Module 1: Identity – Lab Guide
This lab provides practical exercises for managing identities using Azure Active Directory (Azure
AD), including users, groups, and access controls.
Lab Prerequisites
• An Azure subscription (Free trial available at https://azure.microsoft.com/free/)
• A web browser (Microsoft Edge or Google Chrome recommended)
• Access to the Azure portal (https://portal.azure.com)
Exercise 1: Explore Azure Active Directory
Task 1.1 – Access Azure AD
1. Sign in to the Azure portal.
2. In the left-hand navigation, select Azure Active Directory.
3. Review the overview page to see Tenant Name, Domain, Tenant ID, and User Count.
Task 1.2 – Review Directory Properties
1. Go to Manage → Properties.
2. Note the Primary domain name.
3. Optionally, add a custom domain.
Exercise 2: Create and Manage Users
Task 2.1 – Create a New User
1. Navigate to Azure AD → Users → + New user.
2. Choose Create user and enter:
- Username:
[email protected]- Name: Alex Johnson
- Password: Auto-generate
3. Click Create.
Task 2.2 – Assign a Role to a User
1. Open the user you created.
2. Go to Manage → Assigned roles → + Add assignment.
3. Choose User Administrator and click Add.
Task 2.3 – Reset a User Password
1. Select the same user → Reset password.
2. Choose Reset password and record the temporary password.
Exercise 3: Create and Manage Groups
Task 3.1 – Create a Security Group
1. Go to Azure AD → Groups → + New group.
2. Configure:
- Group type: Security
- Group name: IT-Support
- Membership type: Assigned
3. Add Alex Johnson as a member and click Create.
Task 3.2 – Create a Dynamic Group (Optional)
1. Create a new group named HR-Dynamic.
2. Choose Membership type: Dynamic user.
3. Add a rule: (user.department -eq "HR")
4. Save and create.
Exercise 4: Test Access and Authentication
Task 4.1 – Test Sign-In
1. Open a private browser window.
2. Sign in to https://portal.office.com using Alex Johnson’s credentials.
3. Set a new password when prompted.
Task 4.2 – Enable Multi-Factor Authentication (MFA)
1. Go to Azure AD → Users → Multi-Factor Authentication.
2. Select Alex Johnson → Enable.
3. Have Alex sign in again and register MFA.
Exercise 5: Configure Conditional Access (Premium P1/P2
Required)
1. Go to Azure AD → Security → Conditional Access → + New policy.
2. Name it BlockLegacyAuth.
3. Assign All users → select All cloud apps.
4. Under Conditions → Client apps, choose Exchange ActiveSync and Other clients.
5. Under Access controls → Grant, select Block access.
6. Enable and create the policy.
Exercise 6: Explore Identity Protection (Premium P2)
1. Navigate to Azure AD → Security → Identity Protection.
2. Review:
- Risky users
- Risky sign-ins
- Risk detections
3. Create a User risk policy to enforce MFA for risky users.
Lab Completion Checklist
Task Status
Accessed Azure AD Overview ■
Created and managed users ■
Assigned roles to users ■
Created security and dynamic groups ■
Tested sign-in and MFA ■
Configured Conditional Access ■
Explored Identity Protection ■