Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Mastering Identity and Access Management with Microsoft Azure
Mastering Identity and Access Management with Microsoft Azure

Mastering Identity and Access Management with Microsoft Azure: Start empowering users and protecting corporate data, while managing Identities and Access with Microsoft Azure in different environments

eBook
$35.99 $51.99
Paperback
$65.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

Mastering Identity and Access Management with Microsoft Azure

Chapter 2.  Planning and Designing Cloud Identities

Having read through the first chapter, you will have realized that Microsoft Azure provides a whole bunch of functionality for Identity and Access Management. Now, after hearing the relevant business information, we will dive into the architecture of Azure Active Directory to understand the relevant concepts and design dependencies for cloud-only identities. Furthermore, we will see that small or innovative companies often follow the cloud-only strategy. This is perfectly normal, as most companies have an existing local IT infrastructure. Often you will find a domain controller and file/print services on-premises, but Azure Active Directory also provides users with important Identity Management as a Service and identity repository features for a more flexible and value added IT ecosystem. After reading this chapter, you will also be able to design and construct roles and administrative units for Role Based Access Control (RBAC...

Understanding the user and group life cycle

One of the basic concepts to understand is the user and group life cycle, so it's very important to understand the different repositories and capabilities where objects are stored and managed. In this section, we will provide you with the necessary information for designing your solution.

Microsoft Azure Identity repositories and capabilities

IAM is a very broad field in technology. Internet threats are becoming more intelligent and effective, so IAM solutions must constantly evolve to keep up. In particular, these solutions must address the four most important fields in order to be successful. The four main topics are the administration, authentication, authorization, and auditing of identities. With Microsoft Azure, you get several options for leveraging identity and access management solutions.

Azure Active Directory is the central and main identity repository for the whole Microsoft Azure landscape. The existence of an Azure AD directory...

Employee life cycle (word smart)

The relationship starts when a new employee joins the organization and his identity and corresponding information must be provided. Initially, an identification of the employee as a user will be created and an assignment of standard access rights to applications will be implemented.

The following partial processes run in a typical end-to-end process:

  • Provisioning
    • Creation of the person and identifier(s)
    • Definition of group and role memberships
    • Definition of the required system and application access
  • Authentication and Authorization
    • Validation of the person's identity
    • Determination of the right-to-access
    • Audit and security reporting
    • Management of system authorizations
  • Self-Service
    • Registration for Password Reset and maintenance of other verification options
    • Password Reset and Changes, Account Unlock
    • Maintenance of personal information
  • De-provisioning
    • Revoking of permissions/authorizations based on current role(s)
    • Deactivation of the user account
    • Deletion of the user account...

Designing roles and administrative units

In this section, we will discuss the designing of roles and administrative units that we can use to provide Role-based Access Control and the delegation of rights to several types of administrative persons.

Roles and RBAC

RBAC is well implemented in the Microsoft Azure platform and has a security model to perform access control of resources by users on a more granular level. Users can access and execute actions on the resources within their scope of work.

Note

There is an actual limit of 200 co-administrators per subscription. RBAC is only available in the new Azure Portal https://portal.azure.com, in addition to the usage of the Azure Resource Manager APIs.

RBAC allows more users to manage their Azure services, and at the same time limits access to only specific resources, rather than the entire subscription.

Practical Notes:

  • Administrators and co-administrators: They will see all resources in all portals and through APIs
  • Users defined in RBAC: They will...

Managing identity reporting capabilities

Azure Active Directory contains a series of reports that can be used to gain insight into various activities around the user. These reports are broken down into three categories:

  • Anomalous Activity: This reports potentially suspicious activity that could be an indicator of a security incident
  • Activity Logs: This provides reports on various activities that are taking place within the directory, such as password management or self-service identity activities
  • Integrated Applications: This provides statistics regarding which applications are being used

The following figure represents the Azure AD reporting architecture and informs us of the different interfaces and capabilities:

Managing identity reporting capabilities

Azure Active Directory Audit Report events

With Azure AD Audit Reports, you can identify the following possible causes:

  • User is sharing their password
  • User is using a remote desktop to launch a web browser for sign in
  • User is using a VPN or going through a proxy in another region
  • A...

Understanding the user and group life cycle


One of the basic concepts to understand is the user and group life cycle, so it's very important to understand the different repositories and capabilities where objects are stored and managed. In this section, we will provide you with the necessary information for designing your solution.

Microsoft Azure Identity repositories and capabilities

IAM is a very broad field in technology. Internet threats are becoming more intelligent and effective, so IAM solutions must constantly evolve to keep up. In particular, these solutions must address the four most important fields in order to be successful. The four main topics are the administration, authentication, authorization, and auditing of identities. With Microsoft Azure, you get several options for leveraging identity and access management solutions.

Azure Active Directory is the central and main identity repository for the whole Microsoft Azure landscape. The existence of an Azure AD directory is a...

Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • Deep dive into the Microsoft Identity and Access Management as a Service (IDaaS) solution
  • Design, implement and manage simple and complex hybrid identity and access management environments
  • Learn to apply solution architectures directly to your business needs and understand how to identify and manage business drivers during transitions

Description

Microsoft Azure and its Identity and Access Management is at the heart of Microsoft’s Software as a Service, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is an essential tool to master in order to effectively work with the Microsoft Cloud. Through practical, project based learning this book will impart that mastery. Beginning with the basics of features and licenses, this book quickly moves on to the user and group lifecycle required to design roles and administrative units for role-based access control (RBAC). Learn to design Azure AD to be an identity provider and provide flexible and secure access to SaaS applications. Get to grips with how to configure and manage users, groups, roles, and administrative units to provide a user- and group-based application and self-service access including the audit functionality. Next find out how to take advantage of managing common identities with the Microsoft Identity Manager 2016 and build cloud identities with the Azure AD Connect utility. Construct blueprints with different authentication scenarios including multi-factor authentication. Discover how to configure and manage the identity synchronization and federation environment along with multi -factor authentication, conditional access, and information protection scenarios to apply the required security functionality. Finally, get recommendations for planning and implementing a future-oriented and sustainable identity and access management strategy.

Who is this book for?

This book is for business decision makers, IT consultants, and system and security engineers who wish to plan, design, and implement Identity and Access Management solutions with Microsoft Azure.

What you will learn

  • Apply technical descriptions and solution architectures directly to your business needs and deployments
  • Identify and manage business drivers and architecture changes to transition between different scenarios
  • Understand and configure all relevant Identity and Access Management key features and concepts
  • Implement simple and complex directory integration, authentication, and authorization scenarios
  • Get to know about modern identity management, authentication, and authorization protocols and standards
  • Implement and configure a modern information protection solution
  • Integrate and configure future improvements in authentication and authorization functionality of Windows 10 and Windows Server 2016

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Sep 30, 2016
Length: 692 pages
Edition : 1st
Language : English
ISBN-13 : 9781785887888
Vendor :
Microsoft
Languages :
Concepts :
Tools :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Sep 30, 2016
Length: 692 pages
Edition : 1st
Language : English
ISBN-13 : 9781785887888
Vendor :
Microsoft
Languages :
Concepts :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 169.97
Mastering Identity and Access Management with Microsoft Azure
$65.99
Azure for Architects
$48.99
Implementing Azure Solutions
$54.99
Total $ 169.97 Stars icon
Banner background image

Table of Contents

16 Chapters
1. Getting Started with a Cloud-Only Scenario Chevron down icon Chevron up icon
2. Planning and Designing Cloud Identities Chevron down icon Chevron up icon
3. Planning and Designing Authentication and Application Access Chevron down icon Chevron up icon
4. Building and Configuring a Suitable Azure AD Chevron down icon Chevron up icon
5. Shifting to a Hybrid Scenario Chevron down icon Chevron up icon
6. Extending to a Basic Hybrid Environment Chevron down icon Chevron up icon
7. Designing Hybrid Identity Management Architecture Chevron down icon Chevron up icon
8. Planning Authorization and Information Protection Options Chevron down icon Chevron up icon
9. Building Cloud from Common Identities Chevron down icon Chevron up icon
10. Implementing Access Control Mechanisms Chevron down icon Chevron up icon
11. Managing Transition Scenarios with Special Scenarios Chevron down icon Chevron up icon
12. Advanced Considerations for Complex Scenarios Chevron down icon Chevron up icon
13. Delivering Multi-Forest Hybrid Architectures Chevron down icon Chevron up icon
14. Installing and Configuring the Enhanced Identity Infrastructure Chevron down icon Chevron up icon
15. Installing and Configuring Information Protection Features Chevron down icon Chevron up icon
16. Choosing the Right Technology, Methods, and Future Trends Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Full star icon Full star icon Half star icon Empty star icon 3.6
(5 Ratings)
5 star 40%
4 star 20%
3 star 0%
2 star 40%
1 star 0%
Michael Lewis Dec 19, 2016
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This is a really helpful book when it comes to working with Azure identity and access management. Most of the credit actually belongs to the detailed and thoughtful table of contents. This is logical and laid out the way I think, making it much better than just an index. This also makes it useful because most of us rarely work on this stuff in a linear manner. I was able to trouble shoot whatever issues I was having (most of my focus is on multi-factor authentication and RMS). Recommend this for anyone working in the IAM field
Amazon Verified review Amazon
Mrs D J Fraser Oct 16, 2018
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I'm told this is an excellent book if the content appeals!
Amazon Verified review Amazon
Amazon Customer Feb 24, 2019
Full star icon Full star icon Full star icon Full star icon Empty star icon 4
Excellent book. Well written. Easy to understand. A very useful reference.
Amazon Verified review Amazon
Jimmy George Oct 30, 2018
Full star icon Full star icon Empty star icon Empty star icon Empty star icon 2
The product is outdated and has not been revised with new features.
Amazon Verified review Amazon
Robert Seso Jan 02, 2017
Full star icon Full star icon Empty star icon Empty star icon Empty star icon 2
The book is written in broken English and very difficult to follow, at times it feels like the text was translated from German to English using Google translator. I gave up on the first chapter after having to read some sentences several times, translating them in my head from broken English back to German and from there back to correct English to get the point. This is a pity, because the topics covered by the book are very interesting, the author should have written the book in his native language (German) and let a professional translator translate it to English.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.