In this example, we’ll perform an access review of a role in the Privileged Identity […]
Just-In-Time elevated access – Managing User Authorization
As discussed, with PIM, rather than assigning roles to users that are always active, you […]
Controlling access with PIM – Managing User Authorization
The traditional security model defines policies such as least privileged access, meaning you should always […]
Managing users with hierarchies – Managing User Authorization
A core principle for any system should be Least Privileged Access – that is, only […]
Creating custom roles – Managing User Authorization
Sometimes the built-in roles don’t accommodate your requirements; therefore, we need to create a custom […]
Azure roles – Managing User Authorization
RBAC roles provide much more control as they give a series of options and can […]
Using external identities – Understanding User Authentication
So far, we’ve looked at integrating our corporate users into an Azure AD tenant. However, […]