๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Mastering Identity and Access Management with Microsoft Azure

โœ Scribed by Jochen Nickel


Publisher
Packt Publishing
Year
2016
Tongue
English
Leaves
682
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Start empowering users and protecting corporate data, while managing Identities and Access with Microsoft Azure in different environments

About This Book

  • Deep dive into the Microsoft Identity and Access Management as a Service (IDaaS) solution
  • Design, implement and manage simple and complex hybrid identity and access management environments
  • Learn to apply solution architectures directly to your business needs and understand how to identify and manage business drivers during transitions

Who This Book Is For

This book is for business decision makers, IT consultants, and system and security engineers who wish to plan, design, and implement Identity and Access Management solutions with Microsoft Azure.

What You Will Learn

  • Apply technical descriptions and solution architectures directly to your business needs and deployments
  • Identify and manage business drivers and architecture changes to transition between different scenarios
  • Understand and configure all relevant Identity and Access Management key features and concepts
  • Implement simple and complex directory integration, authentication, and authorization scenarios
  • Get to know about modern identity management, authentication, and authorization protocols and standards
  • Implement and configure a modern information protection solution
  • Integrate and configure future improvements in authentication and authorization functionality of Windows 10 and Windows Server 2016

In Detail

Microsoft Azure and its Identity and Access Management is at the heart of Microsoft s Software as a Service, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is an essential tool to master in order to effectively work with the Microsoft Cloud. Through practical, project based learning this book will impart that mastery.

Beginning with the basics of features and licenses, this book quickly moves on to the user and group lifecycle required to design roles and administrative units for role-based access control (RBAC). Learn to design Azure AD to be an identity provider and provide flexible and secure access to SaaS applications. Get to grips with how to configure and manage users, groups, roles, and administrative units to provide a user- and group-based application and self-service access including the audit functionality.

Next find out how to take advantage of managing common identities with the Microsoft Identity Manager 2016 and build cloud identities with the Azure AD Connect utility. Construct blueprints with different authentication scenarios including multi-factor authentication. Discover how to configure and manage the identity synchronization and federation environment along with multi -factor authentication, conditional access, and information protection scenarios to apply the required security functionality.

Finally, get recommendations for planning and implementing a future-oriented and sustainable identity and access management strategy.

Style and approach

A practical, project-based learning experience explained through hands-on examples.

โœฆ Subjects


Access;Databases & Big Data;Computers & Technology;LAN;Networks, Protocols & APIs;Networking & Cloud Computing;Computers & Technology;Network Administration;Disaster & Recovery;Email Administration;Linux & UNIX Administration;Storage & Retrieval;Windows Administration;Networking & Cloud Computing;Computers & Technology;Cloud Computing;Networking & Cloud Computing;Computers & Technology


๐Ÿ“œ SIMILAR VOLUMES


Mastering Identity and Access Management
โœ Nickel, Jochen ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Packt Publishing ๐ŸŒ English

Start empowering users and protecting corporate data, while managing Identities and Access with Microsoft Azure in different environmentsAbout This Book Deep dive into the Microsoft Identity and Access Management as a Service (IDaaS) solution Design, implement and manage simple and complex hybrid id

Mastering Identity and Access Management
โœ Jochen Nickel ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Packt Publishing ๐ŸŒ English

Microsoft Azure and its identity and access management (IAM) are at the heart of Microsoft's Software as a Service (SaaS) products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. With this book, you'll understand how mastering Microsoft Azure helps you to work with the Micro

Mastering Identity and Access Management
โœ Jochen Nickel ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Packt Publishing ๐ŸŒ English

Microsoft Azure and its identity and access management (IAM) are at the heart of Microsoft's Software as a Service (SaaS) products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. With this book, you'll understand how mastering Microsoft Azure helps you to work with the Micro

Cybersecurity and Identity Access Manage
โœ Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<p><span>This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft

Cybersecurity and Identity Access Manage
โœ Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<p><span>This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft

Cybersecurity and Identity Access Manage
โœ Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<p><span>This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft