CHAPTER 4Design security and identity solutions
The Internet is a hostile environment. When providing services over the Internet, you must only allow authorized users access to your services. When saving data, or saving data on behalf of your customers, the data must be well protected and accessed only by the rightful owner.
Designing and implementing a robust authentication system isn’t an easy task, however, since it requires deep knowledge on network security and rich experience in anti-hacking techniques. This chapter covers topics on managed identity, leveraging an external identity provider that manages identities as well as handles authentication requests for you. This chapter covers data security in the cloud, as well as techniques and ...
Get Exam Ref 70-535 Architecting Microsoft Azure Solutions, First Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.