Skip to content

Introduced by a trusted connector?

Start Here

Anthony Veltri

  • Doctrine
    • Doctrine Library
    • Global Library
  • Field Notes
  • Routes
    • Route 01: When the Interface Is Breaking (and you are becoming the patch)
    • ROUTE 02: If decisions stall and meetings go nowhere, start here
    • ROUTE 03: If you have lots of projects but no portfolio clarity, start here
    • ROUTE 04: If you’re confused about federation vs integration, start here
    • ROUTE 05: If heroics are propping up your system, start here
    • ROUTE 06: If you cannot force compliance across partners, start here
    • ROUTE 07: If compliance exists but commitment does not, start here
    • ROUTE 08: If disconnected workflows create audit anxiety, start here
  • Figure Library
  • FAQ
  • About
    • Capability Statement
    • Interpreter Kit
  • Contact
Anthony Veltri

Architecture & Interfaces

15
  • Doctrine 01: Federation vs Integration in Mission Networks
  • Doctrine 03: Interfaces Are Where Systems Break, So They Require Stewards, Contracts, and Ownership
  • Doctrine 04: Useful Interoperability Is the Goal, Not Perfect Interoperability
  • Doctrine 05: Innovation Must Live at the Edge, Not in the Center
  • Doctrine 06: A Two-Lane System Protects Stability and Enables Evolution
  • Doctrine 14: Technical Debt Is a Leadership Signal, Not a Coding Failure
  • Doctrine 15: Architecture Must Accelerate Teams, Not Bottleneck Them
  • Doctrine 17: Architects Translate Strategy Into Engineering and Engineering Into Strategy
  • Doctrine 20: Golden Datasets: Putting Truth In One Place Without Pretending Everything Is Perfect
  • Doctrine 21: Zero Trust Is A Trust Model, Not A Card “Type”
  • Doctrine 23: Loop Closure as Load-Bearing System Infrastructure
  • ANNEX B. Data Contracts
  • ANNEX C. Interface Ownership Model
  • ANNEX H. Architecture Doctrine
  • Annex L: The Rosetta Stone for Data Teams: Bridging the Gap Between Technicians and Executives

Decision Tempo & Governance

10
  • Doctrine 02: Distributed Decisions Increase Alignment, Speed, and Resilience
  • Doctrine 07: Clear Intent Matters More Than Perfect Data
  • Doctrine 08: Clear Intent Compresses Ambiguity, Reduces Conflict, and Accelerates Action
  • Doctrine 09: Decision Drag Is the Enemy of Mission Tempo. Architecture Is the Remedy
  • Doctrine 10: Degraded Operations Are the Normal Mode, Not the Exception
  • Doctrine 11: Preventive Action and Contingent Action Must Both Be Designed Intentionally
  • Doctrine 22: When “It Depends” Is the Right Answer: How to Think in Probabilities Under Uncertainty
  • ANNEX D. Decision Altitudes Model
  • ANNEX E. Prevention–Contingency Matrix
  • ANNEX I. High Visibility Workflows

Portfolio & Alignment

4
  • Doctrine 16: Portfolio Thinking Ensures Effort Aligns With What Actually Matters
  • ANNEX F. Pattern Library
  • ANNEX J. System Evolution and Drift Management
  • ANNEX K. System and Workflow Profiles (Case Studies)

Leadership & Human Systems

6
  • Doctrine 24: Stewardship Places the Burden on the Steward, Not the Parties
  • Doctrine 18: Commitment Outperforms Compliance in High Trust, High Tempo Environments
  • Doctrine 19: Supervision, Management, and Leadership Are Three Different Jobs. Confusing Them Breaks Systems
  • Doctrine 23: Loop Closure as Load-Bearing System Infrastructure
  • ANNEX A. Human Contracts
  • ANNEX G. Leadership Doctrine

Resilience & Operations

3
  • Doctrine 24: Stewardship Places the Burden on the Steward, Not the Parties
  • Doctrine 12: Resilience Is an Emergent Property, Not a Feature
  • Doctrine 13: Problem Solving Requires Finding the Real Deviation and the Relevant Change

Doctrine Companions

7
  • Doctrine 03 Companion: The RS-CAT Framework: Converting Raw Recall into Teachable Principle
  • Doctrine 03 Companion: The Interface Void
  • Doctrine 11 Companion: Agency vs. Outcome
  • Doctrine 09 Companion: Artifacts Over Adjectives
  • Doctrine 03 Companion: Constraints: bidirectional translation: Compression vs Construction
  • Doctrine 10 Companion: Span of Control and Cross Training Are Load-Bearing Constraints
  • Doctrine 21 Companion: Claims, Roles, and Entitlements in Microsoft 365

Field Reports

1
  • Field Report: College Financing and the 5-Year Home Runway
View Categories
  • Home
  • Doctrine & Supporting Guides
  • Doctrine Companions
  • Doctrine 21 Companion: Claims, Roles, and Entitlements in Microsoft 365

Doctrine 21 Companion: Claims, Roles, and Entitlements in Microsoft 365

Anthony Veltri
Updated on December 14, 2025

14 min read

Companion to: Doctrine 21: Zero Trust Is A Trust Model, Not A Card “Type”

This page is a Doctrine Companion. It hangs off Doctrine 21 and gives you a shared vocabulary for identity and access in Microsoft 365, so that zero trust conversations do not dissolve into word salad.

Use it when you are:

  • Designing access patterns in Microsoft 365
  • Reviewing architectures and audits
  • Trying to untangle confused conversations about claims, groups, roles, or entitlements

Don’t reach for this companion if:

  • You’re just enabling basic MFA for your organization
  • You’re troubleshooting a single user’s access issue
  • You’re implementing a simple “everyone in group X gets access to app Y” pattern

This companion is for complex authorization patterns, cross-tenant scenarios, and zero trust architectures that need precise vocabulary.


Core Idea #

Zero trust needs more than strong cards and good VPNs. It needs clear answers to basic questions:

  • What facts about a user or device do we trust enough to build policy on?
  • Where do those facts live?
  • How do those facts show up at the moment of an access decision?

In Microsoft 365, those answers live in a small stack of concepts:

  • Claims: facts in the token
  • Groups and roles: how we bundle people and workloads
  • Entitlements: specific rights to specific resources
  • Policies and enforcement points: where zero trust decisions are made

If a team uses these words loosely, zero trust quietly collapses back into perimeter thinking and card worship.


1. Why This Companion Exists #

Doctrine 21 reminds you that zero trust is a trust model, not a card type or a product logo. CAC, PIV, smartcards, and MFA apps are strong identity signals inside that model. They are not the model itself.

In practice, many organizations still treat:

  • “claims”
  • “groups”
  • “roles”
  • “entitlements”
  • “policies”

as if they are interchangeable. That confusion shows up as:

  • Access reviews that cannot explain why someone has a given permission
  • Security proposals that talk about “zero trust” but never identify which signals are being evaluated
  • Architectures where identity tech is purchased, but authorization is still driven by a handful of static groups

This companion exists to:

  • Define claims, roles, groups, entitlements, and policies in a consistent way
  • Show how those pieces work together in Microsoft 365 and Entra ID
  • Connect that stack back to the zero trust model in Doctrine 21

The goal is not to cover every Microsoft feature. The goal is to give you a vocabulary that makes real zero trust designs possible.


2. The Identity and Access Stack in Microsoft 365 #

At a high level, Microsoft’s cloud identity story looks like this:

  • Entra ID issues security tokens that contain claims
  • Applications and services read those claims and make decisions about access
  • Groups, app roles, directory roles, and entitlements drive which claims appear and how they are interpreted
  • Conditional Access acts as a zero trust policy engine that combines signals and enforces decisions

Don’t Confuse the Person with the Permission.

This diagram illustrates the M365 Identity Stack, highlighting layered logic from identity verification to access entitlements.
The Identity Stack. Zero Trust requires clear separation. Identity (Blue) creates the Token (Orange), which must pass the Policy Gate (Red) to get the Entitlement (Green). If you collapse these layers, you lose control.

This section describes each layer in practical terms.

