Index
A
- Access Control Lists (ACLs)
- Access Control Service (ACS)
- about / Working with the Service Bus
- Account keys, Storage
- about / Account keys
- ACS
- about / Azure AD Access Control Service
- workflow / Azure AD Access Control Service
- implementation / Azure AD Access Control Service
- Facebook, configuring as Identity Provider / Configuring Facebook as an Identity Provider
- Azure AD, configuring as Identity Provider / Configuring Azure AD as an Identity Provider
- claims transformations, applying / Applying claims transformations
- integrating with ASP.NET / Integration with ASP.NET
- Active Directory Authentication Library (ADAL) library
- about / Azure AD Graph API
- advanced authentication
- about / Advanced authentication
- Multi-Factor Authentication / Multi-Factor Authentication
- Management Certificate / Management Certificates
- affinity cookie
- about / Websites
- Application Program Interface (API)
- about / Network communication
- Application Request Routing (ARR)
- about / Websites
- app passwords
- about / Two-step verification
- ASP.NET
- ACS, integrating / Integration with ASP.NET
- Authentication apps
- reference link / Multi-Factor Authentication
- authenticator app
- about / Authenticator app
- Azure
- security standards / Security standards in Azure
- Azure AD
- about / Creating a custom Azure Active Directory, Azure Active Directory
- user access, configuring / Configuring the Azure Directory user access
- users, creating / Configuring the Azure Directory user access
- groups, creating / Configuring the Azure Directory user access
- claims-based authentication / Azure Active Directory
- single-tenant applications / Azure Active Directory, Single-tenant applications
- multi-tenant applications / Azure Active Directory, Multi-tenant applications
- application, integrating / Azure Active Directory
- Graph API / Azure AD Graph API
- ACS / Azure AD Access Control Service
- configuring, as Identity Provider / Configuring Azure AD as an Identity Provider
- Azure AD, options
- Authentication apps / Multi-Factor Authentication
- Automated phone calls / Multi-Factor Authentication
- Automated SMS messages / Multi-Factor Authentication
- Azure AD Graph API
- about / Azure AD Graph API
- directory extensions / Directory extensions
- Azure Backup
- about / Azure Backup
- backup vault, configuring / Configuring a backup vault
- server, registering / Registering a server
- schedule, backing up / Scheduling backups
- URL, for restoration process / Scheduling backups
- Azure Linux Agent
- reference link / Creation: Windows versus Linux
B
- backups, Websites
- about / Backups
- breach / CIA triangle
- Bring Your Own Device (BYOD) / Mobile devices
C
- cache
- about / Working with a cache
- Managed Cache / Azure Managed Cache
- Redis Cache / Azure Redis Cache
- Chief Information Security Officer (CISO) / Security management
- CIA triangle
- about / CIA triangle
- confidentiality / CIA triangle
- integrity / CIA triangle
- availability / CIA triangle
- claims-based authentication, Azure AD
- about / Azure Active Directory
- identity / Azure Active Directory
- claim / Azure Active Directory
- Classless Inter-Domain Routing (CIDR)
- about / Endpoints and ACLs
- cloud-only VNet
- about / Virtual Networks
- Cloud Services
- about / Cloud Services
- remote endpoints / Remote endpoints
- Remote Desktop / Remote Desktop
- startup tasks / Startup tasks
- Microsoft Antimalware / Microsoft Antimalware
- network communication / Network communication
- co-administrator
- adding, to subscription / Adding a co-administrator to the subscription
- code, hosting
- about / Hosting the code
- Cloud Services / Cloud Services
- Websites / Websites
- code of conduct / Human resources
- compliance
- implementing / Compliance
- connection modes, Websites
- about / Connection modes
- connection strings, Websites
- about / Settings and connection strings
- Consent Framework
- about / Consent Framework
- Create, Read, Update, and Delete (CRUD) operations
- about / Azure AD Graph API
- credentials, Websites
- about / Credentials
- user-level credentials / Credentials
- site-level credentials / Credentials
- example / Credentials
