Become An Azure Administrator Libro I
Become An Azure Administrator Libro I
Tabla de contenido
Tabla de contenido................................................................................................................................................................ 1
1 Azure Administration Essential Training......................................................................................................................4
1.1 Introducción..........................................................................................................................................................4
1.1.1 Using Cloud Services................................................................................................................................4
1.2 Getting Familiar with Microsoft Azure.................................................................................................................4
1.2.1 Fundamentals of cloud computing.............................................................................................................4
1.2.1.1 On-Premises Hardware.........................................................................................................................4
1.2.1.2 Private Cloud........................................................................................................................................5
1.2.1.3 Public Cloud.........................................................................................................................................5
1.2.1.4 Hybrid Cloud........................................................................................................................................6
1.2.2 Fundamentals of cloud service offerings...................................................................................................6
1.2.2.1 Understanding the Offerings.................................................................................................................6
1.2.2.1.1 (IaaS)Insfrastructure as a Service.....................................................................................................6
1.2.2.1.2 (PaaS) Plataform as a Service:.........................................................................................................6
1.2.2.1.3 (SaaS )Software as a service.............................................................................................................7
1.2.2.2 Understanding Azure Services:.............................................................................................................7
1.2.2.2.2 Compute services.............................................................................................................................7
1.2.2.2.3 Networking services.........................................................................................................................7
1.2.2.2.4 Application services.........................................................................................................................8
1.2.3 Microsoft 365 and Microsoft Azure: Key concepts...................................................................................8
1.2.4 Getting familiar with Azure management tools.........................................................................................9
1.2.5 Fundamentals of Azure management.......................................................................................................12
1.2.6 Controlling Azure costs...........................................................................................................................14
1.2.7 Exploring the Azure Security Center.......................................................................................................17
1.2.8 Managing Azure using Azure PowerShell...............................................................................................20
1.2.9 Exploring Azure storage services............................................................................................................23
1.2.10 Implementing a storage account..............................................................................................................24
1.2.11 Managing an Azure storage account........................................................................................................27
1.2.12 . Azure feature release cycle....................................................................................................................30
1.2.13 Exploring Azure deployment templates...................................................................................................31
1.2.14 Exploring resource groups.......................................................................................................................34
1.2.15 Exploring Azure policies.........................................................................................................................35
1.2.16 Creating Azure policies...........................................................................................................................36
1.2.17 Getting Azure Support.............................................................................................................................39
1.3 Microsoft Azure Web Apps.................................................................................................................................40
1.3.1 Implementing Azure web apps................................................................................................................40
1.3.2 Managing Azure web apps.......................................................................................................................43
1.3.3 Configuring Azure App Service plan.......................................................................................................45
1.4 Microsoft Azure Virtual Machines......................................................................................................................47
1.4.1 Creating virtual machines in Azure, part 1...............................................................................................47
1.4.2 Creating virtual machines in Azure, part 2...............................................................................................49
1.4.3 Managing virtual machines in Azure.......................................................................................................51
1.4.4 Connecting to virtual machines in Azure.................................................................................................53
1.5 Microsoft Azure Active Directory.......................................................................................................................53
1.5.1 Exploring Azure Active Directory (AD)..................................................................................................53
1.5.2 Exploring Azure enterprise applications..................................................................................................58
1.5.3 Managing users in Azure AD..................................................................................................................60
1.6 Microsoft Azure NetWorking..............................................................................................................................61
1.6.1 Understanding the Azure networking components..................................................................................61
2 Azure Active Directory: Basics...................................................................................................................................65
2.1 Introduction.........................................................................................................................................................65
2.1.1 Modern identity.......................................................................................................................................65
2.1.2 Prerequisites............................................................................................................................................66
2.1.3 Roadmap..................................................................................................................................................67
2.2 Azure Active Directory Fundamentals................................................................................................................68
2.2.1 Identity and access...................................................................................................................................68
2.2.2 Azure AD overview.................................................................................................................................69
2.2.3 Azure AD Connect deployment...............................................................................................................71
2.2.4 Users and groups management................................................................................................................72
2.2.5 External users management.....................................................................................................................74
2.2.6 Application platform................................................................................................................................75
2.2.7 Device management.................................................................................................................................77
2.2.8 Azure AD security...................................................................................................................................78
2.2.9 Azure AD administration.........................................................................................................................81
2.3 Industry Standards and Compliance....................................................................................................................82
2.3.1 Open standards support............................................................................................................................82
2.3.2 Regulatory compliance............................................................................................................................83
2.4 Provisioning an Azure AD Tenant.......................................................................................................................84
2.4.1 Building an Azure AD scenario...............................................................................................................84
2.4.2 Creating an Azure AD tenant...................................................................................................................86
2.4.3 Adding a custom domain.........................................................................................................................87
2.5 Potential Business Impact of Azure AD Adoption..............................................................................................90
2.5.1 Impact on standalone infrastructures.......................................................................................................90
2.5.2 Impact on hybrid infrastructures..............................................................................................................92
2.5.3 Impact on employees...............................................................................................................................95
2.5.4 Financial implications..............................................................................................................................96
2.6 Conclusions.........................................................................................................................................................98
1 Azure Administration Essential Training
1.1 Introducción
1.1.1 Using Cloud Services
- Cloud services are constantly being modified. Some of the functionalities that you see in this course may not be exactly
the same as the ones you encounter when you log into the Azure Management portal. Microsoft will update its services
and functionalities based on needs and customer demands. The result of that will be updated features and functionalities
and interfaces that may not be identical. If you encounter functionalities or features that are slightly different than the ones
I've presented in this course, look into them. Look into the functionalities and see how they've been slightly modified.
Usually that means that there is a major improvement that's been added to the platform. Maybe you find that the
functionalities may help you even more in your migration to cloud services. Make sure you pay attention to these new
functionalities and see how they can help you and your environment in Azure.
However, you have some other functionalities such as Microsoft Intune, or the ability to enroll devices and manage the
devices in the organization. Now through all of the services that live in Microsoft 365, you have one very important
component that can, and I say can very specifically. It can be shared with your Azure subscription, and that is your
identities, your users. So in Microsoft 365, if I clicked on users, I can go ahead and create user accounts, and those user
accounts will be able to have email mailboxes and access SharePoints, and access all of the great services that are part of
Microsoft 365. In Microsoft Azure, I don't have user accounts here, but I have an Azure Active Directory. Now the Azure
Active Directory is the directory service that manages all of your identities that are also used to access the various
resources in Azure. The two can be the same. You can have one directory that is used both for your Azure subscription
and for your Microsoft 365 subscription. That entity or that directory would become the default directory for Azure and
the default directory for Microsoft 365. When you create a subscription with Microsoft 365, and you already have an
Azure subscription, they will try to tie the two, but they don't need to be the same. They may not be the same. Some
organizations may want to have a Microsoft 365 infrastructure that has a different Active Directory entity, and therefore a
different list of user accounts. Then the one that is being used for your Azure subscription, and that is managed through
your user accounts in the Azure Active Directory. A user that I can create here from my Azure Active Directory. I can
then retrieve from Microsoft 365 and edit that user account in Microsoft 365, and then assign access to the various
Microsoft 365 services. Microsoft 365 and your Azure subscription can be linked if they are linked through the same
Azure Active Directory. They don't have to be linked. The benefit of having them linked is having a single entity, or a
single directory of Azure Active Directory that is used for both services and through both portals.
Now, this here is the default interface for the Azure Portal. This interface changes frequently, in the sense that Microsoft
updates Azure, Azure features, and Azure components, but especially the Azure interface, so it's very likely that when you
log in to your Azure Portal, this interface may differ a little bit. Remember that most of the Azure functionalities will
remain, and you will have access to most of the features and services that will covered.
So this is the Azure Portal and it's a very standard browser-based portal. From here I can access all of the Azure services,
additional Azure Portals, these other portals are other management windows that we will use to manage some of those
sub-services or sub-features of Azure.
As well, if I go a little bit below, I see the list of my resources in Azure. So these are actual Azure components, Azure
services that I've installed and configured as part of my subscription. Now, what I'm using here is this browser-based
management tool, some of you may want to use a more flexible command line ability to manage Azure. In order to do
that, we would have to access the Cloud Shell.
2
To access the Cloud Shell, I have a little shortcut here in my top window, and when I click on (1) Cloud Shell you will see
that a window below opens (2). That window gives you the ability to manage Cloud Shell using one of two interfaces,
either PowerShell or Bash. Depending on your background and your expertize, you may want to use CLI or PowerShell in
order to manage all of your Azure resources.
So if you're familiar with using PowerShell, for example on a Windows environment, managing your servers or your
desktops using PowerShell, these are very similar commands that you would use using the Azure Cloud Shell. All of the
Azure PowerShell modules are already installed, and you can use all the command lists that are available within Azure.
As well, if you are familiar with managing locally, you'll remember that a remote connection to Azure is still possible, so I
can connect from my Windows desktop by installing the Azure PowerShell modules to my Azure subscription. This here
is just the ability to do it from within the browser. So this is not a local application that's running on my desktop, this
actual window here of PowerShell is really existing within my browser.
Now, all of the features and the components that I'm running in here are being stored in Azure, and all the commands and
the scripts that I may want to run are also in Azure.
To switch to Bash I just go down to my dropdown list
here, I have to confirm that all of my current scripts
will be stopped to switch to Bash, and now my
interface is being turned over to a Bash command.
