Summary
In this chapter, you learned a lot about the Power Platform security, authentication, and authorization, the different types of identities, and the integration options available within an on-premises Active Directory. You have seen, what are the possibilities for authentication of external users. Further you have analyzed the various authorization concepts in the Power Platform components and learned about compliance, privacy, and data protection.
With this knowledge, you should be able to define a security architecture for your own Power Platform solution, choose the best Active Directory integration, and benefit from the various AAD security options. Furthermore, you should be able to configure the authorization of all Power Platform components you plan to use and leverage for security best practices.
In the next chapter, we will focus on the extensibility options of the Power Platform solution components.