Skip to content

Commit 451b478

Browse files
authored
changed files by pdets auto publish service, publishid[e74d97cb-6d59-4f73-9443-4a2f0b8de4eb] and do [publish].
1 parent 0127ba1 commit 451b478

File tree

6 files changed

+26
-25
lines changed

6 files changed

+26
-25
lines changed

learn-pr/wwl-azure/explore-identity-azure-active-directory/3-explore-zero-trust-identity.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.explore-identity-azure-active-directory.explore-zero-trust-identity
3-
title: Explore zero trust with identity
3+
title: Explore Zero Trust with identity
44
metadata:
5-
title: Explore zero trust with identity
6-
description: "Explore zero trust with identity"
5+
title: Explore Zero Trust with identity
6+
description: "Explore Zero Trust with identity"
77
ms.date: 03/27/2025
88
author: wwlpublish
99
ms.author: roberts

learn-pr/wwl-azure/explore-identity-azure-active-directory/includes/1-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
This module covers a wide view of the definitions and available services for identity provided in the Microsoft Cloud from Microsoft Entra ID to Microsoft 365. You start with the basics of authentication, authorization, and access tokens.
22

3-
From this firm foundation of what an identity is, we explore how identity is used as part of your security foundation. We learn about governance and lifecycle management of your identities and identity solutions. The final section opens up the concept of zero trust, and how it should be applied to your identity solutions. What is the Microsoft Entra ID architecture and the connection with identity in Microsoft 365?
3+
From this firm foundation of what an identity is, we explore how identity is used as part of your security foundation. We learn about governance and lifecycle management of your identities and identity solutions. The final section opens up the concept of Zero Trust, and how it should be applied to your identity solutions. What is the Microsoft Entra ID architecture and the connection with identity in Microsoft 365?
44

55
Next you explore how PowerShell and Microsoft Graph are available to build and manage identity solutions. The goal of this module is to prepare your technical knowledge of identity and access management in the Microsoft Cloud.
66

@@ -16,4 +16,4 @@ By the end of this module can:
1616
### Prerequisites
1717

1818
- Basic knowledge of cloud computing
19-
- Azure portal or Microsoft Entra admin center experience are a plus
19+
- Azure portal or Microsoft Entra admin center experience is a plus
Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
It's important to understand the identity landscape before reviewing other identity concepts. How does Microsoft think about identity when designing products and solutions? The essential lifecycle of identity.
1+
It's important to understand the identity landscape before reviewing other identity concepts. How does Microsoft think about identity when designing products and solutions? The essential lifecycle of identity.
22

33
| 1) Zero Trust |
44
|:--------------------------:|
5-
| :::image type="icon" source="../media/icon-verify-explicitly.png" alt-text="Diagram showing a mock-up checklist to show you're verifying each record.":::Verify Explicitly :::image type="content" source="../media/icon-least-privilege.png" alt-text="Decoration. Icon of a simple circuit showing that you should only grant the least level of access needed.":::Use Least Privilege :::image type="content" source="../media/icon-assume-breach.png" alt-text="Decoration. Icon of two arrows with points together showing a point where a breach might have occurred.":::Assume Breach |
5+
| :::image type="icon" source="../media/icon-verify-explicitly.png" alt-text="Diagram showing a mock-up checklist to show you're verifying each record.":::Verify Explicitly :::image type="content" source="../media/icon-least-privilege.png" alt-text="Decoration. Icon of a simple circuit showing that you should only grant the least level of access needed.":::Use Least Privilege :::image type="content" source="../media/icon-assume-breach.png" alt-text="Decoration. Icon of two arrows with points together showing a point where a breach potentially occurred.":::Assume Breach |
66

77
| 2) Identity | 3) Actions |
88
|:--------------------------- |:------------------------------- |
@@ -18,23 +18,23 @@ It's important to understand the identity landscape before reviewing other ident
1818
| Dollars - Licenses | |
1919

2020

21-
1) **First** you have the guidance of always thinking and designing with zero trust in mind. Don't just give access to data and applications because the user has had access previously. You need to always confirm.
21+
1) **First** you have the guidance of always thinking and designing with Zero Trust in mind. Don't just give access to data and applications because the user had access previously. You need to always confirm.
2222

23-
2) **Second** you have systems to provide verified accounts for users and applications. Identity services come from Microsoft Entra ID, from business-to-business federation, from business-to-customer, and from decentralized identity providers.
23+
2) **Second** you have systems to provide verified accounts for users and applications. Identity services come from Microsoft Entra ID, from business-to-business federation, from business-to-customer, and from decentralized identity providers.
2424

