Book Image

Implementing Azure Solutions

By : Florian Klaffenbach, Oliver Michalski, Jan-Henrik Damaschke
Book Image

Implementing Azure Solutions

By: Florian Klaffenbach, Oliver Michalski, Jan-Henrik Damaschke

Overview of this book

Microsoft Azure has numerous effective solutions that shape the future of any business. However, the major challenge that architects and administrators face are implementing these solutions appropriately. Our book focuses on various implementation scenarios that will help overcome the challenge of implementing Azure’s solutions in a very efficient manner and will also help you to prepare for Microsoft Architect exam. You will not only learn how to secure a newly deployed Azure Active Directory but also get to know how Azure Active Directory Synchronization could be implemented. To maintain an isolated and secure environment so that you can run your virtual machines and applications, you will implement Azure networking services. Also to manage, access, and secure your confidential data, you will implement storage solutions. Toward the end, you will explore tips and tricks to secure your environment. By the end, you will be able to implement Azure solutions such as networking, storage, and cloud effectively.
Table of Contents (17 chapters)
Title Page
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Customer Feedback
Preface

Resource security


The subscription is the lowest level of identity verification (for Global Administrator/Co-Administrator) and the connected Azure AD takes control of all the identities and the assigned roles and rights.

These are the basics for the Role-Based Access Control (RBAC) on Azure Resources. With the release of the new portal, the concept of an Azure Resource was introduced. Every service you create in Azure is part of a resource group or is itself a resource.

This is the place where access control takes place in Azure.

Role-based Access Control

Azure RBAC enables you to use detailed access management for Azure. Employing RBAC makes it possible to make specific choices about how user access is granted in order to perform their tasks (for example, SQL Administration). Two ways of control are possible when using the fine-grained RBAC:

RBAC role assignments are bound to a specific subscription or resource (group). Giving access to a specific Resource, does not imply access to any other...