Part 7: Advanced Features and Enterprise Scenarios
Explore advanced MS Entra capabilities including Conditional Access, MFA, Continuous Access Evaluation, Managed Identities, B2B/B2C, custom claims, and enterprise SSO
Introduction
Prerequisites
Conditional Access Policies
Understanding Conditional Access
ββββββββββββββββββββββββββββββββββββββββββββββββ
β Access Request β
ββββββββββββββββ¬ββββββββββββββββββββββββββββββββ
β
ββββββββββββββββΌββββββββββββββββββββββββββββββββ
β Evaluate Signals β
β β’ User/Group β
β β’ Location (trusted IPs) β
β β’ Device state (managed/compliant) β
β β’ Application β
β β’ Sign-in risk β
β β’ User risk β
ββββββββββββββββ¬ββββββββββββββββββββββββββββββββ
β
ββββββββββββββββΌββββββββββββββββββββββββββββββββ
β Apply Access Controls β
β β’ Block access β
β β’ Require MFA β
β β’ Require compliant device β
β β’ Require hybrid Azure AD joined device β
β β’ Require app protection policy β
β β’ Require password change β
β β’ Persist browser session β
ββββββββββββββββ¬ββββββββββββββββββββββββββββββββ
β
ββββββββββββββββΌββββββββββββββββββββββββββββββββ
β Grant or Deny Access β
ββββββββββββββββββββββββββββββββββββββββββββββββHandling Conditional Access in Applications
Client-Side Conditional Access Handling
API Response with Conditional Access Challenge
Multi-Factor Authentication (MFA)
Enforcing MFA
MFA Middleware
Continuous Access Evaluation (CAE)
Understanding CAE
CAE-Enabled Client Configuration
API Middleware for CAE
Managed Identities
Using Managed Identity in Azure
Calling APIs with Managed Identity
Managed Identity in Kubernetes
B2B and B2C Scenarios
Azure AD B2B (Business-to-Business)
Handling B2B Users in API
Azure AD B2C Integration
Custom Claims and Token Customization
Adding Custom Claims
Using Extension Attributes
Custom Claims Transform
Enterprise SSO
Configuring Enterprise Application SSO
Home Realm Discovery
Risk-Based Access Control
Handling Identity Protection Signals
Key Takeaways
Common Patterns
Pattern 1: Progressive Security
Pattern 2: Tenant-Aware Operations
Next Steps
Additional Resources
PreviousPart 6: Protecting APIs with Microsoft Entra IDNextPart 8: Production Best Practices and Operational Excellence
Last updated