- cross-premises VNet
- about / Virtual Networks
- Custom Application
- about / Azure Active Directory
- custom Azure Active Directory
- creating / Creating a custom Azure Active Directory
- Customer Relationship Management (CRM) / Security management
D
- data, hosting
- about / Hosting the data
- Storage / Storage
- SQL Database / SQL Database
- datacenter / Security standards in Azure
- Denial of Service (DoS) / Access control
- Deployment
- about / Endpoints and ACLs
- directory extensions, Azure AD Graph API
- about / Directory extensions
- specifications / Directory extensions
- obtaining / Directory extensions
- Distributed Denial of Service (DDOS) / Security
- due care / Security management
- due diligence / Security management
E
- encryption / Cryptography
- Entity Framework (EF)
- about / Settings and connection strings
- ExpressRoute / Hybrid networks
- Extended Key Usage (EKU) / Configuring a backup vault
- extension
- about / Remote Desktop
- extensions, Websites
- about / Extensions
- native (or preinstalled) / Extensions
- third-party (private or from a gallery) / Extensions
- URL / Extensions
- external security, Virtual Machines
- about / External security
- Windows, versus Linux / Creation: Windows versus Linux
- ACLs / Endpoints and ACLs
- endpoints / Endpoints and ACLs
- networking / Networking and isolation
- isolation / Networking and isolation
- extensions / Extensions
F
- Facebook
- configuring, as Identity Provider / Configuring Facebook as an Identity Provider
- Federation Metadata Document
- reference link / Available claims and security groups
- Fiddler
- URL / Inspecting messages
- FTP
- about / Connection modes
G
- Geo-Redundant Storage (GRS)
H
- Hardware Security Modules (HSMs)
- about / Azure Key Vault
- hybrid networks
- about / Hybrid networks
- site-to-site / Hybrid networks
- point-to-site / Hybrid networks
- ExpressRoute / Hybrid networks
I
- IAM, in current portal
- URL / IAM in the current portal
- about / IAM in the current portal
- custom Azure Active Directory, creating / Creating a custom Azure Active Directory
- co-administrator, adding to subscription / Adding a co-administrator to the subscription
- Microsoft account, securing / Securing the Microsoft account
- IAM, in Preview portal
- about / IAM in the Preview portal
- URL / IAM in the Preview portal, Adding a user in the Preview portal
- Role-Based Access Control / Role-Based Access Control
- user, adding / Adding a user in the Preview portal
- Identity Provider
- about / Azure Active Directory
- Facebook, configuring / Configuring Facebook as an Identity Provider
- Azure AD, configuring / Configuring Azure AD as an Identity Provider
- incidents / CIA triangle
- information security
- fundamentals / Information security fundamentals
- CIA triangle / CIA triangle
- managing / Security management
- risk analysis / Risk analysis
- preventive measure / Risk analysis
- detective measure / Risk analysis
- repressive measure / Risk analysis
- Information Security Management (ISM) / CIA triangle
- Information Security Management System (ISMS) / Security management
- Information Security Officer (ISO) / Security management
- InstanceInput endpoint
- about / Network communication
- Instant Messaging (IM) / Communication
- Intellectual Property (IP) / Laws and regulations
- internal endpoints
- about / Network communication
- internal security, Virtual Machines
- about / Internal security
- operating system firewall / Operating system firewall
- auditing / Auditing and best practices
- best practices / Auditing and best practices
- International Electrotechnical Commission (IEC) / Introducing ISO/IEC 27000
- International Organization for Standardization (ISO) / Introducing ISO/IEC 27000
- ISO/IEC 27000
- about / Introducing ISO/IEC 27000
K
- key
- adding / Adding a key or secret
- Key Vault
- about / Azure Key Vault
- creating / Creating a Key Vault
- URL / Creating a Key Vault, Using the .NET client library
- vault, creating / Creating the vault
- key, adding / Adding a key or secret
- secret, adding / Adding a key or secret
- .NET client library, using / Using the .NET client library
- Key Vault Client Libraries
