Summary
In this chapter, we have analyzed the main cloud patterns in order to guarantee identity and security when implementing cloud-based architectures with Azure. We have seen the benefits of each of them (with examples) and I hope that, after reading this book, you now have the knowledge of what you have to check and to do when you're implementing a real-world solution with the Azure platform.
We're at the end of this book. I hope that your mind is now more open in order to be a successful cloud architect.
Â