Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By : Jochen Nickel
Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By: Jochen Nickel

Overview of this book

Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (23 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

Summary


In this chapter, we learned why you need to have a security culture in an organization, and how it relates to and is supported by an information protection strategy. Then, we discussed what data classification means and why it builds the foundation of every data security solution. During the general overview of data classification, we looked at the relevance of a data classification scheme and related policies. Finally, we saw a Microsoft AIP solution overview, which builds the technology base for the information-protection solution we'll create in the coming chapters. Using the knowledge you gained in this chapter, you'll be able to define your own classification schemes, rules, and policies. Furthermore, you know which areas are critical in a security culture and you can include the appropriate tasks into your projects.

In the next chapter, we will dive into our first practical experience with AIP: identifying and detecting sensitive data.