1 / 13

Office 365 Identity Management

Office 365 Identity Management. Complete Study Guide. Agenda. Identity Management Overview. Recently Announced…. Identity Integration Options. 3. 1. 2. Identity management overview.

foerster
Download Presentation

Office 365 Identity Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Office 365 Identity Management Complete Study Guide

  2. Agenda Identity Management Overview Recently Announced… Identity Integration Options 3 1 2

  3. Identity management overview

  4. Identity management deals with identifying individuals in a system and controlling access to the resources in that system Identity management Integral components of identity and access management Authentication Authorization Verifying that a user, device, or service such as an application provided on a network server is the entity that it claims to be. Determining which actions an authenticated entity is authorized to perform on the network http://www.pass4sureexam.co/70-346.html

  5. Single Sign On (SSO) is the ability for two disjoint Identity Providers (IDP) to trust each other such that a user logged into one does not need to log in again for the second. YAUP is what you get if you don’t have SSO. More identity terms • The Relying Party (RP) is the system that relies on the Identity Provider to authenticate a user. Security Assertion Markup Language WS-Federation / WS-Trust SAML is a public standard managed by OASIS. SAML is the identity token and also the protocol. SAML 2.0 is built on SAML 1.1, ID-FF and Shibboleth. WS-Federation is used for web browser based authentication with an IDP. WS-Trust is used by Office rich client apps to authenticate. http://www.pass4sureexam.co/70-346.html

  6. Microsoft cloud services Microsoft Account Windows Azure Active Directory Organizational Account : Microsoft Account User User http://www.pass4sureexam.co/70-346.html

  7. Common identity platform for organizational accounts Windows Azure Active Directory is the underlying identity platform for various cloud services that use Organizational Accounts Windows Azure Active Directory Authentication platform Directorystore Your App http://www.pass4sureexam.co/70-346.html

  8. Directory Synchronization  Federated Identity CloudIdentity Office 365 Identity Windows Azure Active Directory Windows Azure Active Directory Windows Azure Active Directory Directory Sync Federation Directory Sync On-Premises Identity On-Premises Identity Single identitysuitable for medium and large organizations without federation Single federated identity and credentials suitable for medium and large organizations • Single identity in the cloud Suitable for small organizations with no integration to on-premises directories

  9. Recent Additions http://www.pass4sureexam.co/70-346.html

  10. Windows Azure Active Directory Sync ToolUpdate The tool is downloaded from the Office 365 admin portal. Only a one way hash of the password will be synchronized to WAAD such that the original password cannot be reconstructed from it. Synchronizes user passwords from on-premises AD to Azure AD (Office 365). Respects on-premises password policies. Can’t sync passwords for Federated Users, but can co-exist. SAML2 Identity Provider More Details on TechNet:http://aka.ms/sync http://www.pass4sureexam.co/70-346.html

  11. Directory Sync Tool or Active Directory Federation Services * Azure AD offers some 2FA features that are available with ADFS deployment on-premises.

  12. Active Authentication: Why Multi-Factor Your data and applications are under attack Passwords are easily compromised Consumerization of IT has only increased the scope of vulnerability Strengthening regulatory requirements call for strongly authenticating access http://www.pass4sureexam.co/70-346.html

  13. Interesting, right? This is just a sneak preview of the full presentation. We hope you like it! To see the rest of it, just click here to view it in full on PowerShow.com. Then, if you’d like, you can also log in to PowerShow.com to download the entire presentation for free.

More Related