Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Secure AI identity infrastructure with Microsoft Entra

Microsoft via Microsoft Learn

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
  • Explore how Microsoft Entra ID defines who can deploy, invoke, and manage AI workloads in Azure through identity types, authentication flows, and role scope decisions.

    In this module, you learn to:

    • Explain identity as the control layer for AI workloads in Azure
    • Distinguish between management plane and data plane access in AI environments
    • Describe authentication flows used by AI endpoints integrated with Microsoft Entra ID
    • Differentiate between human, application, and managed identities
    • Evaluate how role assignments and scope hierarchy affect blast radius
    • Identify common identity design patterns that introduce AI security risk
  • Explore how to use built-in Azure roles, managed identities, and RBAC-policy to control access to Azure resources. Identity is the key to secure solutions.

    By the end of this module, you'll be able to:

    • Configure and use Azure roles within Microsoft Entra ID

    • Configure and managed identity and assign it to Azure resources

    • Analyze the role permissions granted to or inherited by a user

    • Configure access to data in Azure Key Vault using RBAC-policy

  • Conditional Access gives a fine granularity of control over which users and identities can do specific activities, access which resources, and how to ensure data and systems are safe—including AI agent identities managed through Microsoft Entra Agent ID.

    By the end of this module, you can:

    • Plan and implement security defaults.

    • Plan conditional access policies.

    • Implement conditional access policy controls and assignments (targeting, applications, and conditions).

    • Test and troubleshoot conditional access policies.

    • Implement application controls.

    • Implement session management.

    • Configure smart lockout thresholds.

    • Identify how agent identities are protected using Conditional Access.

  • Protecting a user's identity by monitoring their usage and sign-in patterns will ensure a secure cloud solution. Explore how to design and implement Microsoft Entra Identity protection.

    By the end of this module you're able to:

    • Implement and manage a user risk policy.

    • Implement and manage sign-in risk policies.

    • Implement and manage MFA registration policy.

    • Monitor, investigate, and remediate elevated risky users.

Syllabus

  • Understand identity architecture for AI workloads
    • Introduction
    • Identity as the control layer for AI solutions
    • Management plane and data plane access in AI workloads
    • Authentication flows for AI endpoints in Microsoft Foundry
    • Human and workload identities in AI workloads
    • Role assignments and scope in AI environments
    • Common identity misconfigurations in AI deployments
    • Module assessment
    • Summary
  • Implement access management for Azure resources
    • Introduction
    • Assign Azure roles
    • Configure custom Azure roles
    • Create and configure managed identities
    • Access Azure resources with managed identities
    • Analyze Azure role permissions
    • Configure Azure Key Vault RBAC policies
    • Retrieve objects from Azure Key Vault
    • Knowledge check
    • Summary and resources
  • Plan, implement, and administer Conditional Access
    • Introduction
    • Plan security defaults
    • Exercise - Work with security defaults
    • Plan Conditional Access policies
    • Implement Conditional Access policy controls and assignments
    • Exercise - Implement Conditional Access policies roles and assignments
    • Test and troubleshoot Conditional Access policies
    • Implement application controls
    • Implement session management and continuous access evaluation
    • Exercise - Configure authentication session controls
    • Microsoft Entra Conditional Access Optimization agent
    • Module assessment
    • Summary and resources
  • Manage Microsoft Entra Identity Protection
    • Introduction
    • Review identity protection basics
    • Implement and manage user risk policy
    • Exercise enable sign-in risk policy
    • Exercise configure Microsoft Entra multifactor authentication registration policy
    • Monitor, investigate, and remediate elevated risky users
    • Implement security for workload identities
    • Explore Microsoft Defender for Identity
    • Explore the Identity Risk Management Agent
    • Module assessment
    • Summary and resources

Reviews

Start your review of Secure AI identity infrastructure with Microsoft Entra

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.