Summary
In this chapter, we have covered authorization in Azure and how to manage user access, and introduced tools that will help you scale your user base without it becoming unmanageable.
We have covered the different types of roles available – Classic, Azure, and Azure AD, what the differences are, and how to create custom roles. We then looked at how to use management groups, subscriptions, and resource groups to manage the assignment of roles and, in particular, how rights flow down through hierarchies.
Using PIM, we saw how you can manage and grant time-boxed access to roles and run regular reports to ensure that the least privileged principle is adhered to.
Finally, we looked at advanced tooling for detecting and responding to common threats using Identity Protection.
With what you have learned in this chapter, you can now decide on the best authorization and security options for your own solutions.
In the next chapter, we will learn another complementary set...