A small but growing organization lacks a structured identity and access management process. User accounts are created inconsistently, permissions accumulate over time, and there is no centralized visibility into authentication risks or access levels. This project designs and documents a lightweight IAM foundation that improves security, reduces operational friction, and prepares the organization for future scaling. Implementation Security Defaults were enabled to enforce MFA, block legacy authentication, and provide a baseline identity protection posture during the free tier phase. Example groups and users were created to simulate structure and assigned roles.
| User | Group |
|---|---|
| Alice | IT-Support |
| Bob | HR-Staff |
| Charlie | Corp-Employees |
| Ezra | Corp-Admins |
| Group | Roles to Assign | Why |
|---|---|---|
| Corp-Admins | Global Reader, Security Reader | Read-only admin visibility |
| IT-Support | User Administrator | Identity operations (Tier 1) |
| HR-Staff | None | HR shouldn’t have directory privileges |
| Corp-Employees | None | Standard users |
Each user account was used to generate logs. Authentication behavior was validated. For example: Security Defaults enforces MFA at registration but does not require MFA for every sign in. After initial registration, Entra issues a Primary Refresh Token that reduces MFA frequency unless risk conditions change. Audit logs confirm user and group provisioning, as well as MFA registration for all personas. Sign-in logs show successful and failed authentication attempts across multiple personas and geographic locations. Conditional Access policies were evaluated, MFA was enforced, and location telemetry was captured. Interrupts and failures reflect realistic user behavior and policy enforcement. A location change (US → UK) was used to generate MFA prompts and demonstrate Conditional Access evaluation in the sign-in logs. Security Defaults were disabled to allow granular Conditional Access policies and Privileged Identity Management workflows. This shift reflects a transition from baseline protections to enterprise-grade identity governance. Conditional Access policies were created using Microsoft’s built-in templates and manually configured to enforce MFA and block legacy authentication. The Manage Policies view confirms active enforcement. Privileged Identity Management was used to assign the Security Administrator role to the Corp-Admins group. Admin.Ezra activated the role through PIM’s just-in-time workflow, providing justification and time-bound elevation. This demonstrates least privilege and controlled access to sensitive administrative capabilities. Audit logs were filtered by category to highlight key IAM events. Separate views confirm user provisioning, group-based role assignments, Conditional Access policy creation, and PIM activation. These logs validate administrative actions and support traceability across the identity lifecycle.






















