Book Image

Mastering Identity and Access Management with Microsoft Azure

By : Jochen Nickel
Book Image

Mastering Identity and Access Management with Microsoft Azure

By: Jochen Nickel

Overview of this book

Microsoft Azure and its Identity and Access Management is at the heart of Microsoft’s Software as a Service, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is an essential tool to master in order to effectively work with the Microsoft Cloud. Through practical, project based learning this book will impart that mastery. Beginning with the basics of features and licenses, this book quickly moves on to the user and group lifecycle required to design roles and administrative units for role-based access control (RBAC). Learn to design Azure AD to be an identity provider and provide flexible and secure access to SaaS applications. Get to grips with how to configure and manage users, groups, roles, and administrative units to provide a user- and group-based application and self-service access including the audit functionality. Next find out how to take advantage of managing common identities with the Microsoft Identity Manager 2016 and build cloud identities with the Azure AD Connect utility. Construct blueprints with different authentication scenarios including multi-factor authentication. Discover how to configure and manage the identity synchronization and federation environment along with multi -factor authentication, conditional access, and information protection scenarios to apply the required security functionality. Finally, get recommendations for planning and implementing a future-oriented and sustainable identity and access management strategy.
Table of Contents (22 chapters)
Mastering Identity and Access Management with Microsoft Azure
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
16
Choosing the Right Technology, Methods, and Future Trends

Chapter 15.  Installing and Configuring Information Protection Features

In this chapter, we will configure information protection features with Azure RMS to secure access to sensitive data to provide an extended access management solution. We will start with the extension of the basic infrastructure that we already deployed in previous chapters. The focus of the starting configuration tasks will be on Exchange on-premise, Exchange Online, and SharePoint. Afterwards, we will configure and publish custom rights policy templates, enable RMS logging, and provide you with a first view on the new Azure Information Protection capabilities.

We will cover the following topics:

  • Preparing your admin workstation to manage Azure RMS

  • Configuring onboarding controls

  • Delegating administrative permissions

  • Enabling Azure RMS super users

  • Configuring Exchange to use Rights Management capabilities

  • Configuring Exchange Online to use Rights Management capabilities

  • Configuring SharePoint to use Rights Management capabilities...