2.1 Claims: Facts Inside a Token #

A claim is a statement about a subject, carried in a token. Examples:

  • upn or email: who the user is
  • groups: which security groups the user belongs to
  • roles: which app roles or directory roles are assigned
  • device_compliant: whether the device meets policy
  • auth_time: when the user last authenticated
  • custom attributes such as clearanceLevel, country, or businessUnit

You can think of a token as a sealed envelope delivered to an application. The envelope proves who issued it. The claims inside describe who or what the subject is, and under what conditions.

Working rule:

Claims are facts, not permissions. They do not grant anything by themselves. They are inputs to policy.

2.2 Groups and Roles: How People and Workloads Are Bundled #

Groups and roles give structure to claims:

  • Security groups
    • Collections of users or service principals
    • Often emitted as groups claims if the token is sized appropriately
  • Directory roles (Entra roles)
    • Administrative roles such as Global Administrator or Security Reader
    • Often emitted as role claims in tokens
  • App roles
    • Application specific roles defined on a resource
    • For example: Report.Reader, Report.Contributor, Case.Reviewer

Groups and roles are how you avoid targeting policies at individual accounts. They let you say:

  • “All members of the Anesthesia Clinicians group”
  • “Anyone in the Finance Approver app role”
  • “Any workload identity that has the BackupAgent role”

Working rule:

Groups and roles describe who a policy applies to in human terms, so that tokens can carry the corresponding claims.

2.3 Entitlements: Explicit Rights to Specific Resources #

An entitlement is a concrete decision that grants a subject a specific right to a specific resource under defined conditions.

For example:

  • Read access to a SharePoint site that hosts engineering specifications
  • Approval rights in an expense management app
  • The ability to modify a subset of patient records under a defined jurisdiction

Microsoft products represent these decisions in different ways:

  • Access control lists on SharePoint sites and libraries
  • Membership in app roles or security groups that gate an application
  • Assignments in Entra Entitlement Management packages

Underneath the variety, the pattern is simple:

Working rule:

Entitlements answer the question “Who can do what, where, and under which conditions.”

2.4 Policies and Enforcement Points #

Policies decide when and how claims and entitlements are evaluated.

Key policy surfaces in Microsoft 365 include:

  • Conditional Access: Combines signals from user, group, device, location, and risk to grant or block access, or to require controls such as MFA or device compliance.
  • Application specific authorization: Logic inside SharePoint, Teams, Power BI, and custom apps that interprets claims and entitlements.
  • Data protection policies: Sensitivity labels, DLP, and conditional access app controls that govern how data can be used, not only who can see it.

Zero Trust Is a Loop, Not a Badge

This diagram illustrates the Zero Trust Decision Loop, highlighting key steps from authentication to resource access and ongoing challenge cycles.
The Decision Loop: You don’t “have” Zero Trust; you “do” Zero Trust. Every single request triggers a fresh token, a fresh policy check, and a fresh decision. The moment the signal changes (e.g., device becomes non-compliant), the loop breaks and access stops. The Logic of the Gate: Just as code must pass validation before production, identity must pass policy before access.

Working rule:

Policy is where zero trust lives. Claims and entitlements have value only because policy engines interpret them and enforce decisions.


3. Claims That Matter in Real Systems #

There are thousands of possible claims. Very few should be central to your zero trust design.

In practice, a small, stable set of claims does most of the heavy lifting. You can map these across many industries: public sector, health care, manufacturing, financial services, higher education, and others.

Here is a practical list of eight claim categories that show up again and again.

3.1 Identity and Organizational Placement #

  • Who the subject is: Claims such as sub, oid, upn, and email. These are the anchors that tie tokens back to a directory entry.
  • Organizational placement: Business unit, department, or command.
    • For example: businessUnit = Cardiology, department = Treasury, command = RegionalOperations

These claims support:

  • separation of duties
  • allocation of costs and licenses
  • targeted access to data that belongs to a given unit

3.2 Job Function and Role #

  • Job function: Human understandable descriptors such as jobTitle or jobFunction.
    • For example: jobFunction = AirPlanner, jobFunction = ChargeNurse, jobFunction = FinanceAnalyst
  • Application or directory roles: Machine readable roles such as Report.Reader or Case.Reviewer emitted as claims.