This here is the Cloud Shell that gives you the ability
to manage all of your resources in Azure. You don't
Azure
portal, and a new blade opens up that provides billing accounts and cost management, and under Billing accounts I can
actually click on this billing account here which will provide a historical view of all of my invoices, the invoices for
Microsoft, specifically for my Azure subscription or the Azure subscription that's specified here, and I can review those
old invoices however I want to manage my current costs and have a better understanding of how I'm spending my money
in Azure, I would click here on Cost Management.
When I click on Cost Management,
it takes me into my resource group
costs, now this is one resource group
that I have, I'm demonstrating
through this resource group because
I have actual costs in this resource
group that it can point and analyze.
So I'm going to click on Cost
analysis, and when I click on Cost
analysis, I have a beautiful
dashboard that appears and this
dashboard provides me a great
graphical view of my costs so far
this month, as well as a forecast of
how much I'm expecting if I maintain this usage for the rest of the month. So here, my costs are in Canadian dollars
because my subscription is hosted in Canada, and I see that I have costs of a little bit over $30 so far this month, with a
projected cost total at the end of the month of a little bit
less that $100. If I want to see where those costs are
happening, I actually see various graphics here that tell
me the various resources, and how much they are
costing me. Now I can change this view, I can go to my
list here, under accumulated cost and I can also see my
cost by resources and this will actually list me my
resources in order of the costs that are costing me the
most. And so I see that my service plan, which is
actually an app service plan is costing me the most and I
have a storage account also that has some minimal costs
as well as an app service that has absolutely no cost, so I
have a little bit of a view here into my resources. I can again change this view and if I go back to my accumulated cost
here, this view here, again this nice graphical view of all of my costs, may be useful for business manager or an
accountant, I can share this view with them and in order to do that I can actually save this view, and I'm going to save it as
a custom view, so I'm going to save that month cost, of the month, and I'm going to save this view, and if I go down to my
drop down list here, you will see that this shared view is available, and in order to share it with a manager, I can simply
click on share, which will provide me with a URL which I can copy to my clipboard, this URL will then be provided to
my manager, I can email it to them and they can click on this URL, and access this same cost view. So costing can be very
useful in terms of sharing this information. So let me go back into my cost management portal and I want to show you
something else here, which allows you also to forecast your cost, which is the Budgets. This is a relatively new
functionality in Azure where we can actually create a budget within Azure. So, if I go into my budget, I can create a
maximum cost that I expect to spend with my Azure resources, over the next month. So I can go down here, provide a
name for my budget, a costing period, as well as an amount threshold.
Now this amount threshold is not actually going to limit my usage, it's simply a budget and as you know sometimes we
can go over budget. But it's pretty good to have an understanding of how much we expect to pay in Azure resources. Now
the real benefit of the budget is not the budget itself, is what comes next, which is the alerts. If I click on next here, I can
specify an alert, so I can specify that if I have incurred more than 10%, 20%, 30% whatever that threshold is, of my Azure
budget, I would like to receive an alert. This is a great way to maintain control over your cost and ensuring that if you
have an issue in Azure, such as a rouge virtual machine or an administrator that has created a number of rogue resources
or an unsecured resource, that is being populated with a tremendous amount of data, or is being attacked by external users,
those may incur additional costs and the alerts will alert you of those costs immediately so that you can take action on
those. So creating a budget is a good thing to do within your Azure subscription, having a good understanding of where
your money is going and what your regular costs in Azure resources are as well as a great way to maintain good control
over your Azure subscription.
So let's go ahead and open the Security Center which is available right here in my Azure portal. When I click on the
Security Center, I need to point out first of all that you must be subscribed to the Security Center, it's an add-on to your
overall subscription. You can start a 30 day trial if you want to see how the Security Center works, which is what I have
right now. If I go into the overview tab the first thing that I see is the very scores that have been assigned to my
infrastructure. Here I have a policy and compliance score. And I actually have specific regulatory standards that are
identified, and we mention specifically how many of the rules my infrastructure is configured to support for those
regulatory standards. So, ISO 27, double O, one. Which I actually don't know what ISO that is, but I know that my
infrastructure has seven out of the 23 passed rules. If you are looking for a regulatory compliance you will know
specifically which ISO you are looking for. And actually we'll see how we can click on the link to have a little bit more
information about that. I have also my security hygiene, which we'll look at in detail, which are specific recommendations
on how to improve the security of my solution. This here is monitoring everything that I have in Azure. Now that means
all of my storage accounts, and all of my networking, and all of my Azure SQL databases, all of my active directory
configurations, all of that is being monitored. But on top of that, I can also monitor the virtual machines that are running
in my environment. And I can actually install agents on those virtual machines to make sure that those virtual machines
are constantly being monitored and secured. As well, I can also onboard my computers that are located on premises, so
your internal network can also be added into your Azure subscription to be able to be monitored. And you will receive
recommendations on optimizing the security of those on premises computer. If I go down a little bit below, my first
section is a policy and compliance. And when I click on coverage you see that I have here my subscription that is being
covered. So if I have multiple subscription it would detail all the various subscription and I could click on the various
subscriptions that I have. If I click on my secure score, I see here the score that I mentioned above. Also I can click on the
specific subcomponent of my subscription to see their specific scores. So you'll note that my data, and storage, and
networking are fully compliant and considered fully secure. There are no optimizations to made here. However, under
identity and access I have 170 out of 225, so there's certainly some improvement to be made. But likely the biggest
improvements is under my compute and apps. So it's very likely that my web apps and my virtual machines are not
configured the most secure way.
Now if I click on security policy I can see that it can define additional policies that will actually define the standards for
security for my environment. And then those policies would tell me if my infrastructure is out of policy. So the security
policy is one of those components that allows you to define those standards that your organization wants to be set by, and
then define which objects are not matching to that security policy. Personally the features or the components that I prefer
when it comes to the Security Center is the security hygiene. Now when I go down to security hygiene, if I click on
recommendations, I will see the various recommendations that are actionable from my environment. And I actually like to
break it down for the various components. So if I click on identity and access I see that I have here two recommendations.
One of those recommendations is to enable MFA (multi-factor authentication) for my user accounts that have owner
permission on the subscription. So that means that my global administrator, the one that has the highest level of rights,
only needs a password to authenticate. And Azure is telling me well, if you want your organization to be more secured
you should give that user account a second method of authentication. And that's usually a pin on a mobile phone, or a
mobile phone app that is being used as a secondary mechanism. There are some organizations that I access that require
MFA and it basically means that I have to enter a pin and a password, and it is a very secured method of authentication.
Also, another recommendation is to designate more than one owner on the subscription. I currently only have one user
account, if that user account is compromised, as the owner then I've lost the owner of my subscription. So Microsoft
recommends having at least two owners to a subscription. So you'll note that I can drill down specifically to a service that
runs in Azure, and I get specific recommendations for that service. And the same is true for my apps and my virtual
machines where I can actually go to the specific subservice and define recommendations that are actionable, and that give
you the ability to optimize the security of your environment. All of these components can be drilled down to and receive
these types of recommendations.
Security Alert
As well, I can configure alerts, so that I am alerted when a key threshold or a component is considered unsecure. I can
create my custom alerts that will actually notify key individuals in the organization of security threats that have been
identified by Azure in my organization. So the Security Center is one of those tools that you will want to visit frequently
and ensure that your organization is constantly maintained in a secure manner.
Earlier we talked about managing all of your Azure resources using the Azure Cloud Shell or the online version of
PowerShell. Now as I mentioned earlier, you can still use PowerShell locally using your local PowerShell tool to connect
remotely to the Azure subscription environment. Now in order to do that I actually need to download the Azure modules
for PowerShell. It will provide me with all the verbs and all the command-lets that I need to use in order to manage my
Azure resources. So let's go ahead and do that. And in order to access the Azure downloads I need to go to
azure.microsoft.com/downloads and when I click on that I have access to all the various Azure downloads, a lot of
SDKs in here or Solution Development Kit. And if I go down below to Windows, command-line tools, I have my
PowerShell Windows install.
And I notice that there are others here as well such as the AzCopy, a tool that you use to actually copy files to Azure and
VSTS, or Visual Studio Team Services that is used if you're working in a devops environment. So as soon as I click on it,
I'm prompted to run the installation and I'm going to run that installation of the Web Platform Installer.
Install the Azure PowerShell and I'm going to accept
the Azure PowerShell installation and it starts to
download and install my module. Now my
installation is finished, I'm going to finish and exit
my installer. And I can go ahead and access my
PowerShell. So to do that from my Windows
computers, I'm going to go to my start button and
start typing PowerShell and from here I'm going to
right click PowerShell and run it as an administrator
so I have unlimited privileges on my PowerShell
commands. So in order to use PowerShell in Azure I
first need to connect to my Azure subscription.
So what I'm going to do is type connect-
azurermaccount, connect to my resource
manager and that's going to prompt me
for a user name and password. And I'm
going to enter that in. Now notice that I
used the connect-azurerm account. There
are different accounts that I can connect
to or using different commands and these
ones will connect me or authenticate me
for different PowerShell command-lets.
So I used the rm to connect to the
resource manager command-lets. And
now I'm going to put in my password,
notice that is the same authentication that
I used to access my portal and I will
connect to the same subscription that is
available in my portal. And here I see that I've connected to my subscription. As you'll remember, it's a pay as go
subscription. I have the ID of my tenant and the ID of my subscription here So now that I'm connected to my Azure rm
account and I'm connecting to my Azure subscription I can start to use my Azure command-lets.
