Mastering Identity and Access Management with Microsoft Azure
- 0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Mastering Identity and Access Management with Microsoft Azure

Empower users by managing and protecting identities and data, 2nd Edition
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9781789131154
Veröffentl:
2019
Seiten:
698
Autor:
Jochen Nickel
eBook Typ:
EPUB
eBook Format:
Reflowable
Kopierschutz:
NO DRM
Sprache:
Englisch
Beschreibung:

Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environmentsKey FeaturesUnderstand how to identify and manage business drivers during transitionsExplore Microsoft Identity and Access Management as a Service (IDaaS) solutionOver 40 playbooks to support your learning process with practical guidelinesBook DescriptionMicrosoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively.You'll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.What you will learnApply technical descriptions to your business needs and deploymentsManage cloud-only, simple, and complex hybrid environmentsApply correct and efficient monitoring and identity protection strategiesDesign and deploy custom Identity and access management solutionsBuild a complete identity and access management life cycleUnderstand authentication and application publishing mechanismsUse and understand the most crucial identity synchronization scenariosImplement a suitable information protection strategyWho this book is forThis book is a perfect companion for developers, cyber security specialists, system and security engineers, IT consultants/architects, and system administrators who are looking for perfectly up-to-date hybrid and cloud-only scenarios. You should have some understanding of security solutions, Active Directory, access privileges/rights, and authentication methods. Programming knowledge is not required but can be helpful for using PowerShell or working with APIs to customize your solutions.

Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments




Key Features



  • Understand how to identify and manage business drivers during transitions


  • Explore Microsoft Identity and Access Management as a Service (IDaaS) solution


  • Over 40 playbooks to support your learning process with practical guidelines



Book Description



Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively.






You'll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.




What you will learn



  • Apply technical descriptions to your business needs and deployments


  • Manage cloud-only, simple, and complex hybrid environments


  • Apply correct and efficient monitoring and identity protection strategies


  • Design and deploy custom Identity and access management solutions


  • Build a complete identity and access management life cycle


  • Understand authentication and application publishing mechanisms


  • Use and understand the most crucial identity synchronization scenarios


  • Implement a suitable information protection strategy



Who this book is for



This book is a perfect companion for developers, cyber security specialists, system and security engineers, IT consultants/architects, and system administrators who are looking for perfectly up–to-date hybrid and cloud-only scenarios. You should have some understanding of security solutions, Active Directory, access privileges/rights, and authentication methods. Programming knowledge is not required but can be helpful for using PowerShell or working with APIs to customize your solutions.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.