2 Securing identities in Azure: The four pillars of identity and Azure AD
This chapter covers
- Four pillars of identity
- Authentication
- Authorization
- Custom roles
- Identity governance
Securing identities is a fundamental building block of securing any Azure environment. Yet, many application developers and IT managers I talk to say they often lose sight of who has access, and to what. This problem is further compounded by the fact that people responsible for giving access to users don’t always have insights as to what resources the users they’re providing access to actually need (or don’t need) access to. When there is little to no automation, this process can easily become error prone and difficult to manage. Now that you know about some of the challenges, I have a question for you. Have you ever found yourself in a situation where you needed to provide secure access to users in your organization? How did you go about doing this? Luckily, you’re not alone. Providing secure access to users, is exactly what’s top of mind for Alice too. She’s one of the fictional characters on whose help I rely on (with the occasional guest appearances of Bob and Eve), to make it easier to explain how to provide secure access to users in Azure. Along the way, I introduce you to a couple of additional models and concepts, which make it easier to understand how identities are secured in Azure.