Azure AD B2B solves the problem of collaboration between business partners. It allows users to share business applications between partners, without going through inter-company federation relationships and internally-managed partner identities. With Azure AD B2B, you can create cross-company relationships by inviting and authorizing users from partner companies to access your resources. With this process, each company federates once, with Azure AD, and each user is then represented by a single Azure AD account. This option also provides a higher security level, because if a user leaves the partner organization, access is automatically disallowed. Inside of Azure AD, the user will be handled as a guest, and they won't be able to traverse other users in the directory. Permissions of the invited...

Mastering Identity and Access Management with Microsoft Azure
By :

Mastering Identity and Access Management with Microsoft Azure
By:
Overview of this book
Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively.
You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (21 chapters)
Preface
Section 1: Identity Management and Synchronization
Building and Managing Azure Active Directory
Understanding Identity Synchronization
Exploring Advanced Synchronization Concepts
Monitoring Your Identity Bridge
Configuring and Managing Identity Protection
Section 2: Authentication and Application Publishing
Managing Authentication Protocols
Deploying Solutions on Azure AD and ADFS
Using the Azure AD App Proxy and the Web Application Proxy
Deploying Additional Applications on Azure AD
Exploring Azure AD Identity Services
Creating Identity Life Cycle Management in Azure
Section 3: Data Classification and Information Protection
Creating a Security Culture
Identifying and Detecting Sensitive Data
Understanding Encryption Key Management Strategies
Configuring Azure Information Protection Solutions
Azure Information Protection Development
Other Books You May Enjoy
How would like to rate this book
Customer Reviews