- URL / Creating a Key Vault
- Kudu
- about / Project Kudu
L
- load balancer
- about / Network communication
- Locally Redundant Storage (LRS)
- logical measures
- logical security
- about / Logical security and controls
- human resources / Human resources
- access control / Access control
- mobile devices / Mobile devices
- cryptography / Cryptography
- communication / Communication
- software management / Software management
- laws and regulations / Laws and regulations
M
- man-in-the-middle / Cryptography
- Managed Cache
- about / Azure Managed Cache
- SSL / SSL
- named caches / Named caches
- Management Certificate
- about / Management Certificates
- setting up / Setting up a Management Certificate
- Microsoft account
- securing / Securing the Microsoft account
- advanced security, setting up / Securing the Microsoft account
- two-step verification / Two-step verification
- authenticator app / Authenticator app
- Microsoft Antimalware
- about / Microsoft Antimalware
- enabling / Microsoft Antimalware
- Microsoft Azure Security Whitepaper
- URL / Networking and isolation
- Microsoft Azure Trust Center
- Microsoft Installers (MSIs)
- about / Startup tasks
- Microsoft Technet documentation
- reference link / Operating system firewall
- Multi-Factor Authentication
- about / Multi-Factor Authentication
- setting up / Setting up Multi-Factor Authentication
- reference link / Setting up Multi-Factor Authentication
- multi-tenant applications
- about / Multi-tenant applications
- Consent Framework / Consent Framework
N
- .NET client library
- using / Using the .NET client library
- named caches
- about / Named caches
- network communication, Cloud Services
- about / Network communication
- Network Security Groups (NSG)
- about / Network Security Groups
- Non-Disclosure Agreements (NDA) / Human resources
O
- Office 365
- about / Azure Active Directory
P
- performance targets, Storage
- Personal Information Exchange (PFX) file
- physical measures
- physical security
- about / Physical security and controls
- boundaries / Security boundaries
- mobile equipment / Mobile equipment
- Platform as a Service (PaaS) / Security standards in Azure
- point-to-site connection / Hybrid networks
- POODLE issue
- privacy
- implementing / Privacy
- Project Kudu
- URL / Hosting the code
- about / Project Kudu
- Public Key Infrastructure (PKI) / Cryptography
- publish profile
- about / Credentials
R
- re-image process
- about / Remote Desktop
- Redis Cache
- about / Azure Redis Cache
- URL / Azure Redis Cache
- databases / Databases
- Redis Cluster
- URL / Databases
- relying party application
- about / Applying claims transformations
- Remote Desktop, Cloud Services
- about / Remote Desktop
- Remote Desktop Protocol (RDP)
- about / Remote Desktop
- remote endpoints, Cloud Services
- about / Remote endpoints
- role
- about / Remote endpoints
- Role-Based Access Control
- URL / Roles
- Role-Based Access Control (RBAC) / Access control
- Role-Based Access Control, IAM
- about / Role-Based Access Control
- roles / Roles
- hierarchy, of security objects / Hierarchy of security objects
S
- scalability, Storage
- secret
- adding / Adding a key or secret
- security
- security, measures
- security, software development
- local development tools / Local development tools
- source code access / Access to source code
- credentials management / Credentials management
- Security Assertion Markup Language (SAML)
- about / Inspecting messages
- Security Development Lifecycle (SDL)
- security objects, hierarchy
- subscription / Hierarchy of security objects
- resource group / Hierarchy of security objects
- individual resource / Hierarchy of security objects
- security settings, Linux VM
- administrator username / Creation: Windows versus Linux
- administrator password / Creation: Windows versus Linux
- administrator SSH Key / Creation: Windows versus Linux
- Storage Account / Creation: Windows versus Linux
- endpoints / Creation: Windows versus Linux
- VM Agent / Creation: Windows versus Linux
- security settings, Windows VM
- administrator username / Creation: Windows versus Linux
- administrator password / Creation: Windows versus Linux