So if I go get-azurerm I can use tap complete to actually see all the command-lets that are available. Notice that it toggles
with a alphabetical order so I'm Get-AzureRmADUser that will actually retrieve all the list of my active directory user
accounts and so on. Now if I wanted to actually see information that might be useful for me I can get a Get-
AzureRmstorage account. And if I don't remember the exact command-lets, I can just go to storage and press the TAB key
to do a tab complete and I press on ENTER and it will actually retrieve the list of my storage accounts. Now the primary
one that I have here is called netlogon01storage and we'll manipulate that one a little bit later on in the course. It gives me
information such as the region that's it located in as well as the sku, or the version of the storage account. I have
information about the creation of this
storage account or when it was created
and this was created about six months
ago in 2018. And I have lots of
information of the storage account all
the properties of the storage account,
for example, this storage account does
not allow https traffic only, so that is set
to false. I can actually manipulate any
of those properties by using the set.
Now you notice that I use the get verb.
Get retrieves information. Set modifies
information, so I can do set-azureRmstorageAccount. Again I've used the tab complete to complete that command, And
then I can modify the properties.
If you're not sure how to use the set-azureRmstorageAccount, you can type the help and then the command-let and then it
will provide you with all of the contextual information on how to use the specific command-let; So set is the verb,
azureRmstorageAccount is the type of object that we're going to modify and together set-azureRmstorageAccount is a
command-let. And the command-lets can have multiple types of properties that can be set to it and we can set all those
properties by using either the portal or by using PowerShell. Why would I use PowerShell? Well, if I want to modify
multiple objects at once or sometimes, some properties are not exposed in the graphical interface, in the portal. So at that
point we may want to use PowerShell.
As you see here in the Azure Marketplace, we can create compute resources or virtual machines, for example. I can create
containers that will host other services. I can create databases or even DevOps environments. I can also create identity
services for authentication and identity management. I can create networking resources, but the one that I want to talk
about now are storage resources. We can create a number of storage resources in Azure and we've looked already at
creating a storage account which is a key component that links with many other services in Azure.
However, we can create other storage resources to store other types of data. One of those storage resources that is
relatively new is the Azure data box which allows you to migrate your
data from your on-premises environment over to Azure. Here I have a
resource called Data Lake Gen1. Now Data Lake storage Generation 1
is replaced now by Gen2. And we can create this new type of resource
to be able to store specific data in our Azure subscription. Now I can
create a number of those. I can also create databases, those are also
considered storages. I can also create any type of storage that is either
structured or unstructured. That is information that is stored in files, that
is stored in tables, that is stored in blobs. Even the databases can be
structured or unstructured. Having a good understanding of your data,
the type of data that you want to store in Azure, will allow you to
choose the best storage resource in Azure. Because there are so many
storage resources, many storage resources can actually perform the
same tasks. I can store blob data in a storage account. I can also store
blob data in an IoT blob. And again, there are many type of these resources that have similar names. So here I have Azure
Blob Storage on IoT Edge. So yes, this is blob storage. I can store blobs in a storage account. I can store blobs here. But
they serve different purposes. So again, having a good understanding of your data, how you're going to use your data, and
understanding the type of storage that is available in Azure allows you to ensure that you choose the right storage service
for your data.
Where do you start when you want to automatically deploy resources in Azure or schedule the deployment of resources in
Azure or maybe create a test environment over and over and over again that has the same exact resources? Let's take a
look, first of all, at what a deployment template looks like. There are lots of libraries of deployment templates that are
available on the internet.
And actually Microsoft provides the Azure Quickstart Templates. And these are a series of templates that have been added
by various community contributors, some Microsoft project managers and so on. So in order to find a specific template in
here all I have to do is search for what it is that I'd like to deploy or redeploy. For example, if I want to deploy something
call data bricks.
Data bricks is becoming more and more common in
implementation that support an artificial intelligent
solution. If I do a search for a data brick, I see that I have
six templates that are available and I have a specific
description of that template and I see exactly what it
does.
I've already mentioned briefly, the concept of a resource group, the ability to group all of your resources together, in an
object, in an Azure subscription, and then, manage all of those resources as a single entity. Now, let's take a look at the
resource groups, that we have in our Azure subscription. I have here a list of my resource groups, and within those, I have
one called LinkedINRG. This resource group contains several resources, and if I click on the resource group, I see the
resources that are maintained in this resource group. As well, I can manage all of those together, such as going into the
deployment tab, and seeing how each one of those resources were deployed. And I actually see a historical view of the
deployment of my resources, the amount of time it took, as well as all of the events that happened, during the creation of
the resource. For example, if I click on this resource here, I can look at my deployment page, look at exactly when that
deployment occurred, and I see all of the inputs and the outputs that occurred during the deployment, as well as a template
that was being used. So, we've talked already about deployment templates, and how those can be used to redeploy, any
resource in Azure. However, if I want to see the syntax for a specific resource, I can just click through my options here,
and I see the specific syntax, and how this resource was created. Now, this syntax here is in JSON. I can look at it in
PowerShell, and I can look at all the commands in PowerShell, that were used to create this resource. I can download this
template. I can manage this template, like any other deployment template. Another option that is really interesting here is
when I click on resource costs. Now, resource costs actually tells me how much was spent in this resource group, based on
the resources that I have. So, you'll see right now, that I have several resources, and I've just spent about 20 cents
Canadian. So, really, not a whole lot, 'cause I don't have a whole lot going on in this resource group. But it allows me to
segment my costs per resource group, therefore, allowing me to see exactly, what my Azure resource costs have been. If I
dig down a little bit below, I'll see that I have policies as well, that allow me to define whether or not the resources in my
resource group are compliant. And I also have recommendations, that allow me to specify different options in order to be
in better compliance. I have my properties here of my resource group provide some information about the location, and
where these resources are found. As well, I can specify alerts, that will affect any resource within that resource group. So,
you'll note that this resource group here, contains several resources, and they are all managed as part of the same identity,
the resource group. Same is true that if I delete this resource group, it will delete all of the resources within the resource
group, and you are notified of such, that all of these resources will be deleted. So, it's very important that deleting resource
group, must be understood as a very high-level task, that not all administrators should have the ability to do, because it is
going to affect all the resources in your infrastructure.
1.2.15 Exploring Azure policies
There are a large number of resources that can be created in a subscription. As well, we can have multiple subscriptions
that can be managed by using management groups. And so we can have an organization that becomes quite large, with a
large number of resources that can be located in a single resource group, or across multiple resource group.
The fact that we can have such a large number of resources, and that they can be located in various locations in our
subscription, means that managing all of these resources can sometimes become a little bit of a challenge. Also ensuring
that our resources don't run away from us with settings that we did not intend to set, or administrators that created
resources that did not comply with organizational norms. We can use policies to gather information about our resources,
and to identify any resources that are not in compliance, even to remediate any of the problems that have been identified
through one of these policies. So when I go into a resource group and I click on Policies, I have the Policy Compliance
window that opens up immediately. In here I see some existing policies that are created automatically for me as part of my
environment. I did not manually created those, they were created for me immediately within my Azure subscription. A
good example of policies that are automatically created is this one here, which is an audit policy that validates that all of
the disks that are being used in our virtual machines are actually managed disks. So, the audit VMs that do not use
managed disk policy reviews all of our virtual machines and identifies the resources that are non-compliant, essentially
identifying the disks that are not managed.
Now I can modify this existing policy, or I can remove this policy as I want, but what's really going to be interesting is
created additional policies, policies that will scan all of my resources in Azure and identify the ones that have problems,
that are not in compliance with a specific requirement that I've set in my organization. Now that requirement could be a
compliance requirement, or it can be a technical requirement. So I'm going to go back under Policy Compliance, and these
again are my policies, and to create new policies I can click on Assign Policy. To create a discovery for my non-
compliance of my infrastructure, I can also create an initiative. In the next video of this course, we will create a policy and
we will look at how these are affecting our existing resources in Azure.
Let's take a look at how we assign a policy. The great thing about policies is that there are a number of pre-defined
policies that we can choose from. These are called policy definitions. So initially a policy is applied to a resource group
and here we have a scope that is set as the resource group. Within that resource group, we can also create an exclusion.
For example, if you want a policy to assign to all of the virtual machine in a specific resource group except one virtual
machine, you can create an exclusion. So from this ellipses here, I can select a resource and specify that the policy will
apply to everything, except that one virtual machine. I can have multiple exclusions, so if I need to exclude five virtual
machines, I can exclude them. It can be any resource, not only a virtual machine that I exclude. Now under my policy
definition here,
I'm going to click on the ellipses to show you some of the 300 plus policy definitions that exist in Azure. So they range
from a number of things in terms of insuring a specific setting, insuring a specific configuration, or automatically
deploying a resource.
There's a number of things that we can automate and validate, using policy definitions. So I'm going to choose one here,
and I'm going to go into storage, and I'm going to ensure that all my storage accounts use HTTPS for transfer. So if I have
multiple storage accounts, these storage accounts need to have HTTPS enabled. Now we've looked at this setting before
and how we enable HTTPS for a storage account, but this policy will allow us to define whether HTTPS has been set for
the storage accounts. So I'm going to select this policy definition and it is assigned into my policy. And if I go down
below, I notice in my settings here, I can either enable or disable the policy enforcement, which means that it actually
enforces this setting, as opposed to just auditing for that setting. I have some additional settings that I can set here, under
my parameters. I can effect this as an audit again, or I can have it deny the creation, and I want to basically the prevent the
creation of any object that does not have HTTPS, or disable that. Under Remediation, I can specify what happens if the
policy runs and identifies already created storage accounts that do not have HTTPS enabled, and I can specify whether or
not the object can be created, if it's in the process of creation, or if it's already created, if it's going to be remediated with
that HTTPS setting. If I click on my Review + Create button, I can then specify to create the policy and the policy will
automatically be assigned to my scope. So again, my scope here is my resource group that I created in my Azure
subscription. If I click on Create Now, it will be deployed, and as soon as it's deployed, it will begin a scan of my
resources in the resource group to identify any resource that are not in compliance with my policy.
