Photo by Ari Sha on Unsplash

Photo by Ari Sha on Unsplash

Zero-Trust Features and Tools for Identities in Entra ID

Key to the Fortress

Article from ADMIN 91/2026
By
Zero trust – maximum security through minimum permissions – applies from the network through terminal devices to entire data centers, but critical human factors come into play with identities. We show you how Entra ID can help you manage your users' accounts securely.

Zero trust is not a specific action, but an ongoing process. Microsoft refers to it as a journey that never really ends. Why a journey? Because there is always something new to discover, and because existing technologies are critically questioned and new approaches examined in a cycle that constantly repeats.

Two issues pose specific challenges: On the one hand, the awareness that with zero trust, especially in the context of identities in Entra ID, particularly sensitive areas are accessed over the Internet, which changes the rules of the game. On the other hand, the mindset of many administrators is shaped by decades of working in classic on-premises environments, where domain controllers are protected by firewalls and identities are therefore relatively well secured. The situation with Entra ID is different, and you need to rethink because identity is the new perimeter.

Admin accounts, with access to comprehensive authorizations, are particularly vulnerable to criminal activity. Therefore, maximum security is essential for these accounts, which is exactly where the scenarios I look at here come into play. The objective is to use Entra ID to achieve a level of security that surpasses that of on-premises products.

The toolbox in Entra ID is comprehensively equipped for this purpose. One of the central tools it contains is Conditional Access policies, which are among the most powerful control instruments available to admins. They let you specify precisely who is allowed to access a specific set of resources and under which conditions. The mechanism behind policies is particularly useful for admin accounts and is made possible because a large number of signals are sent every time you log in to Entra ID or use an application. The signals then contribute to access decisions in the Conditional Access policy ruleset, among which are: On which device did the request originate? From which location? Which application did it target?

The policy

...
Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=