To approve a role request in the portal, perform the following steps: Figure 4.13 – […]
Just-In-Time elevated access – Managing User Authorization
As discussed, with PIM, rather than assigning roles to users that are always active, you […]
Controlling access with PIM – Managing User Authorization
The traditional security model defines policies such as least privileged access, meaning you should always […]
Managing users with hierarchies – Managing User Authorization
A core principle for any system should be Least Privileged Access – that is, only […]
Creating custom roles – Managing User Authorization
Sometimes the built-in roles don’t accommodate your requirements; therefore, we need to create a custom […]
Azure roles – Managing User Authorization
RBAC roles provide much more control as they give a series of options and can […]
Classic roles – Managing User Authorization
In the previous chapter, we covered how users are authenticated in solutions; this is the […]
External user collaboration – B2B – Understanding User Authentication
B2B collaboration essentially extends the multi-tenant scenario; however, it will authenticate users who don’t have […]
Using external identities – Understanding User Authentication
So far, we’ve looked at integrating our corporate users into an Azure AD tenant. However, […]