Comentados por Microsoft para mejorar, muesta el impacto ….
1.2.17 Getting Azure Support
When we talk about an Azure subscription, support can come in various forms. It could come directly from Microsoft in
the form of a support request or a ticket that we open up with Microsoft when an issue occurs. It can come in the form of
community support where there are tons of resources and individuals in the community that are willing to help
organizations and individuals with problems in Azure. It could also come in the form of information, being aware of
problems that are existing in a current Azure deployment, or even providing documentation or retrieving documentation
that is available from Microsoft in order to better improve the deployment of your infrastructure and prevent problems
even before they occur. So we can have both preventative solutions to our environment, reactive solutions, or also day-to-
day proper management of our infrastructure to ensure that we minimize any type of support issues and in turn minimize
any down time. So if I click on help and support within the Azure portal, I have access to all of these resources, and the
first one that I want to show you is the support plans. Now, when I click on Support Plans, I actually see the list of support
plans that are available from Microsoft, and you'll notice that organizations by default are set to the basic support plan.
The basic support plan still gives you 24/7 access to customer support and lots of documentations and resources, but you
will notice that there are a number of missing resources that are not available here from the list of available support
options. And as you go down the list of support options, the most expensive support options is set at $1000 a month, and
that is for the professional direct support. You can easily upgrade from one support option to the next and it will be added
to your billing cycle. That is certainly one option depending on the resources that you're hosting in Azure and how critical
they are. If you have an issue with Azure and you want to find out if it's caused because of a current failure in the
environment, you can click on Service Help and identify any current service issues. So if there are service issues, they will
be highlighted in red if they impact your resources and you will find out that maybe Microsoft has a data center that's
down or certain resources in a data center are down. It is very rare for resources to be unavailable within Azure, but it
certainly is possible. As well, Microsoft can have planned maintenance cycles, and you can click on the planned
maintenance cycles. Typically you would receive an email message if it affects your resources and you'd be able to find
any issues that may occur in the event of a planned downtime because of an upgrade or something else that would happen
in your environment. As well, health advisories would be available here. Now, I want to go back to help and support and
show you something else here which is certainly very important is the advisor. Now, the advisor is actually a set of
recommendations that are provided to you by Microsoft to either improve the efficiency of your deployment, reduce your
cost, or potentially prevent a security issue from occurring. The various recommendations that are provided to you by
Microsoft are rated as, by their impact level. And, for example, here I have an impact level of high where I have a subnet
that is not associated with a network security group. Now, I actually created this resource recently as part of my
demonstration and I did not connect that subnet to a network security group, so I'd be able to see the various high-impact
issues that are listed here. And you'll notice that there are a number of issues rated from low to medium to high. I can click
on any one of those resources, get a little bit of information, and potentially modify my infrastructure. As well here, I have
a cost saving recommendation which tells me that I could actually deallocate a specific IP address that is not being used
and therefore reduce my monthly cost. So the advice comes in many different forms from Microsoft. As well, I can create
a support request. Now, if I have a specific issue for which I cannot find resolution either in the service health dashboard,
in the community out on the internet, or in Microsoft documentation, I can certainly open up a support request issue with
Microsoft, specify what type of issue I am having, and here I can say that this is an Azure services issue. I can specify the
type of issue, whether it's a technical issue. Notice that you can also choose a billing issue, subscription management
issue, and also subscription limits issue. Now, this is an interesting one, because it affects the pre-defined limits that are in
Azure. There are a number of limits in Azure, and you can easily find them on the internet. They change, so I'm not going
to go through mentioning each one of them, but there's probably at least 50 to 75 limits of resource utilization in Azure,
and it's about the number of resources that you can create in a single resource group or a single subscription. Microsoft, in
order to prevent usage overruns, will have specified default quotas for these various types of resources. And if you reach
that quota, which is typically very high and it's rare to access it, but if you do, you can make a request to Microsoft to
increase the quota for your organization, and essentially, Microsoft makes an exception for your organization, allow you
to exceed that quota. And this is where you make that request to Microsoft. If I select technical, I can go a little bit deeper.
Select my service, my functionality, and then create that support request to Microsoft, it will be sent to Microsoft, I will be
able to track it under my all support requests, and I'll be able to view the results over time and identify any resolution that
Microsoft has provided to me for this specific problem.
1
2
I need to click on create a resource and I'm going to type web app to search for the web app type resource and I see here
that the first resource in my list is a web app. Notice that you have some that are from Microsoft and third parties as with
all other services and Microsoft has a lot of various web apps that exist here that you can use.
Now these are web apps have specific
settings or a group specific settings already
set to them and functionalities or you can go
ahead and create just a web app and then
manipulate all of the settings yourself.
So I'm going to select web app and then click on the create button. Now as soon as I go ahead and start creating my web
app I need to specify a name
. Now just like the storage account that name needs to be globally unique
because as you notice a URL is being assigned to that web app immediately.
So its going to be a .azurewebsites.net URL. So I have to give it a name that
will fall within that or will be unique within that so I'm going to call it
linkedin and you notice if I call it linkedin that that name is already been used
so I going to call it linkedinappessential. And now I have here this name that
is recognized I have an option to create a new resource group or use an
existing resource group. In this case I'm
not going to chose a default of creating a
new resource group I'm actually going to select my resource group from my list here.
And I have here linkedin rg essential as my resource group. Then I can specify an
operating system. Now this is actually the operating system that will host the app.
Some applications require Linux or Windows and here I can actually specify that. If I
want to use a specific image I can also select docker image. Then below I can specify
my app service plan. Now the app service plan is essentially the container for your
app that defines all of the settings and configurations of the hosting environment of
your app. Including how many instances and servers will be running that app.
Therefore directly affecting your cost of hosting the app in Azure. So I'm not going
to select the current service plan that I have here I'm actually going to create a new
one. And I'm going to give a name for this service plan. I'm going to call it linkedin
sp one and a location. Now here you notice that I have a pricing tier we will look at
the service plan pricing tiers a little bit later on in this course. And now I'm going to click on create. Now as soon as I
click on create all of my settings are validated the environment is created in Azure as well as the app is created in Azure.
Once the app is created in Azure I'll be able to actually go ahead and test that the app has been successfully deployed in
my Azure environment. And to do that I'll actually go in a browser and type the URL of the app.
So a little bit of time has gone by I'm going to go ahead an make sure that my app has been successfully created. And to
do that I'm going to type linkedinappessential.azurewebsites.net. And we see here that the app has been successfully
deployed.
Now there is no code I actually didn't deploy code that runs behind that app. I just created the necessary resources in
Azure. And I know that those resources are available because I'm able to access that URL and I see that Microsoft Azure
is responding. The next step would be to actually deploy code inside that app. Now that would be the roll of your
developers. Now in the next video in this course we will go ahead and modify the setting of the app that we just created.
In order to access and manage Azure Active Directory, we launch the Azure Active Directory Admin Center. So by
clicking on this Azure Active Directory link, we're actually launching the Azure Active Directory Admin Center. And this
interface is the management tool for everything that is related to the authentication services within your Azure
deployment.
This directory service was built for me
automatically when I built my Azure
subscription, and the way that I've actually
built my Azure subscription is that it's also
tied to my Microsoft 365 deployment. So all
of the users that exist in Azure Active
Directory also have mailboxes, or can have
mailboxes, in the email services of
Microsoft 365. So I'm using the Azure
Active Directory tenant as an identity
service for my Microsoft 365 tenant. So the two of them can be linked, and in this case, they are. So I'm going to go
through some of these options here that relate to the directory services, and then a little bit later on we'll dig a little bit
deeper into the users, the groups, and the authentication mechanism. First, in my Overview blade, I see here that I have
my Azure AD for Office 365, which actually tells you that it's linked to your Microsoft 365 tenant. As well, I see here that
I do not have an Azure AD Premium. So when you first get a directory service, it is a standard based directory service,
there are additional features that are available in a premium version of Azure AD, and some of those are multi-factor
authentication, the ability to log on by using multiple factors of authentication, and many more functionalities, and there is
a separate course simply on Azure AD within the LinkedIn library that I suggest that you go and review all of that
information, and there is a lot that has to do with the Azure AD Premium. So if I go through the list of objects and things
that I can manage within my Azure AD, of course I've got my users and groups, and we'll look at that a little bit later on. I
have also my organizational relationships. Now if I click on organizational relationships, this is where I can actually invite
external users into your organization. So, you may have users that exist all over the world that are not part of your
organization, they have their own email address, and maybe they have their own authentication mechanism. And you just
want to invite them, to give them access to some resources in your environment. So you can create a guest user for them
here, or there are other options as well that you'll be able to invite them by not creating a guest user, but allowing them to
create their own guest users. So we have many users that are listed here, we've decided to blur them out, to hide their
identity. But you can add guest users here by clicking New Guest User, providing their email address, and the user will be
added as a guest. As well, I've got my identity providers here. If you want to add an additional mechanism of
authentication within your Active Directory, you can actually add that. At this point, there is only one identity provider
that's available, which is Google, so that users could actually use their Google account to log in and to access your
resources in Azure AD. So I'm going to close that up now, and go back to my Azure AD Admin Center. And, in going
down the list of options here, the one that you will likely want to configure pretty close to when you deploy your Azure
AD is the roles and administrators. Roles and administrators is essentially the various predefined roles that exist in Azure
AD that you can assign to various users to perform specific tasks within Azure. And some of those tasks are not Azure
AD tasks, they're Azure tasks all up. For example, you've got the ability to assign a cloud application administrator. So
this is someone who will be able to manage application registrations and applications that exist within your Azure AD
infrastructure. As well, I can go down here, I can provide somebody the ability to just invite. I want somebody to be able
to invite external users. Now, we'll talk about that a little bit later on, but you can note that by default, any user in your
organization can invite. But you can turn that off. The highest role that I can have here is called the Global Administrator.
