Book Image

Microsoft Azure Infrastructure Services for Architects

By : John Savill
Book Image

Microsoft Azure Infrastructure Services for Architects

By: John Savill

Overview of this book

With Microsoft Azure challenging Amazon Web Services (AWS) for market share, there has been no better time for IT professionals to broaden and expand their knowledge of Microsoft’s flagship virtualization and cloud computing service. Microsoft Azure Infrastructure Services for Architects: Designing Cloud Solutions helps readers develop the skills required to understand the capabilities of Microsoft Azure for Infrastructure Services and implement a public cloud to achieve full virtualization of data, both on and off premise. Microsoft Azure provides granular control in choosing core infrastructure components, enabling IT administrators to deploy new Windows Server and Linux virtual machines, adjust usage as requirements change, and scale to meet the infrastructure needs of their entire organization. This accurate, authoritative book covers topics including IaaS cost and options, customizing VM storage, enabling external connectivity to Azure virtual machines, extending Azure Active Directory, replicating and backing up to Azure, disaster recovery, and much more
Table of Contents (18 chapters)
Free Chapter
About the Author
End User License Agreement

Azure AD Security

This section will explore key considerations around Azure AD security, with a focus on the user. As with any type of security, you can be secure and out of business—that is, an organization can implement great security that renders the business unable to function. The key is to provide security while not significantly impacting the ability of business to function.

Multi-Factor Authentication

You can barely read any identity security article today without seeing the words “the password is dead.” I don’t think this is actually true yet, but the industry is definitely heading in that direction. Passwords are unpopular for a number of reasons, but the primary reason is that they are a network secret. If I know a password, I can use it from anywhere on anything. That is very different from a PIN, which only works on a specific device. A challenge with passwords is making them complex enough so they are not prone to brute force attacks while not...