Summary
In this chapter, we covered the concepts of identity. We provided information on how identity is now the first line of a defense in depth security posture. We also discussed the concept of authentication and authorization for identity and access management. We then discussed the role of the identity provider for authentication and some common threats that deal in identity theft.
The next chapter will discuss more about how identity and access management is handled within Azure AD.