Design Authorization for Microsoft Azure
As Azure AD forms the foundation for identity in the cloud, authorization becomes the cornerstone of providing service access within Azure and across cloud services. This course teaches the authorization options available with Azure and Azure AD.
What you'll learn
Authorization can be a very complex topic when looking at leveraging services across clouds via a centralized identity. In this course, Designing Authorization for Microsoft Azure, you will learn foundational knowledge of authorization with Azure and Azure AD. First, you will learn the key concepts around delegated authorization. Next, you will discover the authorization capabilities for Azure and Azure AD. Finally, you will explore how to integrate applications with Azure AD and control the delegation. When you’re finished with this course, you will have the skills and knowledge of authorization in Azure AD needed to enable you to securely and efficiently leverage Azure and other cloud services in a seamless manner.
Table of contents
- Module Introduction 2m
- Why This Is Important 1m
- Four Pillars of Identity Review 1m
- What Is Authorization? 4m
- The Two Buckets for Authorization 9m
- Authorization Schemes 4m
- Least Privilege and Just-in-Time 3m
- Coarse and Fine-grained Authorization 2m
- The Importance of Authorization 3m
- Using Consent and Authorization 10m
- Front and Back-end Channels 4m
- Token Flows 3m
- Token Details 5m
- Token Brokers 2m
- Module Summary 1m
- Module Introduction 1m
- Azure AD Group Refresher 5m
- Azure Resource Structure 7m
- Azure Roles 5m
- Using Custom Azure Roles 6m
- Azure AD Roles 7m
- Using Access Reviews 3m
- Using Privileged Identity Management 9m
- Leveraging Identity Protection 5m
- Conditional Access Overview 9m
- Using Conditional Access 4m
- Conditional Access Demo 2m
- Two Key Application Scenarios 6m
- Applications Have Secrets 4m
- Azure Key Vault 4m
- Enforcing Application Scope 2m
- Repudiation Options 3m
- Controlling Physical Access 5m
- Module Summary 1m