Global Administrator is a user that has the highest level of privileges within your Azure subscription. And surprise,
surprise, that is my role. I am a Global Administrator, which is why I'm able to perform any task and demonstrate them to
you. If my role was anything less than that, I would be restricted from performing certain tasks, and certain menu options
would be grayed out. Still within my Azure AD, I've got different options that I can set here, and one of those options I'll
want to set from the get-go is my custom domain names. Now, the custom domain names are the names that can be used
for your user logon requests. So those are domain names that you've purchased, and that you have then verified in DNS as
your own. I can add any domain here, as long as I own that domain. If I don't own that domain, that domain cannot be
verified, and therefore, I cannot provide that domain as a logon domain name for my users. I cannot create URLs with that
domain name either. For example, in order to add a domain name, I would click on here, Add Custom Domain. And let's
say if I owned the domain linkedin.com, which unfortunately, I don't, I would be able to verify it later on. But at this point
I can add it here, click Add Domain, and then it will prompt me for verifying. Verifying means that if I own the domain, I
have the ability to modify the DNS zone, that public zone that is used in DNS to identify that domain. I have the ability to
modify it, if I own the domain linkedin. And if I have the ability to modify it, it's telling me, okay, if you can modify,
prove it to us by creating a record in the DNS database that has this value in it. So if I create a record in the DNS database
that have this value, and I click here Verify, what happens is that Azure is able to connect to DNS, verify that that record
is in the DNS database, and then tell me success. Now we believe that you own that domain, therefore, we will assign that
domain to your Azure AD tenant. And the result of that is that once this domain has been added, it will be verified, and
you'll see here that I have my default domain name, which is netlogon.com, that has a status of Verified, and that means
that I've created the necessary record in DNS and that whenever I create a user account, I can specify that user account to
have an email address and a logon name that uses this suffix. That uses the value here of my domain name. So, custom
domain names can be added, but they must be verified before they can be used.
}
One of the benefits of having this cloud based directory services, is that it can integrate with other cloud based services,
and these cloud based services don't even need to be part of the same organization. They can federate and they can
authenticate to one another. So using our Azure Active Directory, we can even publish enterprise applications or publish
applications to all users in our enterprise. Applications that exist in our infrastructure and applications also that are public
and that are available through third party services. If I click on Enterprise applications, I actually see all the applications
that are part of my environment, and I can add additional applications as well.
Some of these applications I've deployed over time, or some of them are default applications, or some of them were
automatically installed through a third party software as a service, or through Microsoft 365, also a software as a service
solution. So for example, here I've published Dropbox for Business. So this is a non Microsoft app that I've linked through
my Azure enterprise applications in Azure Active Directory, and I can configure this app directly from this portal. By
clicking on the app, I have all of the configurations for the app. Such as its authentication, the allowed user, the endpoint
that it uses to connect to Dropbox, and so on. So these third party applications then are accessible to my users using a user
portal or a client portal that they use to access application. That client portal,
So let's take a look at user accounts in Azure Active Directory. If I click on all users, I see here that I have a list of user
accounts. Some of them are listed with the type member, and those are standard users, and others are listed with the type
guest, those are external users. As well, I have the source, and the source defined where that user account is drawn from.
So here I have a user account named Admin1, [email protected], which is a member in my Azure Active Directory,
so that account is listed in my local directory of Azure. If that account here, I have a guest user, comes from an external
Azure Active Directory infrastructure it tells me right here. If the account comes from a structure that is outside of Azure
Active Directory, I will see that listed as well in the source, in this case, multiple means it's not in Azure Active Directory.
Now, we see here the source of our user account, where it exists, but if the user account is not in my local Azure Active
Directory, then it's a guest account. It's an account of an external structure. To create a guest account, I would click on
new guest user, and that button is actually available on multiple blades. If I create a standard user account, I click on new
user. So let me go ahead and create a new user account to see what that looks like. When I create a new user account, I
have to give him a first name and last name, so I'm going to call this Steve Smith. And I need to give a username for Steve
Smith, so I'm going to give him [email protected], my local domain here. Oh, and it does a verification, and that
verification fails. Already have an SS Smith. Again, whenever you create objects, the validation always occurs. So I'm
going to call this one [email protected]. It's going to validate once I tab out of that window, and gives me a green
check to tell me it's all good. So now I can click here and validate his profile, set his profile settings, different properties
of the account, which groups the user is a member of, as well as his directory role. Is that user account an administrator of
any kind? As well, I have a password that is automatically defined for this user account, this is an automatically generated
password by Azure, and I can click on Create. The user account is created in my infrastructure, and if I search for the user
account, Steve, I find I actually have two Steve Smith, I've created a Steve Smith before. You notice that the actual name
of the user account doesn't have to be unique, only his username. And that's something that's important to demonstrate
here that the username is really the component that we need to have totally unique. So here if I click on Steve Smith, I see
that I can manage all of the properties for Steve Smith, add him to a group. I can modify his title, who he reports to, as
well some of the advanced user settings for Steve Smith. I can also provide an administrative role for Steve Smith if I
want him to be able to manage multiple objects within the Azure portal. So I can actually give him a role, and from here, I
can provide, one of the various roles, you'll remember, that global administrator is the highest role that that user can have,
and I'm going to give him application developer. Click on Select, and now that role has been provided to that user. You
can now use the portal to manage applications. As well, group membership can be modified and added here, and a license.
Now, the licenses are the licenses that I've purchased as part of my infrastructure. Here, I have multiple licenses that are
available to me, a Dynamics 365, Microsoft Flow, an Office 365 license, and a Power BI license. I'm going to select these
two free licenses, and assign it to that user account. And the option that tells me right away is that activate an Azure AD
paid subscription in order to assign licenses to group. So this is just a warning, I've actually been able to assign the
licenses to this user but I'm being reminded that there are some additional functionalities in Azure AD to assign licenses,
and one of those is to create a dynamic group that actually provides licenses automatically whenever you create a user. So
Azure AD is reminding me that the next time I perform this task, I can actually have that task be automated. I'm going to
click on Assign the Licenses, and complete this task. I have one of my licenses that failed, because the license actually
expired. So, I'm going to back here to my all users, and see here my user settings for all of my users in Azure AD. And
there's additional functionalities here, such as sign-ins and audit logs that are not available for my tenant, and I'll show you
the error right away, and that is because I don't have an AD Premium license. Note that not all configurations for users are
available to you depending on whether or not you have a specific Premium upgrade to your Azure AD. So don't be alerted
if you're unable to configure some settings, and that is also true within all of Azure Active Directory, some settings are
only available for Premium options.
2.1 Introduction.
2.1.1 Modern identity
Roughly 20 years ago Active Directory was introduced for the first time in Windows Server and it turned out to be a
massive hit among IT administrators. It created millions of jobs, transformed millions of businesses and was a critical
contributing factor to the roaring success of Windows Server. Fast forward to present day, although Windows Server
Active Directory is still extremely popular, there are some areas where it is unable to catch up to today's demanding IT
challenges.
Based on my experience I would say, the number of said challenges will only continue to rise with time. So we need to
tackle them by rethinking our strategy and taking a cloud-first approach to identity. Think of modern identity. However,
before we do that, let's take a quick walk down history lane. As administrators, whenever we hear the word identity we
typically think of user credentials stored on domain controllers that enable access to business applications. It used to be
like that for a very long time, but then things started changing. Some applications moved to the cloud, while other
remained on-premises, leading to the segregation of the infrastructure into two parts, cloud and on-premises. Let's focus
on the on-premises part first. When a user wanted access to an application, it was simple. The user could authenticate
against the domain controller and quickly get to the application they needed, because the user, the domain controller and
the application were all present locally. But, when it came to the cloud, things were not as
simple. Firstly, there was no central authority for authenticating users across applications.
Secondly, users were accessing applications over the internet, thereby, increasing the
overall security risk. These were the two biggest hurdles, among many others, that we
had to overcome, in order to truly embrace the cloud. That paved the way for the concept
of identity as a service, we have today. A centralized and secure identity store for
authenticating users requesting access to resources in the
cloud. And everything is available as a service today,
software, platform, infrastructure, then why not identity,
right? It just seems so obvious at this point. You may not
realize it, but identity as a service is already playing a
much, much bigger role in our lives than we know.
Microsoft's implementation of identity as a service is
named Azure Active Directory. It powers pretty much the
entire Microsoft cloud ecosystem. Trust me, you cannot
really afford to skip this. You'll have to learn it sooner or
later, so you might as well do it now, with me, in this
course.
