官术网_书友最值得收藏!

Summary

In this chapter, we have introduced you to the principles of RBAC and PIM.

We showed you how RBAC provides access management capabilities to Azure resources and enables Microsoft 365 administrators to manage access to these resources, the actions users can take, and what resources are accessible to them.

In addition, we demonstrated the steps you need to consider in order to diligently plan your PIM configuration, how to activate and license PIM on your tenant, and configure and assign roles to your users and resources with the principle of least privilege applied.

We also demonstrated how to make users eligible for privileged access roles to gain just-in-time access, how to assign permanent access to privileged roles where required, and how to remove this access when it is no longer required. Finally, we looked at the various monitoring capabilities of PIM, which enable you to keep on top of your PIM configuration and make sure that access is granted only when it's required.

In the next chapter, we will look at Identity Protection concepts in detail, along with techniques you can use to identify and protect against risky sign-in activities, such as impossible travel and non-compliant devices.

主站蜘蛛池模板: 巴青县| 浦城县| 泸定县| 建宁县| 肥乡县| 温泉县| 华容县| 嘉荫县| 新巴尔虎右旗| 泸水县| 封丘县| 布尔津县| 诸暨市| 凤翔县| 大姚县| 楚雄市| 全南县| 莆田市| 伊通| 侯马市| 西乌珠穆沁旗| 麟游县| 宁城县| 汾西县| 连江县| 延长县| 石嘴山市| 宁阳县| 东港市| 龙里县| 长泰县| 神池县| 民勤县| 资兴市| 黔江区| 碌曲县| 阿荣旗| 旌德县| 定结县| 合肥市| 洮南市|