Summary
In this chapter, we described the next steps in identity protection with passwordless authentication. We discussed the different options that Microsoft provides to allow users to move away from the use of passwords as the primary authentication method. Then, we learned how those options can be configured and utilized within Azure AD and hybrid architectures. In the next chapter, Chapter 9, Planning, Implementing, and Administering Conditional Access and Azure Identity Protection, we will discuss advanced solutions that protect a person's identity and enforce the zero trust model with conditional access policies and Azure Identity Protection.