Implementing Multi-Factor Authentication
Configuring Application Access
Implementing Access for External users
The course is part of this learning path
This course has been designed to teach you how to manage Microsoft 365 access and authentication. The content in this course will help prepare you for the Microsoft 365 Identity and Services exam.
The topics covered within this course include:
- Managing Authentication
- Implementing Multi-Factor Authentication
- Configuring Application Access
- Implementing Access for External Users of Microsoft 365 Workloads
Who should attend this course?
- Those who are preparing for the Microsoft 365 Identity and Services exam
- Those looking to learn more about Microsoft 365
- To learn how to configure and monitor authentication
- To learn how to administer MFA and report on its utilization
- To learn how to configure application registration and use Azure AD Application Proxy
- To learn how to use Azure Active Directory B2B to add and manage external users
To get the most from this course, you should at least be familiar with the Microsoft 365 offering and have a general understanding of its features.
- [Instructor] In this demonstration we're going to register a fictitious web app in Azure AD. To do so, we need to select the Azure Active Directory service in the left pane. From here we can click on app registrations and then select new application registration from the top menu. When the create page appears, we need to provide our application's registration information to Azure. So what we're going to do here is provide a meaningful application name for our app. In this example our fictitious web app is called MyFinance. So we'll call this app MyFinance. Since it's a web app we'll select the web app option and what we'll need to do here is tell Azure what the signin URL is for our web app. In a production environment we would go to our app developer and ask for this value. For this demonstration, we'll pretend that the signon URL for our My Finance web app is https://myfinance.cloudacademystuff.com/signon. After configuring our signon URL we can click Create to create the application registration. At this point Azure AD assigns a unique application ID to the MyFinance application. And with that our application is registered with Azure AD. Now depending on the applications individual requirements or configuration, we can click on Settings to modify further configuration options, such as logout URL, terms of service URL, privacy statement, and other app specific settings. You can also configure different reply URLs as well as application owners. Under API access we can configure required permissions that are necessary to access the app as well as any keys or password that the application requires. These settings will vary depending on the app itself and its specific requirements.
About the Author
Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.
In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.
In his spare time, Tom enjoys camping, fishing, and playing poker.