In this chapter, we started by creating a custom role. We then learned how to configure access to Azure resources and how to configure MSI. We also learned how to use and revoke Shared Access Policies, along with how to generate SAS tokens for different services. With the skills you have gained in this chapter, you are now able to secure your resources with ease. You can define roles and various policies for all your users, depending on their needs, which will help you conveniently handle security.
In the next chapter, we will start learning how to manage virtual machines in Azure, as well as data disks, network interfaces, and desired configuration. We will also cover things such as deployments, security, and connectivity.