Azure AD Dashboard Navigation
The course is dedicated to the practical management of users, groups, multi‑factor authentication (MFA), and self‑service password reset (SSPR) within Azure Active Directory, now called Microsoft Entra ID. Earlier sessions covered the theory; this session is entirely hands‑on, aiming to explore every option that appears on the Azure AD dashboard.
Azure AD Dashboard Navigation
The instructor opens the Microsoft Entra admin center, the renamed portal for Azure AD, and walks through the main navigation panes. While demonstrating the interface, a brief mention is made of Azure AD Connect tools V2, which support server versions 2016, 2019, and 2022 for identity synchronization.
User Management
In the Users section, existing accounts are listed and new accounts can be added. Two creation paths are highlighted:
- Create new user – adds an internal user that belongs to the tenant.
- Invite external user – sends an invitation to a guest, granting temporary access.
User data can be exported as a CSV file, revealing all attribute columns. For bulk provisioning, a CSV template is provided; up to 249 users can be created with a single upload. The domain (e.g., teachmecloud.net) must be specified in the file. The instructor demonstrates bulk creation by uploading a CSV that includes [email protected] and [email protected]. An attempt to add a user named “Tata” fails, illustrating that not every entry will succeed automatically. After submitting the file, the system processes the request in roughly 30‑40 seconds before the new accounts appear.
Multi‑Factor Authentication (MFA)
MFA is described as “the dual security layer you want to apply for our active 365 user.” Activation is performed per user:
- Open the user’s profile.
- Click the three‑dot menu (…) and select Per‑user MFA.
- Choose the user and click Enable.
On the user side, the setup requires entering contact details, installing the Microsoft Authenticator app, scanning a QR code shown by the admin, and entering the six‑digit one‑time password (OTP) generated by the app. Once MFA is configured, the user is prompted to create a new password because the temporary password is valid for only one use. The instructor completes the flow for the “gcp” account, confirming successful MFA activation.
Conclusion
The session covered single‑user creation, bulk provisioning via CSV, and the end‑to‑end MFA setup process. Upcoming lessons will expand into additional Azure AD services, building on the foundational tasks demonstrated today.
Takeaways
- The session demonstrates how to create single and bulk users in Microsoft Entra ID, including downloading and uploading CSV files for up to 249 accounts at once.
- It shows the difference between internal user creation and inviting external guest users, and how to specify the tenant domain in the CSV template.
- The instructor walks through enabling per‑user multi‑factor authentication, from the admin profile to the user’s Authenticator app setup with QR code and six‑digit OTP.
- After MFA enrollment, users must reset their temporary password because it is a one‑time use credential, reinforcing the second‑layer security model.
- The practical lab prepares learners for future Azure AD services by covering core tasks such as user provisioning, bulk operations, and MFA configuration.
Frequently Asked Questions
Who is Teach Me Cloud on YouTube?
Teach Me Cloud is a YouTube channel that publishes videos on a range of topics. Browse more summaries from this channel below.
Does this page include the full transcript of the video?
Yes, the full transcript for this video is available on this page. Click 'Show transcript' in the sidebar to read it.
Helpful resources related to this video
If you want to practice or explore the concepts discussed in the video, these commonly used tools may help.
Links may be affiliate links. We only include resources that are genuinely relevant to the topic.