9781789132304-1789132304-Mastering Identity and Access Management with Microsoft Azure: Empower users by managing and protecting identities and data, 2nd Edition

Mastering Identity and Access Management with Microsoft Azure: Empower users by managing and protecting identities and data, 2nd Edition

ISBN-13: 9781789132304
ISBN-10: 1789132304
Author: Nickel, Jochen
Publication date: 2019
Publisher: Packt Publishing
Format: Paperback 698 pages
FREE shipping on ALL orders

Book details

ISBN-13: 9781789132304
ISBN-10: 1789132304
Author: Nickel, Jochen
Publication date: 2019
Publisher: Packt Publishing
Format: Paperback 698 pages

Summary

Acknowledged authors Nickel, Jochen wrote Mastering Identity and Access Management with Microsoft Azure: Empower users by managing and protecting identities and data, 2nd Edition comprising 698 pages back in 2019. Textbook and eTextbook are published under ISBN 1789132304 and 9781789132304. Since then Mastering Identity and Access Management with Microsoft Azure: Empower users by managing and protecting identities and data, 2nd Edition textbook was available to sell back to BooksRun online for the top buyback price of $ 4.35 or rent at the marketplace.

Description

Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments

Key Features
  • Understand how to identify and manage business drivers during transitions
  • Explore Microsoft Identity and Access Management as a Service (IDaaS) solution
  • Over 40 playbooks to support your learning process with practical guidelines
Book Description

Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively.

You'll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.

What you will learn
  • Apply technical descriptions to your business needs and deployments
  • Manage cloud-only, simple, and complex hybrid environments
  • Apply correct and efficient monitoring and identity protection strategies
  • Design and deploy custom Identity and access management solutions
  • Build a complete identity and access management life cycle
  • Understand authentication and application publishing mechanisms
  • Use and understand the most crucial identity synchronization scenarios
  • Implement a suitable information protection strategy
Who this book is for

This book is a perfect companion for developers, cyber security specialists, system and security engineers, IT consultants/architects, and system administrators who are looking for perfectly up–to-date hybrid and cloud-only scenarios. You should have some understanding of security solutions, Active Directory, access privileges/rights, and authentication methods. Programming knowledge is not required but can be helpful for using PowerShell or working with APIs to customize your solutions.

Table of Contents
  1. Building and Managing Azure Active Directory
  2. Understanding Identity Synchronization
  3. Exploring Advanced Synchronization Concepts
  4. Monitoring Your Identity Bridge
  5. Configuring and Managing Identity Protection
  6. Managing Authentication Protocols
  7. Deploying Solutions on Azure AD and ADFS
  8. Using the Azure AD App Proxy and the Web Application Proxy
  9. Deploying Additional Applications on Azure AD
  10. Exploring Azure AD Identity Services
  11. Creating Identity Life Cycle Management on Azure
  12. Creating a New Security Culture
  13. Identifying and Detecting Sensitive Data
  14. Understanding Encryption Key Management Strategies
  15. Configuring Azure Information Protection Solutions
  16. Azure Information Protection Development Overview
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book