As the successor to Chapter 7, Deploying Solutions on Azure AD and ADFS, we dig further into the different features of Azure AD and ADFS. We already published the Kerberos on-premises application to external users. We'll do this with another application in this chapter. Furthermore, we will dive into the functionality of the Azure AD app proxy. Additionally, the first usage examples and the basic functionality of conditional access will be shown in this chapter. We do some more claims operation and task customization in Chapter 10, Exploring Azure AD Identity Services, and provide examples in the code package for the book. With this chapter, you will get all the information for managing the application integration into Azure AD and ADFS. You will also learn to publish applications with the Azure...

Mastering Identity and Access Management with Microsoft Azure
By :

Mastering Identity and Access Management with Microsoft Azure
By:
Overview of this book
Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively.
You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (21 chapters)
Preface
Section 1: Identity Management and Synchronization
Building and Managing Azure Active Directory
Understanding Identity Synchronization
Exploring Advanced Synchronization Concepts
Monitoring Your Identity Bridge
Configuring and Managing Identity Protection
Section 2: Authentication and Application Publishing
Managing Authentication Protocols
Deploying Solutions on Azure AD and ADFS
Using the Azure AD App Proxy and the Web Application Proxy
Deploying Additional Applications on Azure AD
Exploring Azure AD Identity Services
Creating Identity Life Cycle Management in Azure
Section 3: Data Classification and Information Protection
Creating a Security Culture
Identifying and Detecting Sensitive Data
Understanding Encryption Key Management Strategies
Configuring Azure Information Protection Solutions
Azure Information Protection Development
Other Books You May Enjoy
How would like to rate this book
Customer Reviews