Summary

As you've seen, there is a multitude of configuration options available to help organizations of all sizes meet their identity, authentication, and security needs. 

In this chapter, we discussed the differences between cloud, synchronized, and federated identity, as well as the security controls available with Enterprise Mobility + Security, such as conditional access and access reviews. We learned which identity model can be used to help meet specific requirements—for example, if your organization needs on-premises identity authentication to comply with your security needs, you'll now know that you should choose between pass-through authentication and federated identity.

In the next chapter, we're going to look at technologies that enable endpoint security control and management.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.224.39.74