Summary

After working through this chapter you will have received information about typical business needs in complex hybrid environments that need to be handled and fulfilled. The chapter provided you with three very common requirements and provided you with ideas to solve them. Furthermore, you should be able to address the various needs with new knowledge about the different components that can be used. We travelled through the identity management and protection solutions for on premise and cloud environments to increase your ability to manage and protect your organization's identities. We also gave you brief of insights into device management and enterprise data protection capabilities. With this knowledge you should now be able to understand ...

Get Mastering Identity and Access Management with Microsoft Azure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.