2.1.2 Prerequisites
Here are the prerequisites you'll need to follow this course. This course is aimed at the target audience of Windows
administrators managing Microsoft environments, then Azure administrators managing infrastructure resources, identity
professionals working on Microsoft or non-Microsoft identity solutions, business decision-makers, CXOs of small to
medium-sized businesses, and app developers who write or want to write applications for the cloud. The prior knowledge
required to understand this course is at least a basic understanding of Windows Server Active Directory and Azure
Administration, then business strategy and a little bit of application development. There are only a few lessons where an
understanding of application development is helpful, but you should be able to follow just fine even if you don't know it.
Finally, as far as required resources are concerned, you need an Azure subscription if you want to practice the things you
are about to learn hands-on.
2.1.3 Roadmap
3
6
Here's a roadmap of how we'll try to ascend to the cloud, one clip at a time. This course consists of six parts. The part that
you're currently watching is the introduction. In the first chapter, Azure Active Directory Fundamentals, I'll give you high-
level overview of the various Azure AD components, describe why you need them, and explain what they exactly do. This
chapter will be the heart of this course. In the second chapter, Industry Standards and Compliance, I'll talk about
regulatory compliance, open standards, and how Azure AD abides by them. This chapter will give you a good idea of how
the world perceives this product. In the third chapter, Provisioning an Azure AD Tenant, I build a scenario for a fictitious
organization and spin up an Azure AD Tenant during a hands-on demonstration. In the fourth chapter, Potential Business
Impact of Azure AD, I'll outline the various improvements that you'll probably be able to see after adopting Azure AD for
your organization. And finally, in the last part, the conclusion, we'll give you all the key takeaways of this course and
explore steps for further learning. It's also worth noting that this course is only intended to give beginners a very high-
level overview of Azure AD as a product, which means we'll have more theory and fewer demos. If you're already
familiar with the basics of Azure AD, or are looking for a deeper understanding of the product, this may not be the right
course for you. You'll probably want to look at my other courses in the learning path in that case. But if you're a beginner,
then you are at the right place. For the best experience, watch this course in full-screen. So buckle up your seat belts, we
are ready to take off. I'll see you in the next chapter.
2.2 Azure Active Directory Fundamentals
2.2.1 Identity and access
Azure Active Directory Fundamentals. In this chapter, we'll learn about the core competence of Azure AD, why they are
needed and understand what they exactly do in terms of functionality. I'm really excited about this chapter, because there's
so much awesome stuff coming your way. Imagine that you are traveling internationally for business. What is the first
piece of documentation you'll need to be able to do that? Well a passport, which will be used by the airport authorities to
validate your identity. After that, you'll be in flight for a few hours and then land.
At the destination airport, along with your passport, which will be used
by the immigration officers to determine your level of access in their
country, basically the purpose of visit, either transit, tourism, business,
or employment. Now what would happen, if anybody could just fly to
any place they want without a proper passport, or visa? That could lead
to potentially disastrous circumstances. So you realize how vital
identity and access is. That is true not just for aviation, but also
enterprise organizations. Its implementation is a little different though,
but the concept is
essentially the same.
If we compare them, instead of a passport for identity, we have
credentials for authentication. Instead of a visa for access, we have
permissions for authorization. Instead of a boarding pass for the trip,
we create a sign-in session using cookies. There the safety of the
people is at risk, and here the security of the company resources is at
stake. You can't travel anywhere internationally without fulfilling the
passport and visa requirements. And ideally, you shouldn't be able to
traverse the corporate network without proper authentication and
authorization as well, because it's the first barrier in protecting
privileged resources. But unfortunately, sometimes people with bad intentions circumvent their way around these
measures, get unauthorized access and cause damage. That's where Azure AD comes to the rescue.
Its ultimate job is to minimize, or eliminate such threats, by providing administrators, like us, with sophisticated tools for
identity and access management.
Then, we have support for integration with modern SaaS applications, as well as PaaS applications, that you're developing
in-house or through an independent software vendor. After that, we have the Application Proxy. Now, this is a really cool
feature, in my opinion, because it lets you authenticate users in the cloud, and then redirect them to remote applications
running on-premises. So, it essentially wraps an unauthenticated application running on-premises with a secure
authentication layer in the cloud. The bottom line here is that Azure AD undoubtedly does a great job of covering the
basic requirements like users, groups, computers, and applications. But that's not all. It does so much more. It extends
device management to now include bring your own device or BYOD scenarios. So like this Azure AD Join for company
owned devices, you have device registration for laptops, computers, and mobile devices that are owned by employees and
used to access corporate resources. No such solution is available in Windows Server Active Directory out of the box.
Then it has Azure AD B2B or business to business. This feature makes sharing your corporate resources and collaborating
with users from partner organizations easy and secure. The users are from external organizations that need temporary
access to your organization's assets. Hence the term B2B. The traditional alternative to this is deploying Active Directory
Federation Services between organizations and configuring trusts. Next, it also has Azure AD B2C or business to
consumer. This feature enables you to handle the identities of individual customers using your public facing business
applications. The users here are also external, but instead of belonging to one organization, they're individuals using the
application or service you offer to the general public. Again, there's no such solution available in Windows Server Active
Directory out of the box. Now, some of you may be wondering, "All this is great, but what about the investments we've
made to set up Windows Server Active Directory based infrastructure on-premises? Is all that money as good as thrown
out of the window?" Absolutely not. Azure AD and Windows Server actually complement each other really well. You can
use the AD Connect tool to integrate your on-premises Windows Server Active Directory with Azure AD for a hybrid
identity infrastructure. The benefits of doing that is so your users can access both on-premises and cloud resources
seamlessly with the same credentials that are valid across both environments. Now coming to the ultimate promise Azure
AD intends to fulfill. Sure, there are tons of swanky features in Azure AD, but they're all built around one single core
principle, security. The historical problem with security is that there are always people who are able to outsmart it. But
thanks to evolution of machine learning, Azure AD's defenses are much stronger and smarter now. And it's not just the
security that's smart.
Even day-to-day administrative tasks have become smarter and more intuitive. How, you ask. Why don't we find out?
What you jut got was a high level overview of the main Azure AD components. Now, let's take a look at each one in a
little more detail.
Let's start with AD Connect. I chose to start here because I want to walk you through everything in a logical order that
you typically have to follow when you're holding out Azure AD in your environment. And there's a fairly good chance
you'll probably start with the AD Connect Deployment.
AD Connect integrates Windows Server Active
Directory on-premises with Azure Active
Directory. It serves as a bridge that connects
the two environments to give you a hybrid
identity infrastructure. So this tool needs to be
installed and configured before your users can
repopulate it in the Cloud. And although AD
Connect is an Azure AD component, it is
installed on-premises on a member's server
preferably on one that's part of the domain. The
primary responsibility of this tool is to
synchronize user objects, group objects, and
computer objects from on-premises to Azure
AD.
This is required so that when users who had
created on-premises try to access resources in the Cloud Azure AD is able to recognize them and it's not only objects that
get synchronized, there's also a bidirectional flow of configuration. So any changes made to objects on-premises are
automatically reflected in the Cloud and changes made to objects in the Cloud can be configured to reflect on-premises
automatically. That way both copies of the
object are consistent with each other. AD
Connect also helps you set up Single Sign-On
across the two environments, so the line
between local and cloud apps fades out for the
users.
You can also set up Federation if you've got
Active Directory Federation services installed
on-premises. You only want to do this if you
have a hard requirement that authentication
requests should only be served on-premises
and not in the cloud. AD Connect comes with a service called the AD Connect Health, which monitors the availability of
the AD Connect server itself and your Active Directory infrastructure. It uses a local agent to collect this information and
sends it to the AD Connect Health portal in Azure. So if ever synchronization is not working as expected, the Health
portal should be the first place to check. Although it's implied but let me explicitly state that you will require AD Connect
only if you're thinking of a hybrid architecture, but if you're thinking of a pure cloud strategy, then you don't have to
worry about this tool at all.
The next step in onboarding onto Azure AD is to manage users and groups. All objects in Azure AD are revamped for
cloud readiness, regardless of whether the objects are created in the cloud or synchronized from on-premises through AD
Connect. Objects that are native to the cloud are already compatible with it, but those that are synchronized are upended
with the necessary attributes after synchronization to make them cloud-ready.
You have two types of groups. Security groups are used for conventional use cases where the primary intent is to give
multiple users access to resources. If you've ever worked with security groups in Windows server active directory you
already know what they do. Security groups in Azure AD offer pretty much the same functionality. The other type of
groups are the Office 365 groups. The primary intent of creating an Office 365 group is to facilitate collaboration among
the members of the group, along with giving access to resources. Office 365 groups can provision a shared mailbox in
Exchange online, a site collection in Share Point online, a chatroom in Microsoft Teams, and so on, for the members of
the group to work together across Apps. You can have accounts of any user type, federated, synchronized, or cloud-only,
be members of any group type, security or Office 365. There's no restriction on the type of users that can be placed into
either group type. There are two cool group features that I really like, dynamic membership and ownership delegation. We
typically add members to groups manually, that's the static method, but with dynamic membership Azure AD is capable
of automatically adding users to appropriate groups based on customs rules. For example, if a user's department attribute
is marketing, add them to the marketing group. There are several other simple and complex rules that you can create to
classify users and put them into appropriate groups automatically, and you can delegate the ownership of the group to the
respective head of the departments. They get the freedom to add or remove members to the group, and you get, well, one
thing less to manage.
