *Contributor* roles might have too many permissions for your organization, and should be customized to remove permissions that are not be necessary for day to day management.
1. From the Azure portal, search for and select **Subscriptions**.
1. Select the subscription assigned to your lab environment.
1. From the subscription, select **Access Control (IAM)**.
1. From Access Control (IAM), in Create a custom role, select **Add**.
![image](./media/az104-lab2a-add-custom-role.png)
1. On the Basics tab of Create a custom role, provide the name `Custom Support Request`. In the Description field, enter `A custom contributor role for support requests.`
1. In the Baseline permissions field, select **Clone a role**. In the Role to clone drop-down menu, select **Support Request Contributor**.
![image](./media/az104-lab2a-clone-role.png)
1. Select the **Permissions** tab, and then select **+ Exclude permissions**.
1. In the resource provider search field, enter `.Support` and select **Microsoft.Support**.
1. In the list of permissions, place a checkbox next to **Other: Registers Support Resource Provider** and then select **Add**. The role should be updated to include this permission as a *NotAction*.
![image](./media/az104-lab2a-add-not-action.png)
1. Select the **Assignable scopes** tab. Select the **Delete** icon on the row for the subscription.
1. Select **+ Add assignable scopes**. Select the **az104-mg1** management group that was created in the prevous task, then select **Select**.
![image](./media/az104-lab2a-add-scope.png)
1. Select the **JSON** tab. Review the JSON for the *Actions*, *NotActions*, and *AssignableScopes* that are customized in the role.
1. Selct **Review + Create**, and then select **Create**.
## Task 3: Assign RBAC roles
In this task, you will create a user, assign the RBAC role you created in the previous task, and verify that the user can perform the task specified in the RBAC role definition.
1. In the Azure portal, search for and select **Microsoft Entra ID**, click **Users**, and then click **+ New user**.
1. Create a new user with the following settings (leave others with their defaults):
| Setting | Value |
| --- | --- |
| User name | `az104-user1` |
| Name | `az104-user1` |
| Let me create the password | enabled |
| Initial password | `Provide a secure password` |
>**Note**: **Copy to clipboard** the full **User name**. You will need it later in this lab.
1. In the Azure portal, navigate back to the **az104-mg1** management group and display its details.
1. Click **Access Control (IAM)**, click **+ Add** and then **Add role assignment**.
![image](./media/az104-lab2a-assign-role.png)
1. On the **Role** tab, search for `Custom Support Request`.
>**Note**: if your custom role is not visible, it can take up to 10 minutes for the custom role to appear after creation.
1. Select the **Role** and click **Next**. On the **Members** tab, click **+ Select members** and **select** user account az104-<your_tenant_name>.onmicrosoft.com.
![image](./media/az104-lab2a-add-members.png)
1. Select **Review + assign** twice.
1. Open an **InPrivate** browser window and sign in to the [Azure portal](https://portal.azure.com) using the newly created user account. When prompted to update the password, change the password for the user.
>**Note**: Rather than typing the user name, you can paste the content of clipboard.
1. In the **InPrivate** browser window, in the Azure portal, search and select **Resource groups** to verify that the az104-user1 user can see all resource groups.
1. In the **InPrivate** browser window, in the Azure portal, search and select **All resources** to verify that the az104-user1 user cannot see any resources.
1. In the **InPrivate** browser window, in the Azure portal, search and select **Help + support** and then click **+ Create a support request**.
>**Note**: Many organizations opt to provide all of the cloud administrators access to open support cases. This enables administrators to resolve support cases faster.
1. In the **InPrivate** browser window, on the **Problem Description/Summary** tab of the **Help + support - New support request** blade, type **Service and subscription limits** in the Summary field and select the **Service and subscription limits (quotas)** issue type. Note that the subscription you are using in this lab is listed in the **Subscription** drop-down list.
>**Note**: The presence of the subscription you are using in this lab in the **Subscription** drop-down list indicates that the account you are using has the permissions required to create the subscription-specific support request.
>**Note**: If you do not see the **Service and subscription limits (quotas)** option, sign out from the Azure portal and sign in back.
1. Do not continue with creating the support request. Instead, sign out as the az104-user1 user from the Azure portal and close the InPrivate browser window.
## Review
Congratulations! You implemented management groups, created a custom RBAC role, and assigned RABC roles.