Mastering Identity and Access Management with Microsoft Azure

Empower users by managing and protecting identities and data, 2nd Edition

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems
Cover of the book Mastering Identity and Access Management with Microsoft Azure by Jochen Nickel, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jochen Nickel ISBN: 9781789131154
Publisher: Packt Publishing Publication: February 26, 2019
Imprint: Packt Publishing Language: English
Author: Jochen Nickel
ISBN: 9781789131154
Publisher: Packt Publishing
Publication: February 26, 2019
Imprint: Packt Publishing
Language: English

Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments

Key Features

  • Understand how to identify and manage business drivers during transitions
  • Explore Microsoft Identity and Access Management as a Service (IDaaS) solution
  • Over 40 playbooks to support your learning process with practical guidelines

Book Description

Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively.

You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.

What you will learn

  • Apply technical descriptions to your business needs and deployments
  • Manage cloud-only, simple, and complex hybrid environments
  • Apply correct and efficient monitoring and identity protection strategies
  • Design and deploy custom Identity and access management solutions
  • Build a complete identity and access management life cycle
  • Understand authentication and application publishing mechanisms
  • Use and understand the most crucial identity synchronization scenarios
  • Implement a suitable information protection strategy

Who this book is for

This book is a perfect companion for developers, cyber security specialists, system and security engineers, IT consultants/architects, and system administrators who are looking for perfectly up–to-date hybrid and cloud-only scenarios. You should have some understanding of security solutions, Active Directory, access privileges/rights, and authentication methods. Programming knowledge is not required but can be helpful for using PowerShell or working with APIs to customize your solutions.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments

Key Features

Book Description

Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively.

You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.

What you will learn

Who this book is for

This book is a perfect companion for developers, cyber security specialists, system and security engineers, IT consultants/architects, and system administrators who are looking for perfectly up–to-date hybrid and cloud-only scenarios. You should have some understanding of security solutions, Active Directory, access privileges/rights, and authentication methods. Programming knowledge is not required but can be helpful for using PowerShell or working with APIs to customize your solutions.

More books from Packt Publishing

Cover of the book Seven NoSQL Databases in a Week by Jochen Nickel
Cover of the book Instant Windows 8 C++ Application Development How-to by Jochen Nickel
Cover of the book Microsoft System Center Data Protection Manager Cookbook by Jochen Nickel
Cover of the book Azure PowerShell Quick Start Guide by Jochen Nickel
Cover of the book Mastering OpenCV Android Application Programming by Jochen Nickel
Cover of the book Mastering JavaScript Promises by Jochen Nickel
Cover of the book Creating Games with cocos2d for iPhone 2 by Jochen Nickel
Cover of the book Automate it! - Recipes to upskill your business by Jochen Nickel
Cover of the book Learning C++ by Creating Games with UE4 by Jochen Nickel
Cover of the book JBoss Tools 3 Developers Guide by Jochen Nickel
Cover of the book iOS 12 Programming for Beginners by Jochen Nickel
Cover of the book SELinux System Administration - Second Edition by Jochen Nickel
Cover of the book Java EE 8 Application Development by Jochen Nickel
Cover of the book Instant Creating Data Models with PowerPivot How-to by Jochen Nickel
Cover of the book Oracle Database 11g Underground Advice for Database Administrators by Jochen Nickel
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy