SC‑300 Study Portal Dark

SC-300 Master Summary Sheets

Module 1: Implement Initial Configuration of Microsoft Entra ID

Core Concepts

AreaKey Points
Tenant BasicsEntra ID tenant = dedicated instance of Microsoft cloud identity service. Each tenant has a global unique name (contoso.onmicrosoft.com).
Default DomainCreated automatically. You can add custom domains (must be DNS-verified).
LicensingFree, P1, P2. P1 adds Conditional Access; P2 adds Identity Governance.
Company BrandingAdd logo, background, custom helpdesk URL for sign-in pages.
Directory RolesGlobal Admin (highest), User Admin, Billing Admin, etc. Use PIM for JIT elevation.
Organizational RelationshipsCreate connections with external tenants for collaboration.
Security DefaultsEnforce MFA for admins and block legacy authentication (on by default).
Admin Units (AUs)Logical containers to delegate admin rights by department or region.
Tenant PropertiesName, domain, licenses, branding, and usage location.

Exam Focus

Module 2: Create, Configure, and Manage Identities

Identity Types

TypeDescription
Cloud-onlyCreated in Entra ID only.
SynchronizedFrom on-prem AD via Entra Connect.
FederatedAuthenticates using external IdP (e.g., AD FS).

User Management

Group Management

Administrative Units

Password Management

Hybrid Identities

Exam Focus

Module 3: Implement and Manage Hybrid Identity

Identity Synchronization

Authentication Methods

MethodDescriptionUse Case
Password Hash Sync (PHS)Hash of on-prem password synced to Entra.Simple, resilient.
Pass-Through Authentication (PTA)Auth happens on-prem via agent.When password must stay on-prem.
Federation (AD FS)Uses WS-Federation/SAML to redirect login.Complex SSO or custom policies.

Entra Connect Health

Common Sync Errors

ErrorCauseFix
InvalidSoftMatchDuplicate ProxyAddresses/UPN.Remove duplicates.
ObjectTypeMismatchSame attribute used by different object types.Fix conflicting entry.
AttributeValueMustBeUniqueDuplicate unique attribute values.Correct duplication.
FederatedDomainChangeErrorUPN moved between federated domains.Re-sync or adjust domain federation.
LargeObjectAttribute exceeds schema limit.Reduce attribute size.

Hybrid Identity Tools

Exam Focus

Module 4: Implement and Manage External Identities

B2B Collaboration

Invitation & Redemption

External Collaboration Settings

SettingPurpose
Guest invite controlWho can invite (admins, guest inviters, all users).
Guest access levelWhat guests can see (most restrictive = own profile only).
Domain allow/block listsControl which external domains can be invited.

Managing Guest Accounts

Dynamic Groups

Verified ID

Federation & IdPs

ProviderTypePurpose
SAML / WS-FedEnterprise IdPs (AD FS, Okta).Use existing org accounts.
GoogleSocial (Gmail only).B2B sign-in via Google OAuth.
FacebookSocial (for self-service sign-up only).Public app registration.

Note: Federated domain must not be DNS-verified in any Entra tenant.

Cross-Tenant Access Controls

TypeDescription
Inbound AccessExternal users accessing your tenant.
Outbound AccessYour users accessing partner tenants.
Trust SettingsAccept MFA/device compliance from partner.
Org-Specific RulesCustomize per partner tenant.
B2B Direct ConnectMutual trust → Teams shared channels SSO.

Governance

Exam Focus

📘 Quick Recall Table

TopicRemember This
SourceAnchor = ImmutableIDLinks on-prem AD → Entra object.
Security DefaultsBasic MFA & legacy-auth block (no CA needed).
PHS vs PTA vs FederationPHS = simplest, PTA = on-prem auth, Federation = custom SSO.
Dynamic GroupsAttribute-based; require Premium P1.
Entra Connect HealthNeeds port 443 and Premium P1.
Guest InvitesControlled in External Collaboration Settings.
Cross-Tenant AccessInbound/outbound + MFA trust.
Verified IDDecentralized, privacy-focused credentialing.

✅ Final SC-300 Strategy Tips

SC-300 Rapid Review Handbook

Comprehensive summary of all four modules of Microsoft’s SC-300: Microsoft Identity and Access

Administrator certification exam.

Module 1: Implement Initial Configuration of Microsoft Entra ID

Covers foundational setup of tenants, domains, and administrative settings for Microsoft Entra ID

(Azure AD).

Core Concepts

Tenant = unique Entra ID instance; domain = namespace like contoso.com; subscription = billing

container.

Add and verify custom domains. Configure company branding and security defaults to enforce MFA

and block legacy auth.

Exam Focus

Understand tenant vs directory, role types, and where to apply branding and defaults.

Module 2: Create, Configure, and Manage Identities

Identity Types

• Cloud-only – Created in Entra ID. • Directory-synced – From on-prem AD. • Federated – Auth via

external IdP.

Groups and Licensing

Security and Microsoft 365 groups; use dynamic membership for automation. Group-based

licensing simplifies management.

Exam Focus

Understand UPN, ImmutableID, and synchronization models (PHS, PTA, Federation).

Module 3: Implement and Manage Hybrid Identity

Synchronization and Authentication

Microsoft Entra Connect performs import, sync, and export. SourceAnchor links AD to Entra

(ImmutableID).

Authentication options: Password Hash Sync, Pass-through Auth, Federation via AD FS.

Common Errors

InvalidSoftMatch, ObjectTypeMismatch, AttributeValueMustBeUnique – caused by duplicate

attributes or misaligned source anchors.

Exam Tip

Know how Connect Health monitors AD FS and sync health. Port 443 required. Premium P1 license

needed.

Module 4: Implement and Manage External Identities

B2B Collaboration

Invite external users as Guests. Guests use own credentials. Controlled via External Collaboration

settings (who can invite, visibility level).

Federation and Identity Providers

Supports SAML/WS-Fed IdPs, Google, and Facebook federation. Enables external sign-ins without

Microsoft accounts.

Cross-Tenant Access and Direct Connect

Control inbound/outbound access and trust MFA/compliance. Direct Connect enables Teams

shared channels across tenants.

Verified ID

Decentralized identity for issuing verifiable credentials. Involves Issuer, Holder, and Verifier roles.

Exam Focus

Know difference between B2B, B2C, and Direct Connect. Remember where to configure settings:

Entra Admin Center ® External Identities.

Final Review Tips

1. Memorize relationship between Tenant, Subscription, and Directory.

2. Security defaults = baseline MFA; Conditional Access = customizable MFA.

3. PHS (simple), PTA (on-prem auth), Federation (custom SSO).

4. Use Dynamic Groups + Conditional Access for automated governance.

5. Review federation claim requirements for SAML and WS-Fed IdPs.

6. Understand Verified ID purpose: decentralized identity management.

7. Always apply least privilege and review guest accounts regularly.