Recommending an identity store
As stated in the previous section, you need to understand the resources needed for accessing and designing an identity and access architecture with Zero Trust. The landscape of identity and access expands beyond the company member users. You need to understand the users that will be guests in your tenant, the companies that partner with your company for collaboration, and the customers that will be accessing your company resources, such as an e-commerce website or registration pages for events.
These scenarios pose potential risks to the organization as the identity and access environment expands beyond your own tenant. The foundational security policies and techniques that are used to protect member users should be maintained by anyone that is accessing the organization’s resources. Users’ identities, business partners, and customers should be protected through the security capabilities available within Azure AD.
Overall, users want...