Microsoft Entra ID (Azure AD) consulting for Swiss enterprises: Conditional Access, MFA, PIM, Identity Governance and Zero Trust. CNEXT – Entra ID specialist from Bern.
FAQ
What is Microsoft Entra ID (formerly Azure AD)?
Microsoft Entra ID is Microsoft's cloud identity and access management platform – the authentication and authorisation layer for Microsoft 365, Azure and thousands of third-party apps. It is the foundation of Zero Trust security: controlling who can access what, based on identity, device health, location and risk signals.
What Entra ID services does CNEXT offer?
CNEXT Entra ID services: Entra ID P1/P2 setup and migration from on-premises AD, Conditional Access policy design, MFA rollout (Authenticator app, FIDO2, SMS), Privileged Identity Management (PIM) for admin accounts, Identity Governance (access reviews, lifecycle workflows), B2B/B2C guest access management and hybrid identity (AD Connect).
What is Conditional Access and why is it important?
Conditional Access is an Entra ID policy engine that grants/blocks access based on conditions: user identity, device compliance (Intune), location (IP/country), application risk and sign-in risk (AI-based). Example: 'Require MFA for all cloud apps when signing in from outside Switzerland.' CNEXT designs the full Conditional Access policy set for Swiss clients.
How does CNEXT roll out MFA to an organisation?
CNEXT's MFA rollout: (1) Identify service accounts and shared accounts that need exceptions. (2) Design Conditional Access policies (MFA requirements per app and risk level). (3) Communicate to end users (email template, FAQ, support info). (4) Pilot with IT team, then waves of users. (5) Monitor and tune. Typically 4–6 weeks for 100–500 users.
What is Privileged Identity Management (PIM)?
PIM provides just-in-time (JIT) privileged access: admins request elevated permissions for a time-limited window, requiring approval and MFA. This drastically reduces the attack surface from standing admin accounts. CNEXT implements PIM for Global Admin, SharePoint Admin, Exchange Admin and Azure subscription roles.
What is Entra ID Identity Governance?
Entra ID Identity Governance manages identity lifecycle at scale: Access Reviews (regular audits of who has access to what), Entitlement Management (access packages for projects/teams), Lifecycle Workflows (automated on/offboarding) and Privileged Identity Management. CNEXT implements Identity Governance for organisations with 200+ users.
How does CNEXT migrate from on-premises Active Directory to Entra ID?
CNEXT uses Entra Connect (formerly AD Connect) for hybrid identity: passwords and group memberships sync from on-premises AD to Entra ID. For pure cloud migration, CNEXT migrates users, groups, app registrations and security policies to Entra ID only, then decommissions on-premises AD. Timeline: 4–12 weeks.
What is SSPR (Self-Service Password Reset)?
SSPR lets users reset their own Entra ID passwords without calling the helpdesk – via authenticator app, mobile number or security questions. CNEXT enables SSPR for all users by default, reducing helpdesk password reset tickets by 40–60% in our clients' environments.
How does Entra ID protect against phishing and account takeover?
Entra ID Protection uses AI to detect sign-in anomalies (impossible travel, anonymous IP, leaked credentials) and can automatically block or require MFA for risky sign-ins. CNEXT configures Identity Protection risk policies, integrates alerts with Microsoft Sentinel and builds incident response playbooks for account compromise.
Does CNEXT help with Entra ID External Identities (B2B/B2C)?
Yes. Entra ID External Identities covers B2B (guest access for partners, suppliers, board members) and B2C (customer-facing identity for portals). CNEXT configures B2B cross-tenant access, guest lifecycle policies, branded sign-in experiences and MFA requirements for external users – FADP-compliant.