Book Image

Mastering Identity and Access Management with Microsoft Azure

By : Jochen Nickel
Book Image

Mastering Identity and Access Management with Microsoft Azure

By: Jochen Nickel

Overview of this book

Microsoft Azure and its Identity and Access Management is at the heart of Microsoft’s Software as a Service, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is an essential tool to master in order to effectively work with the Microsoft Cloud. Through practical, project based learning this book will impart that mastery. Beginning with the basics of features and licenses, this book quickly moves on to the user and group lifecycle required to design roles and administrative units for role-based access control (RBAC). Learn to design Azure AD to be an identity provider and provide flexible and secure access to SaaS applications. Get to grips with how to configure and manage users, groups, roles, and administrative units to provide a user- and group-based application and self-service access including the audit functionality. Next find out how to take advantage of managing common identities with the Microsoft Identity Manager 2016 and build cloud identities with the Azure AD Connect utility. Construct blueprints with different authentication scenarios including multi-factor authentication. Discover how to configure and manage the identity synchronization and federation environment along with multi -factor authentication, conditional access, and information protection scenarios to apply the required security functionality. Finally, get recommendations for planning and implementing a future-oriented and sustainable identity and access management strategy.
Table of Contents (22 chapters)
Mastering Identity and Access Management with Microsoft Azure
About the Author
About the Reviewer
Choosing the Right Technology, Methods, and Future Trends

Employee life cycle (word smart)

The relationship starts when a new employee joins the organization and his identity and corresponding information must be provided. Initially, an identification of the employee as a user will be created and an assignment of standard access rights to applications will be implemented.

The following partial processes run in a typical end-to-end process:

  • Provisioning

    • Creation of the person and identifier(s)

    • Definition of group and role memberships

    • Definition of the required system and application access

  • Authentication and Authorization

    • Validation of the person's identity

    • Determination of the right-to-access

    • Audit and security reporting

    • Management of system authorizations

  • Self-Service

    • Registration for Password Reset and maintenance of other verification options

    • Password Reset and Changes, Account Unlock

    • Maintenance of personal information

  • De-provisioning

    • Revoking of permissions/authorizations based on current role(s)

    • Deactivation of the user account

    • Deletion of the user account...