Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By : Jochen Nickel
Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By: Jochen Nickel

Overview of this book

Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (23 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

What defines single- and multi-tenant applications


On the face of it, there's a simple explanation of what a single-tenant or a multi-tenant application is. We can say that single-tenant apps are only available in the tenant they were registered. On the other hand, multi-tenant apps are available to users in both your home tenant and in other tenants:

  • Single-tenantapplications are primarily used if you want to isolate your application from everyone and provide access only to your internal users
  • Multi-tenantapplications are used when you want to provide the app to your internal staff, guest users, and Microsoft personal account users in a collaboration scenario, for example

We highly recommend reviewing https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant to find the differences between the endpoints that are used in both scenarios.