In the previous chapter, we covered the fifth part of the Implementing Workloads and Security objective. We've covered how to manage role-based access control (RBAC), how to configure access to Azure resources by assigning RBAC roles from the Azure portal, and more.
This chapter covers the last part of this objective, by covering how to configure user accounts for multi-factor authentication (MFA), how to configure fraud alerts, how to configure bypass options, how to configure trusted IPs, and how to configure verification methods.
The following topics will be covered in this chapter:
- Understanding Azure MFA
- Configuring user accounts for MFA
- Configuring verification methods
- Configuring fraud alerts
- Configuring bypass options
- Configuring trusted IPs