While we're on the topic of users, let's talk about managing external users. If you remember from the overview, there are
two solutions for external users. The first one is Azure AD B2B, or business to business. It's implemented when you have
users in partner companies, who need access to your corporate resources. How this works, is that you send them an email
invitation to join your Azure AD tenant. Once they accept the invitation, they show up in your directory and can be given
access to any resources, in the same way that you would to other internal users. Since these are external identities, they
have an external identity provider. So the authentication of such users happens at the external provider and then they are
redirected to the resources they need to access in your tenant. You don't have to worry about passwords, or any part of the
lifecycle of such accounts. You can invite users from other Azure AD tenants, users with a Microsoft personal account, or
even other non-Microsoft identity providers. Azure AD B2B is designed to eventually replace the traditional method of
using ADFS federations and trusts. B2B is supposed to be its cloud successor. That means no longer having to worry
about going through the convoluted process of configuring federation services, its availability, or the network connectivity
between organizations. Wouldn't that be nice, hunh? The second solution we talked about in the overview was Azure AD
B2C, or business to consumer.
As I mentioned, Azure AD B2C is mainly used by businesses for handling identities of customers using their public-
facing applications. The traditional way of doing this required writing tons of code, potentially increasing exposure due to
bugs. Azure AD B2C makes the life of developers a lot easier, by offering them end-user identity lifecycle at scale. That
includes the whole process. Letting the user sign-up using email, or a third-party identity provider of their choice. Editing
their own profiles. Resetting passwords. And deleting their accounts if they wish to. You can choose exactly which fees
are required to represent a user profile. So the control you get is quite granular. The best part? It easily scales to millions
of users. So as I said, the days of writing tons of code will soon be long gone. And you don't have to worry about those
millions of users inadvertently accessing your corporate resources, because your internal users' directory and the B2C
directory are entirely isolated, not connected in any way. And the B2C feature works with all types of applications,
desktop, web, mobile and single-page applications.
device registration
Azure AD Join.
When I say Azure AD Join it's for cloud only environments,
meaning either those environments where there is no on-premises
presence, or scope of access for the devices is limited to cloud
resources only, and the devices need to be managed in the cloud
and not through on-premises solutions. That's when Azure AD Join is your go-to option. You'll need at least Windows 10
operating system installed to use Azure AD Join. How do you manage them? Well, they can be managed through
Microsoft Intune or other third party MDM solutions. Next, when I specifically say hybrid Azure AD Join things are a bit
different. You go for this option when you require access to resources across both environments, on-premises and in
Azure. In addition, devices also need to be managed using on-premises solutions like Windows Server Active Directory.
That's when you choose hybrid Azure AD Join.
Next comes Azure AD directory roles. This applies to users in the directory. With this you can assign different levels of
administrative rights to relevant users in the organization. You already know administrator groups in Windows Server.
This is its equivalent counterpart in the cloud. There's a slight difference in the naming convention though. For example,
global administrator in Azure AD is roughly the same as an Enterprise administrator in Windows Server Active Directory,
but the concept is fundamentally the same. Then comes Azure AD identity Protection. This feature gives comprehensive
insight into the status of your identity infrastructure in the cloud. It has the ability to flag users for risk, discover irregular
access events, identify potential shortcomings in security, give suggestions on how to fix those shortcomings, and
recommend actions that you can take to mitigate the risk associated with the flagged users. Pretty cool, right? All the
features before identity protection were precautionary to ensure nothing bad happens, but identity protection is a
serviceable feature. It comes into play for bringing those little things to your attention that may have already skipped past
your supervision. Basically, it's for monitoring and reporting, to put it succinctly. After the precautionary and serviceable
features we have tools for identity governance.
These help establish a proper procedure for managing the end-to-end lifecycle of user identities in the organization. You
can use this to streamline processes in identity and access management that may not be wrong, but probably have a room
to improve based on the best practices in the industry.
There are three tools in the identity governance toolbox:
1) Privileged Identity Management, or PIM. Now PIM takes the principle of least privilege and adds the time dimension
to it. The principle teaches us that a user must only be given just enough permissions required to do their job, not more,
not less. But even the minimum privilege assigned to the user may not always be in use, so with PIM you can enable just
in time elevation of privilege for eligible users on request. Think of it as scaling up and down, but instead of resources
you're scaling the permissions up and down based on the requirement.
2) The next tool we have here is Entitlement Management, or EM. This allows your end users to be more informed
about what resources they have access to or can request access to. Accessing resources has always kind of been a hit or
miss game for end users. Try to access a resource, if you can't then call the help desk. Sometimes users are unaware that
they have access to certain resources. EM aims to change that by allowing users to discover and request access to groups,
applications, and resources in the form of packages that they are eligible for.
3) the Azure AD access reviews. This nicely rounds up all the configurations we make in the previously mentioned tools.
It enables us to periodically review the access that has been assigned to users, re-certify it if the access is still required, or
revoke it if it isn't. You can also run regular audit checks where you can add a justification on why a user requires specific
access. So you now know that Microsoft is not kidding around when it comes to Azure AD security. It's extremely serious
about it. Plus, of course you get all the expected features like machine learning based surveillance, logs, alerts, and reports
to accompany it. I know this slide covers a lot, but there's so much to talk about in security that I couldn't help but include
everything. I wanted to expose you to at least the key terms so that you can follow up on it later if you're interested.
Our primary focus will be to understand how easily Azure AD blends in with Industry Standard solutions, and how well it
satisfies Enterprise Compliance requirements. After all, what good is a solution if you need to change a lot to use it and it
doesn't comply with organizational requirements, right? Fortunately, that's not going to be a problem with Azure. First,
let's begin by talking about Open Standards Support in Azure.
Open Standards enable us to use popular technical specifications that have already been embraced by the industry and
the tech community. These standards can apply to a variety of things ranging from writing code, transferring data,
exchanging information or, to deploying resources. The reason Open Standards are extremely essential is that they allow
us to build components using existing skills and without using proprietary solutions. Let me elaborate on why that's
important. If you do pick up proprietary solution and learn how to implement it, there's no guarantee that the skill you
learn will be beneficial in other roles outside of that particular solution. An even bigger problem is that you depend on a
single vendor to support the solution. What if they shut down operations tomorrow? What if you don't like the solution
and want to get rid of it but you're locked in? Vendor lock-ins are pretty common. And what if the solution in itself is
great but doesn't integrate well with the other products you have? So, there's a lot of uncertainty with proprietary solutions
especially those built by less reputable vendors. Using Open Standards can avoid all these hassles. Azure supports a wide
variety of Open Standards. For example, if you are writing backend code, you can use Node.js, Python, Java or PHP,
among others. You can spin-up VM's running Red Hat Enterprise Linux, plus a whole bunch of other options. And from
an identity and access standpoint, you can use authentication protocols such as OpenID, OAuth or SAML. Leverage
Password lets log-ins using FIDO, or use the system for cross-domain identity management or SCIM specification which
is a standard used to exchange identity information across applications and devices. These are just a few examples of
Open Standards that Azure supports. The list is actually much bigger. So Microsoft isn't just hunting for PR value. It
really is extremely serious about supporting Open and it's showing that by getting up close and personal with it. So rest
assured, regardless of whether or not you're a Microsoft shop, you'll be able to use Azure with freedom and flexibility.
Nine
of them are Heather, Audrey, Rae, Kali, Chris, Brian, Tracey,
Matt and Yash, the tenth one is me, Kunal, the IT
Administrator. We will be provisioning an Azure AD tenant
for these 10 users of WorldTravellerTV.
In this clip, let's see why a temporary domain is not good enough and why we need to add a custom domain to our Azure
AD tenant. So let's get this straight. Can temporary domains be used for production environments? Well theoretically yes,
but practically there will be many issues. All your usernames, email addresses, sub-domains, and resource links will have
an emailstring.onmicrosoft.com appended to it, everywhere, as you can see on the screen. It makes the URL unnecessarily
longer, unprofessional, and doesn't allow you to use your own brand name anywhere in the domain name. That's why in
spite of the fact that a temporary domain is publicly routable, it's not suitable for production environments. Now, let's see
how things change when we get a publicly routable custom domain of our own. Let's say, for example, I have rights to
mydomain.com. Here's how things change when you have a custom domain. Your usernames, email addresses, sub-
domains, and resource links all have mydomain.com in it. So, it's more convenient, professional, and has your brand in the
domain name. It's like naming a baby. Adding a custom domain is basically a three step process.
First, list the domain
in Azure AD. Listing
will make the domain
appear in Azure AD,
but in an unverified
status denoting that it's
not ready for use. So in
the next step you'll
have to verify domain
ownership. Essentially,
proving that you really own the domain you want to add and use in Azure AD. And last, after the verification is
successfully complete, you should now set the custom domain as primary. Doing this instructs Azure AD to use it as the
domain for all purposes going forward. After these three steps are done in order, your new custom domain shall be ready
for use in Azure AD. Another point worth noting is that although the temporary domain will no longer be in use, you're
still not allowed to make any changes to it. You cannot edit or delete it from the list of domains. So what we did here was
add the custom domain to the default directory, which was created during the time we signed up for the Azure
subscription. Now there's another way we can go and that is we don't use the default directory, but in fact, create a new
Azure AD tenant. Here we can choose the sub-domain part of the temporary domain, so it can be
whatever.onmicrosoft.com as opposed to emailstring.onmicrosoft.com. The .onmicrosoft.com part will still be there
because afterall, it's a temporary domain. For the sake of this example, let's say we choose mydomain.onmicrosoft.com for
the temporary domain. After that you can then add your custom domain to this directory instead of the default directory.
The rest of the process is pretty much the same, listing the domain, verifying ownership, and setting it as primary.