- Storage Account / Creation: Windows versus Linux
- endpoints / Creation: Windows versus Linux
- VM Agent / Creation: Windows versus Linux
- security standards, Azure
- about / Security standards in Azure
- security, implementing / Security
- privacy, implementing / Privacy
- compliance, implementing / Compliance
- Server Message Block (SMB)
- about / Shared Access Signatures
- Service Bus
- about / Working with the Service Bus
- Queues / Working with the Service Bus
- Topics / Working with the Service Bus
- Event Hubs / Working with the Service Bus
- Notification Hubs / Working with the Service Bus
- Relay Services / Working with the Service Bus
- Shared Access Policy (SAP) / Shared Access Policies
- Service Gateway / Networking and isolation
- reference link / Networking and isolation
- Service Level Agreement (SLA) / Security standards in Azure
- settings, Websites
- about / Settings and connection strings
- Shared Access Policy (SAP)
- about / Shared Access Policies
- Sender / Shared Access Policies
- Receiver / Shared Access Policies
- Shared Access Signature (SAS), Storage
- about / Shared Access Signatures
- shared environment / Security standards in Azure
- single-tenant applications
- about / Single-tenant applications
- creating / Single-tenant applications
- messages, inspecting / Inspecting messages
- available claims, discovering / Available claims and security groups
- security groups / Available claims and security groups
- Single Sign-On (SSO)
- about / Single-tenant applications
- site-level credentials
- about / Credentials
- pattern / Credentials
- site-to-site connection / Hybrid networks
- smartphone verification
- about / Authenticator app
- Software as a Service (SaaS) / Security standards in Azure
- software development
- security / Security in software development
- Source Control manager (SCM)
- about / Extensions
- SQL Database
- about / SQL Database
- firewall rules, setting up / Setting up firewall rules
- users and roles, setting up / Setting up users and roles
- connection settings / Connection settings
- SQL Server Management Studio (SSMS)
- about / Setting up users and roles
- SSH keys
- reference link / Creation: Windows versus Linux
- SSL
- about / SSL
- startup tasks, Cloud Services
- about / Startup tasks
- sticky sessions
- about / Websites
- Storage
- about / Storage
- Account keys / Account keys
- Shared Access Signature (SAS) / Shared Access Signatures
- scalability / Scalability and performance targets
- performance targets / Scalability and performance targets
- Storage Account
- about / Backups
- Storage Files
- about / Shared Access Signatures
- Symmetric Encryption / Cryptography
- System Center Data Protection Manager
- about / Azure Backup
T
- Transport Layer Security (TLS)
- about / Connection modes
- two-step verification
- setting up / Two-step verification
U
- user-level credentials
- about / Credentials
V
- vault
- about / Creating the vault
- creating / Creating the vault
- Virtual Hard Disk (VHD) / Creation: Windows versus Linux
- Virtual Machine (VM) / Access to source code
- Virtual Machines
- about / Virtual Machines
- external security / External security, Creation: Windows versus Linux, Endpoints and ACLs, Networking and isolation, Extensions
- internal security / Internal security, Operating system firewall, Auditing and best practices
- Virtual Networks
- about / Virtual Networks
- Network Security Groups (NSG) / Network Security Groups
- hybrid networks / Hybrid networks
- Virtual Private Network (VPN) / Security management
- VM Depot
- about / Creation: Windows versus Linux
- reference link / Creation: Windows versus Linux
W
- Web Deploy
- using / Remote Desktop
- reference link / Remote Desktop
- web role
- about / Remote endpoints
- Websites
- about / Websites
- Project Kudu / Project Kudu
- credentials / Credentials
- connection modes / Connection modes
- settings / Settings and connection strings
- connection strings / Settings and connection strings
- backups / Backups
- extensions / Extensions
- Windows Identity Foundation (WIF)
- about / Applying claims transformations
- worker role
- about / Remote endpoints
X
- XML Document Transformation (XDT)
- about / Extensions