Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Mastering Identity and Access Management with Microsoft Azure
  • Toc
  • feedback
Mastering Identity and Access Management with Microsoft Azure

Mastering Identity and Access Management with Microsoft Azure

By : Jochen Nickel
3.7 (3)
close
Mastering Identity and Access Management with Microsoft Azure

Mastering Identity and Access Management with Microsoft Azure

3.7 (3)
By: Jochen Nickel

Overview of this book

Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (21 chapters)
close
Free Chapter
1
Section 1: Identity Management and Synchronization
7
Section 2: Authentication and Application Publishing
14
Section 3: Data Classification and Information Protection

Security Assertion Markup Language (SAML) 2.0

SAML is the foundation for much of the current identity federation activity. SAML 2.0 is preceded by SAML 1.0 and 1.1. SAML 1.1 was released in 2003 and had just two scenarios (also known as profiles), and both were IdP-initiated. Shibboleth 1.3 and Liberty Alliance—WS-FF 1.2 extended SAML 1.1, and SAML 2.0 was released by OASIS in 2005.

The following table shows the SAML core principles:

Assertions Protocols Bindings
Package of identity
information
Request/response based Associates a message (protocol)
with transport (communication
mechanism)
Synonym token Defines the messaging
requirements
Examples:
  • HTTP Redirect
  • HTTP POST
  • HTTP Artifact
  • SOAP
XML-based Examples:
  • Authentication request
  • Single logout
  • Artifact resolution

 

In the next section, we will talk about the key facts of the SAML 2.0 protocol...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete