Entra ID concepts: tenants, users, and groups
A tenant is a dedicated instance of Entra ID for your organization, created when you sign up for any Microsoft cloud service. Your tenant has its own set of users, groups, applications, and policies. Every Azure subscription is associated with exactly one tenant, and a tenant can be associated with multiple subscriptions.
Users in Entra ID can be cloud-only (created directly in the tenant) or synchronized from on-premises Active Directory using Entra ID Connect (formerly Azure AD Connect). Synchronized users authenticate through Entra ID but their source of truth remains the on-premises AD. Guest users are added from outside the organization using B2B collaboration and authenticate with their home identity provider.
Groups come in two types: Security groups control access to resources and can be assigned to Azure roles. Microsoft 365 groups are designed for collaboration and include shared mailboxes, calendars, and Teams channels. Dynamic groups automatically manage membership based on rules, such as adding all users in the Sales department automatically based on their department attribute.
Authentication, MFA, and Conditional Access
Entra ID supports multiple authentication methods. Password Hash Synchronization (PHS) syncs a hash of the on-premises password hash to the cloud, letting users authenticate directly against Entra ID. Pass-through Authentication (PTA) validates credentials against on-premises AD in real time, without storing any password in the cloud. Federation uses ADFS or a third-party identity provider: Entra ID trusts the federated identity and does not validate the password at all.
Multi-Factor Authentication in Entra ID adds a second verification step using the Microsoft Authenticator app, phone call, SMS, or hardware token. MFA can be enforced per user or conditionally through Conditional Access policies.
Conditional Access is the policy engine that controls access based on conditions: who is signing in, from what device, from what location, to what application, and what risk level is detected. A policy might require MFA only when a user signs in from outside the corporate network, or block access entirely from certain countries. This is how Zero Trust access control is implemented in Microsoft environments.
Roles, licenses, and how to choose the correct answer
Entra ID has its own set of built-in roles separate from Azure RBAC roles. Global Administrator has the highest privilege in Entra ID: managing users, groups, applications, and all Entra ID settings. Global Administrator does not automatically grant access to Azure resources in subscriptions. That access is controlled by Azure RBAC separately. Conflating these two systems is a common mistake on the exam.
Entra ID comes in Free, P1, and P2 tiers. The Free tier covers basic identity management. P1 adds Conditional Access, hybrid identity, and group-based access. P2 adds Identity Protection (risk-based sign-in policies) and Privileged Identity Management (PIM) for just-in-time role activation.
Entra ID vs on-premises AD: Entra ID uses OAuth 2.0, SAML, OpenID Connect. On-premises AD uses Kerberos and LDAP. Entra ID is cloud-only and has no domain controllers. Joining an Azure VM to Entra ID is done through Entra ID Join, not traditional domain join.
Global Admin manages Entra ID. Owner in Azure RBAC manages Azure resources. These are separate systems with separate roles.