Book Image

Learn Azure Administration

By : Kamil Mrzygłód
Book Image

Learn Azure Administration

By: Kamil Mrzygłód

Overview of this book

Microsoft Azure is one of the upcoming cloud platforms that provide cost-effective solutions and services to help businesses overcome complex infrastructure-related challenges. This book will help you scale your cloud administration skills with Microsoft Azure. Learn Azure Administration starts with an introduction to the management of Azure subscriptions, and then takes you through Azure resource management. Next, you'll configure and manage virtual networks and find out how to integrate them with a set of Azure services. You'll then handle the identity and security for users with the help of Azure Active Directory, and manage access from a single place using policies and defined roles. As you advance, you'll get to grips with receipts to manage a virtual machine. The next set of chapters will teach you how to solve advanced problems such as DDoS protection, load balancing, and networking for containers. You'll also learn how to set up file servers, along with managing and storing backups. Later, you'll review monitoring solutions and backup plans for a host of services. The last set of chapters will help you to integrate different services with Azure Event Grid, Azure Automation, and Azure Logic Apps, and teach you how to manage Azure DevOps. By the end of this Azure book, you'll be proficient enough to easily administer your Azure-based cloud environment.
Table of Contents (15 chapters)
1
Section 1: Understanding the Basics
5
Section 2: Identity and Access Management
9
Section 3: Advanced Topics

Configuring access to Azure resources

In the previous section, you learned how to create a custom role. The next step is to actually use it in Azure resources. Configuring access in Azure is really simple as it is mostly covered by the Identity and Access Management (IAM) feature, which is available both in the portal and through the command line.

In this section, we will show you how quickly we can configure access for your services and validate who has permissions to read or modify them. You are going to learn what role-based access control (RBAC) is and how to use it.

RBAC, as its name implies, relates to controlling access to resources via roles. Each role consists of one or more permissions that describe individual operations a user or an application may perform. You may think of a role as a container for available (or not permitted) operations or actions. While you could assign each permission to each individual identity, it would be a real burden to manage them on...