Book Image

Azure for Architects

Book Image

Azure for Architects

Overview of this book

Over the years, Azure cloud services has grown quickly, and the number of organizations adopting Azure for their cloud services is also gradually increasing. Leading industry giants are finding that Azure fulfills their extensive cloud requirements. This book will guide you through all the important and tough decision-making aspects involved in architecturing a Azure public cloud for your organization. The book starts with an extensive introduction to all the categories of designs available with Azure. These design patterns focus on different aspects of cloud such as high availability, data management, and so on. Gradually, we move on to various aspects such as building your cloud structure and architecture. It will also include a brief description about different types of services provided by Azure, such as Azure functions and Azure Analytics, which can prove beneficial for an organization. This book will cover each and every aspect and function required to develop a Azure cloud based on your organizational requirements. By the end of this book, you will be in a position to develop a full-fledged Azure cloud.
Table of Contents (13 chapters)

Security

Securing an application means not allowing unknown and unauthorized entities to access the application. It also means that communication with the application is secure and not tempered with.

This includes the following:

  • Authentication: Authentication refers to establishing the identity of a user and ensuring that the given identity can access the application or service. Authentication is performed in Azure using open connect, also known as ConnectID.
  • Authorization: Authorization refers to allowing and establishing permissions that an identity can perform within the application or service. Authorization is performed in Azure using oAuth technology.
  • Confidentiality: It refers to that communication between the user and application is secure. The payload exchange between entities is encrypted such that it will make sense only to the sender and receiver, but not otherwise...