Jochen Nickel is a Cloud, Identity and Access Management Solution Architect with a focus and technical deep knowledge of Identity and Access Management. He is currently working for inovit GmbH in Switzerland and spends the majority of each work day planning, designing, and implementing Identity and Access Management solutions, single parts such as Microsoft Azure Active Directory Premium and Microsoft Azure Rights Management Services, or complete Enterprise Mobility Suite solutions. He has also been part of many projects, proofs of concepts, reviews, reference architectures, and workshops in this field of technology. Furthermore, he is a Microsoft V-TSP Security, Identity and Access Management, Microsoft Switzerland, and uses his experience for directly managed business accounts in Switzerland. He has also been an established speaker at many technology conferences. As an active writer and reviewer, Jochen authored Learning Microsoft Windows Server 2012 Dynamic Access Control and reviewed Windows Server 2012 Unified Remote Access Planning and Deployment by Erez Ben-Ari and Bala Natarajan, as well as Windows Server 2012 R2 Administrator Cookbook by Jordan Krause, a Microsoft MVP. He is also reviewing Microsoft Identity Manager 2016 Handbook for Packt Publishing. Committed to continuous learning, he holds Microsoft certifications such as MCSD Azure Solutions Architect, MCITP, MCSE/A Office 365/Private Cloud, MCTS, and many other security titles such as Certified Information Systems Auditor (CISA). He enjoys spending as much time as possible with his family to recharge, in order to handle such interesting technologies.
Mastering Identity and Access Management with Microsoft Azure
By :
Mastering Identity and Access Management with Microsoft Azure
By:
Overview of this book
Microsoft Azure and its Identity and Access Management is at the heart of Microsoft’s Software as a Service, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is an essential tool to master in order to effectively work with the Microsoft Cloud. Through practical, project based learning this book will impart that mastery.
Beginning with the basics of features and licenses, this book quickly moves on to the user and group lifecycle required to design roles and administrative units for role-based access control (RBAC). Learn to design Azure AD to be an identity provider and provide flexible and secure access to SaaS applications. Get to grips with how to configure and manage users, groups, roles, and administrative units to provide a user- and group-based application and self-service access including the audit functionality.
Next find out how to take advantage of managing common identities with the Microsoft Identity Manager 2016 and build cloud identities with the Azure AD Connect utility. Construct blueprints with different authentication scenarios including multi-factor authentication. Discover how to configure and manage the identity synchronization and federation environment along with multi -factor authentication, conditional access, and information protection scenarios to apply the required security functionality.
Finally, get recommendations for planning and implementing a future-oriented and sustainable identity and access management strategy.
Table of Contents (22 chapters)
Mastering Identity and Access Management with Microsoft Azure
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Free Chapter
Getting Started with a Cloud-Only Scenario
Planning and Designing Cloud Identities
Planning and Designing Authentication and Application Access
Building and Configuring a Suitable Azure AD
Shifting to a Hybrid Scenario
Extending to a Basic Hybrid Environment
Designing Hybrid Identity Management Architecture
Planning Authorization and Information Protection Options
Building Cloud from Common Identities
Implementing Access Control Mechanisms
Managing Transition Scenarios with Special Scenarios
Advanced Considerations for Complex Scenarios
Delivering Multi-Forest Hybrid Architectures
Installing and Configuring the Enhanced Identity Infrastructure
Installing and Configuring Information Protection Features
Choosing the Right Technology, Methods, and Future Trends
Customer Reviews