Hybrid Identity Lab: Active Directory & Entra ID (IAM Project)

Written by:

This project demonstrates my hands-on experience with Identity and Access Management (IAM) in a hybrid environment using Active Directory and Microsoft Entra ID.

In this lab, I implemented user lifecycle management, role-based access control (RBAC), and least privilege principles to a fictitious company (Northwinds.com) to simulate real-world enterprise identity workflows.

Overview

This project focuses on building and managing a hybrid identity environment where Active Directory serves as the source of truth and Entra ID extends identity into the cloud.

Key Objectives:

  • Manage user identities across on-prem and cloud environments
  • Implement group-based access control (RBAC)
  • Enforce least privilege for different user types
  • Simulate real-world IAM provisioning workflows

Tools & Technologies:

  • Active Directory Domain Services (AD DS)
  • Microsoft Entra ID (Azure AD)
  • Azure AD Connect
  • Windows Server (VirtualBox)
  • Role-Based Access Control (RBAC)

Architecture & Design

I designed a structured identity environment using:

  • Organizational Units (OUs) for departments (HR, IT, Finance, Sales)
  • Security groups for access control
  • A global “All Employees” group fore baseline access
  • A separate Contractor group for restricted users

This design supports scalability, centralized management, and least privilege enforcement.

Figure 1: Active Directory Organizational Unit Structure

IAM Implementation

Identity Lifecycle Management

  • Created and managed user accounts in Active Directory
  • Placed users in appropriate OUs based on department
  • Assigned group memberships based on role
  • Synced identities to Entra ID

Figure 2 : User Management in Active Directory

Role-Based Access Control (RBAC)

  • Implemented department based security groups
  • Assigned users to groups instead of direct permissions
  • Used “All Employees” group for baseline access

Figure 3: Group-Based Access Control in Entra ID

Hybrid Identity Integration

  • Configured Azure AD Connect to sync identities
  • Enabled authentication across on-prem and cloud systems

Figure 4: Synced Users in Entra ID

Ticket Scenario (Real World Simulation)

Business Requirement

Provision a new Finance department, onboard users, and create a restricted contractor account.

Actions taken

  • Created Finance OU and security group in Active Directory
  • Created corresponding group in Entra ID
  • Onboarded:
    • 2 Finance users
    • 1 Sales user
  • Assigned:
    • Department-specific groups
    • “All Employees” baseline access

Figure 5: Finance Department Setup

Contractor Access Control

  • Created OU and security group
  • Excluded contractor from “All Employees” group
  • Enforced least privileged access

Figure 6-8: Restricted Contractor Access Model

Security & Access Control

  • Enforced least privilege principles
  • Segmented access between employees and contractors
  • Reduced risk by limiting unnecessary permissions
  • Used RBAC for scalable permission management

Skills Demonstrated

  • Identity Lifecycle Managment
  • Active Directory Administration
  • Microsoft Entra ID (Azure AD)
  • Role-Based Access Control (RBAC)
  • Hybrid Identity (Azure AD Connect)
  • User Provisioning & Access Control
  • Least Privilege Enforcement

How this Applies to Real-World Roles

This project reflects real-world IAM responsibilities such as:

  • User onboarding and offboarding
  • Managing access through RBAC
  • Maintaining identity consistency across systems
  • Enforcing security best practices like least privilege

Final Takeaway

This project demonstrates my ability to design and manage a scalable hybrid IAM environment, aligning with enterprise practices for identity governance and access control.

Leave a comment