Summary
In this chapter, we reviewed the most relevant features of the IAM capabilities you can leverage using Azure AD. You should now have a better understanding of how you can implement mechanisms to protect access to resources and manage users inside and outside your organization.
In the next chapter, we will address security controls that can be implemented to protect your organizations from potential attackers, who use accounts to gain access to sensitive resources in your network.