Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By : Jochen Nickel
Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By: Jochen Nickel

Overview of this book

Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (23 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

Understanding and using AIP capabilities for data in motion


The meaning of data in motion or transit is that information is actively moving from one location to another inside your environment or outside through the internet. Typically, the process starts with the creation of a document, presentation, or spreadsheet, or the export of information from a source, such as the HR, CRM, or another system. The best option is to include the classification and protection process directly in these processes. Otherwise, you need to be able to detect and identify sensitive data from scratch on client computers and servers. Another important thing is that you know where your sensitive, protected, or not-protected information is exchanged and stored. Let's say you need a solution that's able to monitor the sensitive data on client computers, on-premises, and in the cloud. Microsoft follows this strategy and provides the following technologies to fulfill these requirements to actively monitor sensitive...