Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 2: Managing Security and Hybrid Identity Integration
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.
Add to basket failed.
Please try again later
Add to wishlist failed.
Please try again later
Remove from wishlist failed.
Please try again later
Adding to library failed
Please try again
Follow podcast failed
Unfollow podcast failed
-
Narrated by:
-
By:
About this listen
- Conditional Access & MFA:
- Define access policies based on conditions like location, device state, or risk level
- Enforce Multi-Factor Authentication (MFA) or block suspicious logins
- Azure AD Password Protection:
- Prevent weak passwords using:
- Microsoft’s global banned password list
- Custom organization-specific banned terms
- Smart Lockout to mitigate brute-force attacks
- Prevent weak passwords using:
- Custom Domain Integration:
- Add and verify domains (e.g., company.com) via DNS
- Enable users to authenticate with corporate credentials instead of default domains
- Authentication Methods:
- Password Hash Synchronization (PHS):
- Sync password hashes to the cloud
- Reduces dependency on on-prem infrastructure
- Pass-through Authentication (PTA):
- Validates credentials directly against on-prem Active Directory
- No password storage in the cloud
- Federation (ADFS):
- Uses a trusted identity provider (STS)
- Supports advanced scenarios like smart cards and on-prem MFA
- Password Hash Synchronization (PHS):
- Azure AD Connect Health:
- Monitor sync status and performance
- Detect connectivity issues and failures
- Maintain reliability of hybrid identity infrastructure
- Setting up a lab with:
- Windows Server (e.g., domain controller simulation)
- PowerShell scripts to automate user and group creation
- Installing and configuring Azure AD Connect:
- Using express settings for quick deployment
- Synchronizing on-prem identities with Azure AD
- Hybrid identity enables seamless Single Sign-On (SSO) across environments
- Security is enforced through layered controls (MFA, Conditional Access, password policies)
- Choosing the right authentication method depends on security needs vs. infrastructure complexity
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cybercode_academy
No reviews yet