You will typically do this if you have a specific reason to not use the default directory. Or else you can simply use the
default one. Now, let's talk numbers. You can have 900 such custom domains, or also called managed domains, in each
tenant. That's the term Microsoft uses in a lot of places in the documentation. Managed domains are just custom domains,
but if you configure federation on the domains, then the number drops to 450 federated domains. That makes sense
because the domains come in a set of two. Now that we are clear with the process of adding a custom domain, here's what
we will do for our World Traveller TV scenario. We will create a new Azure AD tenant with the temporary domain
worldtravellertv.onmicrosoft.com and then perform the three step
process to add our custom domain worldtraveller.tv to it. Do you
remember what those three steps were? List domain, verify
ownership, and set to primary. The only reason I'm opting to
create a new directory instead of using the default one is for you
to see exactly how the process of creating a new directory from
scratch looks like. If I use the default directory, you'll be missing
half of the action. So let's see that in action.
2.5 Potential Business Impact of Azure AD Adoption.
2.5.1 Impact on standalone infrastructures
So far we've explored the fundamental building blocks of Azure AD, seen how well it fits in the industry and walked
through a few demos to see it in action. In this chapter, let's analyze the potential business impact of Azure AD adoption. I
say potential, because Azure AD has many components. The overall business impact may vary from organization to
organization, depending on which components are being used. Exact numbers can only be determined for individual cases
where we have full access to the deployment details. Alternatively, what we can do and will do is predict how Azure AD
may impact businesses based on the factors we've previously discussed. We make those predictions in three key areas of
interest:
Change in infrastructure complexity,
employee productivity
monetary variation.
Here's the impact on standalone infrastructures for small medium businesses. The assumption here is that we're talking
about a brand new organization trying to decide what to choose for their identity needs.
An on premises deployment are completely leveraged identity as a service in the cloud. The infrastructure consists of
hardware and software. Considering the bare minimum that's required to deploy a fully functional identity and access
system that's accessible both internally and remotely, we will need the following.
Hardware comprising of servers, All of these will have to be renewed or replaced at the
networking and storage devices, end of their shelf life.
redundant electrical connections,
redundant Internet connections,
cooling solutions for the equipment,
enterprise support packages for the hardware,
physical security measures to keep all of it safe.
Then there's software. active directory domain services role installations,
the DNS server roles,
probably active directory federation services,
the remote access role,
Windows server update services,
Windows server backup.
All of these services will need regular maintenance and
troubleshooting. If there are no other services present,
the list on the left and right, combined, will be the
absolute minimum you'll need to setup an on premises
identity infrastructure for a small to medium sized
business.
But instead of deploying the identity infrastructure on premises, you can avoid having to deploy and configure all of it by
adopting Azure AD for your identity needs. Azure AD has viable alternatives for all of these components.
So you can just have client computers on site, and run the entire server infrastructure with all services in the cloud.
That's how deeply Azure AD can affect the infrastructure in a small to medium sized business.
How does Azure AD impact the infrastructure in such situations. In large organizations judging the impact only on the
basis of hardware and software may not be fair since there are a lot more factors involved.
So let's start with hardware and software but also look at other things after that. The assumption here is that we're talking
about an organization which is already operational and has a significant on premises infrastructure.
They are trying to figure out whether hybrid deployment would benefit them. Let's analyze what happens if they choose
Azure AD.
The number of rack servers will decrease because a part of the identity workload will shift to Azure AD instead of on
premises servers. And since the number of servers decreases networking and storage equipment required for those servers
will also decrease. As a result of the above the number of enterprise support packages will also come down. The overall
impact on these three components will be significant. But the impact on other components, like electrical and internet
connections, cooling and physical security will be very minute. Because only the identity servers and their associated
infrastructure have been migrated to Azure AD. Other servers and services will still be there. On the software side the
Window server instances will decrease because of the smaller number of servers. This means less maintenance and
troubleshooting. Then the number of servers with active directory domain services will also decrease. That means less
worrying about replication and consistency issues. Similarly, fewer DNS Servers will mean less worrying about zone
replication and name resolution failures. Using Azure's built in seamless single sign on capability and Azure AD B2B it is
quite possible to get rid of active directory federation services on premises completely. I don't have to tell you how
simpler that'll make our jobs, right? Next, if applications that have remote users frequently connecting to it are moved to
the cloud it could be possible to get it off or at least drastically reduce the dependency on the Remote Access role and
VPN. So instead of users accessing on premises resources through a VPN connection, they just access those resources
hosted on the cloud. The two perimeters here that won't be affected significantly are the Windows Server Update Services
and Windows Server Backup Services. They will be impacted but then just minute. So this was a very high level
assessment of the impact on hardware and software for enterprise organizations.
Now let's look at other factors and how they're affected after deploying Azure AD in enterprise organizations.
1) One area administrators see a big improvement after adopting Azure AD is the simplification of the letter
configuration for connectivity we do in headquarters and branch offices. Theoretically, we know that the hub and
spoke topology has a single point of failure at the hub and a mass topology is complex by design. But if we made
Azure the hub and all offices the spokes it is possible to get the simple efficient network that just works. Azure at
the hub will mean variable chances of failure and direct links from offices to the cloud will mean low latency.
This can make the networking infrastructure for supporting identity and other services much more reliable in
comparison to a configuration without Azure.
2) With Azure AD administrators get a great relief in the effort required to maintain a highly available identity
infrastructure. Identity and access is one of the most critical services on the network and equally so is its
availability that puts tremendous pressure on admins to ensure that identity servers don't go down and if they do
everything else has to be put aside and the priority becomes bringing them back online. But by leveraging Azure
AD admins get an identity as a service which is already highly available with excellent up time. This ensures
business continuity and lower stress levels for admins.
3) Speaking of business continuity, another factor that can disrupt it is a catastrophic event which takes down a big
chunk or even the entire physical site of your infrastructure. Azure AD can be of immense help in such situations
of disaster recovery as well. While you're working on rebuilding the servers and bringing the services back online
Azure AD can continue to authenticate users and allow them to access whatever resources are still available. This
means that instead of the entire infrastructure crippling and coming to a stand still it operates at a reduced
functionality.
4) The fact that Azure AD supports Multi-Form Factor Devices like mobile phones and tablets has a huge impact on
the modernization of the overall infrastructure. Users today want convenience to make due of what they have
access to no matter where they are. Thanks to features like Azure AD join and device registration, administrators
can now support modern devices of multiple form factors, enable accessibility for end users and ensure strict
compliance.
5) Finally, this one is my favorite. With Azure AD administrators get the power of global scalability. Businesses
love tools that can help them propel growth. Conventionally, venturing into new geographies is usually a big
undertaking due to logistical and financial challenges involved. But thanks to Azure the brand new applications
and services in any part of the world is now just a click of a button away.
And also again, thanks to Azure AD managing users and their devices in any part of the world is also equally easy. Azure
helps businesses achieve globalization. And in my opinion that is the best thing that can happen to an organization.
2.5.3 Impact on employees
About the impact on employees. I'm going to split employees into administrators and end users. We'll discuss end users
first.
Thanks to the numerous self-service capabilities built into Azure AD, end users
can now be less dependent on help desk staff to get things done. That means
less time spent on calls, and more time soent on getting actual work done.
We've also learned that Azure AD gives end users the freedom to choose a
device platform. It could be Windows, Macs or mobile devices running IOS or
Android. This is very important because when users feel comfortable they
deliver better work. Furthermore, mobile devices are not just convenient,
they're also portable. And because of Azure AD support for BYOD, users
can be responsive and productive on the word using whatever device they
have access to. And then, because of Azure AD connect and seamless
single sign-on, users get to simply their credentials management, by just
having one set of them to access all corporate resources. Managing
multiple credentials and keeping their track of which credential goes
where is always messy. With Azure AD, that's not going to be a problem.
That implies since users only have one set of credentials to remember,
they have easy access to resources. They just have to log into their
account with those credentials, and then we will to see all the apps that
have been to assigned to them in one single place. No messing around and
no more bookmarking URLs for different resources. And finally, because
of features like Office365 Groups, users have smarter, sophisticated tools
to better collaborate with their teams on various projects and assignments.
So team distributed across multiple cities can work as efficiently as if
they were all present in a single office. These were the impact points for
end users.
Now, when it comes to administrators, most of our life is pending, deploy, maintain, monitor, troubleshoot and support.
So I like to call this the D-M-M-T-S loop.
We've accepted it to be normal for us to spend the whole day in this loop. But that's not how it's supposed to be.
Ideally, our primary job should be to only supervise things, and get into the loop occasionally when required. But in
today's AD, that's become a distant dream.
Azure AD helps us administrators get closer to that dream by helping us reduce the time spent in the loop.
That's also assuming that we are using a paid edition and not the free one, because we need access to premium features
only available with the paid editions, or else, you could just be using the free edition as well and not be paying a single
dollar for it. Next, in terms of employees, the parameters that involve money are the cost of setting up help desk
employees, the cost of client computers for employees, profits due to employee productivity, profits due to higher uptime
of resources required by end users, focus on core business goal, and employee satisfaction. Here is how each one of these
changes with Azure AD. The cost of help desk employees goes down, which is good. The cost of client computers that
need to be purchased also goes down. Profits due to increased employee productivity go up. Profits due to higher uptime
of services needed by employees to be productive goes up. Focus on the core business goal is stronger due to less
distractions, increasing the profit. And since all of this increases employee satisfaction, that leads to an increase in model
and profits. So what I'm trying to say is the overall profits are bound to go up with the adoption of Azure AD.
The argument bottom line here is efficient infrastructure plus efficient employees equals increased revenues and profits.
2.6 Conclusions