Summary
After having worked through this chapter, you will now be able to design common and cloud identities. Furthermore, you are in the position to build identity management architecture, including MIM 2016 and the Azure AD Connect utility with the necessary considerations. Additionally, you will be able to construct a blueprint with different authentication scenarios including MFA. You are also well-equipped to take the necessary decisions regarding reporting functionalities and usage scenarios. In the next chapter, we will go ahead with the planning of authorization and information protection. We will take an in-depth look into risk-based access control mechanisms and offer you insight into Microsoft rights management services.