Summary
As you've seen, there is a multitude of configuration options available to help organizations of all sizes meet their identity, authentication, and security needs.
In this chapter, we discussed the differences between cloud, synchronized, and federated identity, as well as the security controls available with EMS, such as conditional access and access reviews. We learned which identity model can be used to help meet specific requirements – for example, if your organization needs on-premises identity authentication to comply with your security needs, you'll now know that you should choose between pass-through authentication and federated identity.
In the next chapter, we're going to look at technologies that enable endpoint security control and management.