Book Image

Implementing Azure Solutions

By : Florian Klaffenbach, Oliver Michalski, Jan-Henrik Damaschke
Book Image

Implementing Azure Solutions

By: Florian Klaffenbach, Oliver Michalski, Jan-Henrik Damaschke

Overview of this book

Microsoft Azure has numerous effective solutions that shape the future of any business. However, the major challenge that architects and administrators face are implementing these solutions appropriately. Our book focuses on various implementation scenarios that will help overcome the challenge of implementing Azure’s solutions in a very efficient manner and will also help you to prepare for Microsoft Architect exam. You will not only learn how to secure a newly deployed Azure Active Directory but also get to know how Azure Active Directory Synchronization could be implemented. To maintain an isolated and secure environment so that you can run your virtual machines and applications, you will implement Azure networking services. Also to manage, access, and secure your confidential data, you will implement storage solutions. Toward the end, you will explore tips and tricks to secure your environment. By the end, you will be able to implement Azure solutions such as networking, storage, and cloud effectively.
Table of Contents (17 chapters)
Title Page
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Customer Feedback
Preface

Azure Identity Security


Security boundaries are often thought of as firewalls, IPS/IDS systems, or routers. Also, logical setups such as DMZs or other network constructs are often referred to as boundaries.

But in the modern world, where many companies support dynamic work models that allow you to bring your own device (BYOD) or are heavily using online services for their work, the real boundary is the identity.

Identities are often the target of hackers as they resell them or use them to steal information. To make the attacks as hard as possible, it's important to have a well-conceived and centralized identity management. The Azure Active Directory provides that and a lot more to support your security strategy and simplify complex matters such as monitoring of privileged accounts or authentication attacks.

Azure Active Directory

Azure Active Directory (AAD) is a very important service that many other services are based on. It's not a directory service like many may think of when they hear the...