logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Mastering Identity And Access Management With Microsoft Azure Jochen Nickel

  • SKU: BELL-6821384
Mastering Identity And Access Management With Microsoft Azure Jochen Nickel
$ 31.00 $ 45.00 (-31%)

4.0

96 reviews

Mastering Identity And Access Management With Microsoft Azure Jochen Nickel instant download after payment.

Publisher: Packt Publishing
File Extension: PDF
File size: 32.07 MB
Pages: 692
Author: Jochen Nickel
ISBN: 9781785889448, 1785889443
Language: English
Year: 2016

Product desciption

Mastering Identity And Access Management With Microsoft Azure Jochen Nickel by Jochen Nickel 9781785889448, 1785889443 instant download after payment.

Start empowering users and protecting corporate data, while managing Identities and Access with Microsoft Azure in different environments

About This Book
  • Deep dive into the Microsoft Identity and Access Management as a Service (IDaaS) solution
  • Design, implement and manage simple and complex hybrid identity and access management environments
  • Learn to apply solution architectures directly to your business needs and understand how to identify and manage business drivers during transitions
Who This Book Is For

This book is for business decision makers, IT consultants, and system and security engineers who wish to plan, design, and implement Identity and Access Management solutions with Microsoft Azure.

What You Will Learn
  • Apply technical descriptions and solution architectures directly to your business needs and deployments
  • Identify and manage business drivers and architecture changes to transition between different scenarios
  • Understand and configure all relevant Identity and Access Management key features and concepts
  • Implement simple and complex directory integration, authentication, and authorization scenarios
  • Get to know about modern identity management, authentication, and authorization protocols and standards
  • Implement and configure a modern information protection solution
  • Integrate and configure future improvements in authentication and authorization functionality of Windows 10 and Windows Server 2016
In Detail

Microsoft Azure and its Identity and Access Management is at the heart of Microsoft s Software as a Service, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is an essential tool to master in order to effectively work with the Microsoft Cloud. Through practical, project based learning this book will impart that mastery.

Beginning with the basics of features and licenses, this book quickly moves on to the user and group lifecycle required to design roles and administrative units for role-based access control (RBAC). Learn to design Azure AD to be an identity provider and provide flexible and secure access to SaaS applications. Get to grips with how to configure and manage users, groups, roles, and administrative units to provide a user- and group-based application and self-service access including the audit functionality.

Next find out how to take advantage of managing common identities with the Microsoft Identity Manager 2016 and build cloud identities with the Azure AD Connect utility. Construct blueprints with different authentication scenarios including multi-factor authentication. Discover how to configure and manage the identity synchronization and federation environment along with multi -factor authentication, conditional access, and information protection scenarios to apply the required security functionality.

Finally, get recommendations for planning and implementing a future-oriented and sustainable identity and access management strategy.

Style and approach

A practical, project-based learning experience explained through hands-on examples.

Related Products