These drive authorization patterns such as:

  • “Charge nurses can see ward level dashboards”
  • “Case reviewers can approve high value payments”

3.3 Data Sensitivity and Clearance #

  • Data sensitivity or clearance level: Claims such as clearanceLevel or dataAccessTier.
    • For example: clearanceLevel = Confidential, dataAccessTier = HighlyRestricted

These become critical wherever:

  • legal or regulatory requirements differ by data tier
  • cross organization or cross border collaboration needs tight control

3.4 Location and Jurisdiction #

  • Location and jurisdiction: Claims for physical or legal context, such as country, region, or site.
    • For example: country = DE, region = EU, site = DC01

These support policies such as:

  • “Data for EU residents is visible only to staff operating under EU jurisdiction”
  • “Operators in one region can monitor another, but cannot change configuration there”

3.5 Device State and Compliance #

  • Device identity and compliance: Claims that indicate whether the device is joined, registered, or compliant with policy. Intune and partner mobile device management (MDM) systems feed this information into Entra ID, which Conditional Access policies evaluate. (MDM systems ensure mobile devices within an organization comply with applicable standards and policies.)

These claims make it possible to say:

  • “Even if a user passes MFA, they must still be on a compliant device to access tier one systems”
  • “External collaborators can use their own devices, but only through constrained experiences”

3.6 Risk and Session Context #

  • Risk level: Claims derived from sign in risk, unusual behavior, or detection systems.
  • Session context: Claims related to sign in time, client type, or authentication strength.

These enable decisions such as:

  • “Read access is allowed from medium risk sessions, write access is not”
  • “Highly privileged operations require a higher authentication strength”

3.7 Environment and Tenancy #

  • Environment or zone: Claims or configuration that distinguish production from test, or core tenant from partner tenants.

These are essential when:

  • multiple environments share an identity backbone
  • there are cross tenant trust relationships, such as business to business collaboration scenarios

4. From Claims to Zero Trust Decisions #

Zero trust in Microsoft 365 is not an abstract slogan. It appears in very specific moments when a user or workload requests access and a policy engine evaluates the claims.

This section walks through a simple request flow.

4.1 One Request, From Start to Finish #

Imagine a user in any sector trying to open a sensitive document, such as:

  • a clinical protocol in a hospital
  • an engineering design in a manufacturing firm
  • a planning document in a government agency

At a high level:

  1. Authentication: The user proves identity through one or more methods such as password, smartcard, CAC, or FIDO key, possibly with MFA.
  2. Token issuance: Entra ID issues a token with claims describing who the user is, how they authenticated, and relevant groups, roles, and device properties.
  3. Conditional Access evaluation: The Conditional Access engine evaluates the token and other signals (user, group, location, device compliance, risk level).
    • It decides whether to: grant access, require additional controls such as MFA or compliant device, or block access entirely.
  4. Application authorization: The application (for example SharePoint, Teams, or a line of business app) interprets entitlements: which site, library, or workspace the user can reach, and which actions are allowed.
  5. Data protection and monitoring: Data loss prevention, sensitivity labels, and application controls may further constrain what the user can do with the content, even after access is granted.

At each step, claims supply facts. Policies and entitlements supply decisions.

The Translation Layer

This diagram illustrates how groups and roles connect individuals to machine entitlements, supporting policy management logic.
The Identity Bridge. “Steve” is a person. “Approve_Payroll” is a machine permission. The Group/Role is the critical bridge that translates the messy human reality into precise machine enforcement.

4.2 How This Supports Doctrine 21 #

Doctrine 21 tells you to stop treating identity tech as the model and to focus on repeated access decisions at every door.

The claim stack described here provides the raw material for those decisions:

  • identity, device, and risk claims feed Conditional Access
  • group and role claims feed application specific authorization
  • custom claims such as clearance or jurisdiction guide fine grained decisions

Taken together, this is how Microsoft 365 implements the hotel model from Doctrine 21, where the key card is checked at each door, not only at the front gate.


5. Patterns and Pitfalls for Designing Claims #

This section gives patterns that travel well across organizations, along with the most common ways they fail.

5.1 Pattern: Small, Stable Core Claims #

Good zero trust designs concentrate on a small, stable set of claims that are:

  • well defined
  • backed by authoritative systems such as HR or MDM
  • suitable for use in many policies and applications

Examples: businessUnit, jobFunction, clearanceLevel or dataAccessTier, region or jurisdiction, device_compliant.

