Book Image

Architecting Microsoft Azure Solutions - Exam Guide 70-535

By : Sjoukje Zaal
Book Image

Architecting Microsoft Azure Solutions - Exam Guide 70-535

By: Sjoukje Zaal

Overview of this book

Architecting Microsoft Azure Solutions: Exam Guide 70-535 will get Azure architects and developers up-to-date with the latest updates on Azure from an architecture and design perspective. The book includes all the topics that are still relevant from the previous 70-534 exam, and is updated with latest topics covered, including Artificial Intelligence, IoT, and architecture styles. This exam guide is divided into six parts, where the first part will give you a good understanding of how to design a compute infrastructure. It also dives into designing networking and data implementations. You will learn about designing solutions for Platform Service and operations. Next, you will be able to secure your resources and data, as well as design a mechanism for governance and policies. You will also understand the objective of designing solutions for Platform Services, by covering Artificial Intelligence, IoT, media services, and messaging solution concepts. Finally, you will cover the designing for operations objective. This objective covers application and platform monitoring, as well as designing alerting strategies and operations automation strategies. By the end of the book, you’ll have met all of the exam objectives, and will have all the information you need to ace the 70-535 exam. You will also have become an expert in designing solutions on Microsoft Azure.
Table of Contents (20 chapters)
Appendix A – Assessments
Appendix B – Mock Test Questions
Appendix C – Mock Test Answers

Azure AD Privileged Identity Management

Azure AD Privileged Identity Management (PIM) is an Azure AD Premium P2 or Enterprise Mobility + Security E5 feature. With PIM, you can manage and control all access inside the Azure AD tenant, such as access to Azure resources, Office 365, Intune, and Azure AD.

In RBAC, you can grant permanent role access. With PIM, you can grant eligible role access to users. Users that don't need permanent access to resources can request access for a predetermined amount of time when certain type of permissions are needed. For instance, a user can request temporary SharePoint Administrator permissions. This request can be approved by the Delegated Approver, and the permissions are deactivated when the user is done.

PIM uses the following flow:

  • User Request: The users requests access using an online form for specific permissions for a predefined...