Kerberos and Certificate-Based Authentication

2m 16s

Managing Microsoft Entra ID User Authentication looks at authentication methods available with Microsoft Entra ID, excluding verifiable ID. The lesson starts by outlining the different methods, their security and convenience profiles, and their pros and cons. We then look at each authentication method in more depth, see how to set up and configure them, and how they are implemented in cloud-only and hybrid environments.

Learning Objectives

  • Learn about the authentication methods available with Microsoft Entra ID
  • Learn how each authentication method works
  • See how Microsoft Entra ID mitigates password weaknesses

Intended Audience

  • Students working towards the SC-300: Microsoft Identity and Access Administrator exam
  • Those who want to know about authentication methods available with Microsoft Entra ID


About the Author
Learning paths

Hallam is a software architect with over 20 years experience across a wide range of industries. He began his software career as a  Delphi/Interbase disciple but changed his allegiance to Microsoft with its deep and broad ecosystem. While Hallam has designed and crafted custom software utilizing web, mobile and desktop technologies, good quality reliable data is the key to a successful solution. The challenge of quickly turning data into useful information for digestion by humans and machines has led Hallam to specialize in database design and process automation. Showing customers how leverage new technology to change and improve their business processes is one of the key drivers keeping Hallam coming back to the keyboard. 

Covered Topics