Pitfall: creating dozens of free text attributes that are never cleaned up, then discovering that policies depend on values that no one can confidently interpret.

Working rule:

Prefer a small, stable vocabulary of core claims backed by reference data, rather than a large, drifting set of attributes that no one trusts.

5.2 Pattern: Groups and Roles as Bridges Between People and Claims #

Use groups and roles to bridge from human concepts to machine enforcement.

  • Define groups and app roles around real work: “Ward Charge Nurse”, “Regional Sales Manager”, “Airspace Planner”.
  • Map those to policies and entitlements: “Can approve up to this threshold”, “Can edit plans in these regions”.

Pitfalls:

  • building giant “everyone in department X” groups that end up with broad access to unrelated systems
  • using roles that sound similar but do not match real job responsibilities

Working rule:

Design groups and roles to reflect actual responsibilities, not directory convenience.

5.3 Pattern: Claims From Authoritative Sources Only #

Treat certain systems as the source of truth for specific claims:

  • HR or directory for identity and job function
  • MDM for device compliance
  • Governance systems for clearance or data tier

Pitfalls:

  • allowing multiple systems to update the same claim, leading to conflicts
  • using manual updates in production for anything that must withstand audit

Working rule:

Each core claim should have one primary steward and a clearly identified source of truth.

5.4 Pattern: Cross Tenant Trust as Explicit Decisions #

In federated or cross organization environments, treat external claims with care.

For example:

  • decide which external MFA signals you are willing to trust
  • decide whether external device compliance claims are accepted, and under what conditions

Pitfalls:

  • trusting external claims by default, without a clear policy
  • ignoring external claims entirely, then recreating work that partners have already done

Working rule:

Trust external claims when there is a clear agreement and monitoring, not as an accident of federation.


6. Language Checklist #

This checklist gives you short definitions you can drop into architecture documents, policies, or design reviews. You can treat this as a reusable snippet.

This diagram illustrates Microsoft 365 Identity & Access, mapping each stage with color-coded boxes, flow arrows, and clarifying questions.
This diagram illustrates Microsoft 365 Identity & Access, mapping each stage with color-coded boxes, flow arrows, and clarifying questions.
  • Claim: A fact about a user, device, or workload, carried in a token.
    • Example: user identifier, group membership, device compliance, clearance level.
  • Group: A collection of identities used to target policy and entitlements.
    • Example: “Oncology Clinicians”, “Regional Finance Approvers”.
  • Role: A named responsibility or capability, often scoped to an application or directory.
    • Example: “Report.Reader”, “Case.Reviewer”, “Security Administrator”.
  • Entitlement: A concrete right to perform a specific action on a specific resource.
    • Example: “Can approve payments up to a threshold in this system”, “Can modify these datasets”.
  • Policy: A defined rule set that evaluates claims and context to allow or block access, or to require controls.
    • Example: Conditional Access policies, application authorization rules, or data protection policies.
  • Zero trust decision: A repeated, per request evaluation of identity, device, context, and entitlements that does not assume that being on the network implies trust.

Working rule:

When someone uses one of these terms in a review, you should be able to point to the corresponding implementation: the claim, group, role, entitlement record, or policy definition.


7. Companion Diagnostic: Review Questions #

You can use these questions alongside the Doctrine 21 checklist when reviewing a system, portfolio, or architecture. If you cannot answer them cleanly, you are at risk of zero trust theater.

  1. Claims inventory: Which claims do our critical policies rely on? For each claim, what is the system of record?
  2. Group and role clarity: Can we describe our key groups and roles in plain language that matches how people actually work? Do we have broad “catch all” groups that undermine least privilege?
  3. Entitlement transparency: For a given high value system, can we answer: “Who can do what, where, and under which conditions?” Can we show how that answer is implemented in Microsoft 365?
  4. Policy visibility: Do we know which Conditional Access policies and application rules gate access to critical systems? Can we explain which claims each policy evaluates?
  5. Lifecycle and drift control: How fast do claims, group memberships, and entitlements update when people change jobs or devices? Who is responsible for cleaning up stale access?
  6. Cross tenant and partner trust: Where do we trust external identity providers or device claims? Are those trust decisions documented and monitored?

