Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By : Jochen Nickel
Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By: Jochen Nickel

Overview of this book

Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (23 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

How Azure RMS works under the hood


It's quite important to how RMS works it delivers the data protection service of the complete Azure Information Protection solution. First of all, the protected data will never be transferred to the Azure Information Protection or Rights Management service itself. Basically, the data is encrypted at the application level and includes a policy that defines who is authorized and which usage rights are applied for these users. Keep in mind that group memberships are cached for three hours. So, if you change permissions, remember this to avoid misinterpreted results. To get a better understanding of the three typical flows, let's explore the flows in this section. But first, we'll look at the algorithms and key lengths used by Azure RMS.

Algorithms and key lengths

Azure RMS uses the following cryptographic controls in the different usage scenarios. The following table gives you the needed information if you get asked in a project or workshop:

Cryptographic controls...