After completing the next configuration tasks, you will see the rich functionality of Microsoft Azure in the field of identity and access management, starting with cloud identities. You can demonstrate the different capabilities in your own Microsoft Azure environment. The guidance will focus on the most essential feature sets to give you an idea about their capabilities. We will start to use the default directory, which we call domain.onmicrosoft.com for now, and will change it later to a custom domain name. Domain stands for your desired name like example.com , this is also used for the userPrincipalName of the users in this chapter, e.g. [email protected] is represented in the chapter by my example domain called inovitcloudlabs. Be aware that this name will be visible in different applications, such as SharePoint Online and...

Mastering Identity and Access Management with Microsoft Azure
By :

Mastering Identity and Access Management with Microsoft Azure
By:
Overview of this book
Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively.
You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (21 chapters)
Preface
Section 1: Identity Management and Synchronization
Building and Managing Azure Active Directory
Understanding Identity Synchronization
Exploring Advanced Synchronization Concepts
Monitoring Your Identity Bridge
Configuring and Managing Identity Protection
Section 2: Authentication and Application Publishing
Managing Authentication Protocols
Deploying Solutions on Azure AD and ADFS
Using the Azure AD App Proxy and the Web Application Proxy
Deploying Additional Applications on Azure AD
Exploring Azure AD Identity Services
Creating Identity Life Cycle Management in Azure
Section 3: Data Classification and Information Protection
Creating a Security Culture
Identifying and Detecting Sensitive Data
Understanding Encryption Key Management Strategies
Configuring Azure Information Protection Solutions
Azure Information Protection Development
Other Books You May Enjoy
How would like to rate this book
Customer Reviews