Summary

After reading this chapter you should be able to explain and design the authentication and authorization capabilities of Azure Active Directory. You should know which functions, protocols, and interfaces Azure AD provides as an identity provider and you should be able to design a flexible and secure application workplace for the business to improve its productivity. Additionally, you will have seen the different reports for monitoring your solution. This will help you to design a proactive security solution and to mitigate security issues. Let's move on to implementing a designed example solution - see you in the next chapter!

Get Mastering Identity and Access Management with Microsoft Azure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.