Book Image

Microsoft Azure Security

Book Image

Microsoft Azure Security

Overview of this book

Table of Contents (12 chapters)

Summary


In this chapter, we talked about Azure AD as a great resource while developing applications that need an IAM solution and we discovered the interesting role of ACS as a collector of Identity Providers.

We used Key Vault to create a secure place to store keys and secrets and we investigated some practices to use it from the applications.