If these questions reveal gaps, return to Doctrine 21. Use the doctrine to reframe the conversation around repeated access decisions, then use this companion to align the vocabulary that makes those decisions possible.

Field notes and examples #

  • Field Guide: Disconnected Editing Is Not a GIS Feature. It Is a Survival Pattern.

Last Updated on December 14, 2025

Related Posts #

A diagram depicts three orange boxes labeled “Maturity Silo” (low, medium, high) feeding blue lines into a central “Federation Engine,” which outputs an arrow labeled “Operational Coherence.” The background looks like wrinkled brown paper.

Field Note: Compass-X Recognition Patterns and Strategic Framing #

This image illustrates the challenge of limited connectivity, as seen by a U.S. Forest Service vehicle in a remote, low-signal area.

Field Guide: Disconnected Editing Is Not a GIS Feature. It Is a Survival Pattern. #

This sepia-toned image highlights early logging practices, as seen by seven men on felled logs amid equipment and pine trees.

Field Note: Integration Debt vs Temporal Arbitrage #

A graphic with the title

ANNEX K. System and Workflow Profiles (Case Studies) #

This slide illustrates the

Doctrine 09 Companion: Artifacts Over Adjectives #

A graphic with abstract blue and black data and circuit patterns, overlaid with a dark rectangle containing the text

Annex L: The Rosetta Stone for Data Teams: Bridging the Gap Between Technicians and Executives #

Related Docs

  • Doctrine 03: Interfaces Are Where Systems Break, So They Require Stewards, Contracts, and Ownership
  • Doctrine 04: Useful Interoperability Is the Goal, Not Perfect Interoperability
  • ANNEX C. Interface Ownership Model

Leave a Reply Cancel reply

You must be logged in to post a comment.

Table of Contents
  • Core Idea
  • 1. Why This Companion Exists
  • 2. The Identity and Access Stack in Microsoft 365
    • 2.1 Claims: Facts Inside a Token
    • 2.2 Groups and Roles: How People and Workloads Are Bundled
    • 2.3 Entitlements: Explicit Rights to Specific Resources
    • 2.4 Policies and Enforcement Points
  • 3. Claims That Matter in Real Systems
    • 3.1 Identity and Organizational Placement
    • 3.2 Job Function and Role
    • 3.3 Data Sensitivity and Clearance
    • 3.4 Location and Jurisdiction
    • 3.5 Device State and Compliance
    • 3.6 Risk and Session Context
    • 3.7 Environment and Tenancy
  • 4. From Claims to Zero Trust Decisions
    • 4.1 One Request, From Start to Finish
    • 4.2 How This Supports Doctrine 21
  • 5. Patterns and Pitfalls for Designing Claims
    • 5.1 Pattern: Small, Stable Core Claims
    • 5.2 Pattern: Groups and Roles as Bridges Between People and Claims
    • 5.3 Pattern: Claims From Authoritative Sources Only
    • 5.4 Pattern: Cross Tenant Trust as Explicit Decisions
  • 6. Language Checklist
  • 7. Companion Diagnostic: Review Questions

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest

Was it helpful ?

  • Happy
  • Normal
  • Sad
  • Privacy Policy
  • Introductions
  • Contact

© 2026 Anthony Veltri

  • Doctrine
    • Doctrine Library
    • Global Library
  • Field Notes
  • Routes
    • Route 01: When the Interface Is Breaking (and you are becoming the patch)
    • ROUTE 02: If decisions stall and meetings go nowhere, start here
    • ROUTE 03: If you have lots of projects but no portfolio clarity, start here
    • ROUTE 04: If you’re confused about federation vs integration, start here
    • ROUTE 05: If heroics are propping up your system, start here
    • ROUTE 06: If you cannot force compliance across partners, start here
    • ROUTE 07: If compliance exists but commitment does not, start here
    • ROUTE 08: If disconnected workflows create audit anxiety, start here
  • Figure Library
  • FAQ
  • About
    • Capability Statement
    • Interpreter Kit
  • Contact