25-
3) **Third** you have specific actions identity provides and to keep the systems running. Users and applications can authenticate and authorize to gain access to systems. And administrators need to monitor and maintain the identity systems with proper governance.
25+
3) **Third** you have specific actions identity provides and to keep the systems running. Users and applications can authenticate and authorize to gain access to systems. And administrators need to monitor and maintain the identity systems with proper governance.
2626

27-
4) **Fourth** you get many actions that can be performed once your credentials are verified. Use applications and data, while taking advantage of other identity based services.
27+
4) **Fourth** you get many actions that can be performed once your credentials are verified. Use applications and data, while taking advantage of other identity based services.
2828

2929
5) **Fifth** and finally, you need to always keep your systems up to date.
3030

31-
### From classic identity to zero trust identity
31+
### From classic identity to Zero Trust identity
3232

33-
Historically, identity kept all your assets behind the firewall. Submit a username and password to get through the gate, and you had full access to everything. In the modern world, with the large number of cyber-attacks securing just the network doesn't work. One lost or stolen credential and bad actors have access to everything. With zero trust, you protect your assets anywhere with policy.
33+
Historically, identity kept all your assets behind the firewall. Submit a username and password to get through the gate, and you had full access to everything. In the modern world, with the large number of cyber-attacks securing just the network doesn't work. One lost or stolen credential and bad actors have access to everything. With Zero Trust, you protect your assets anywhere with policy.
3434

35-
| Classic identity | Zero trust identity |
35+
| Classic identity | Zero Trust identity |
3636
| :--------------- | :------------- |
3737
| :::image type="content" source="../media/classic-identity.png" alt-text="Diagram of a set of assets like a database and an application protected behind a locked gate."::: | :::image type="content" source="../media/zero-trust-identity.png" alt-text="Diagram of a central policy in the form of a chart, giving access to different locally protected resources."::: |
3838
| Restrict everything to a secure network | Protect assets anywhere with central policy |
3939

40-
Each of these subjects will be covered in more detail over the rest of this module.
40+
Each of these subjects is covered in more detail over the rest of this module.

learn-pr/wwl-azure/explore-identity-azure-active-directory/includes/3-explore-zero-trust-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ A Zero Trust approach should extend throughout the entire digital estate and ser
1919

2020
:::image type="content" source="../media/zero-trust-pillars.png" alt-text="Diagram of the six pillars of Zero Trust. Identity - endpoints - data - apps - infrastructure - and network.":::
2121

22-
For this content, we're going to focus specifically on the **security identity with zero trust** pillar. Identities, whether they represent people, services, or IoT devices define the Zero Trust control plane. When an identity attempts to access a resource, verify that identity with strong authentication, and ensure access is compliant and typical for that identity. Follow least privilege access principles.
22+
For this content, we're going to focus specifically on the **security identity with Zero Trust** pillar. Identities, whether they represent people, services, or IoT devices define the Zero Trust control plane. When an identity attempts to access a resource, verify that identity with strong authentication, and ensure access is compliant and typical for that identity. Follow least privilege access principles.
2323

2424
### Zero Trust architecture
2525

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
:::image type="content" source="../media/control-plane.png" alt-text="Diagram of identity and access management working as a controller for access to all resource.":::
22

3-
What is a control plane? A **control plane** is a term that has been used for years within networks. It's the part of a network that routes network traffic around the network architecture. So, a control plane is a tool or service that directs access to resources based on specific criteria. When it comes to solutions in today's world, the user identity is the right place to check for access. This sets up identity as the control plane.
3+
What is a control plane? A **control plane** is a term that used for years within networks. It's the part of a network that routes network traffic around the network architecture. So, a control plane is a tool or service that directs access to resources based on specific criteria. When it comes to solutions in today's world, the user identity is the right place to check for access. Identity is a clear choice for the control plane.
44

5-
With the many networks, devices, and applications needed in daily business, the only common denominator is the identity. Every user, external user, app, and device has an identity. This is why we say, Identity is the control plane. It’s critical to establish who the user is as the core of trust for other transactions. If we aren’t sure who the user is, no other system access control or security matters. Once we're sure of the user, we can explicitly verify every element of access whether our resources are on-premises, in cloud-hosted servers, or managed SaaS apps like Office 365.
5+
With the many networks, devices, and applications needed in daily business, the only common denominator is the identity. Every user, external user, app, and device have an identity. So, we say identity is the control plane. It’s critical to establish who the user is as the core of trust for other transactions. If we aren’t sure who the user is, no other system access control or security matters. Once we're sure of the user, we can explicitly verify every element of access whether our resources are on-premises, in cloud-hosted servers, or managed SaaS apps like Office 365.

learn-pr/wwl-azure/explore-identity-azure-active-directory/index.yml

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,24 +2,25 @@
22
uid: learn.wwl.explore-identity-azure-active-directory
33
metadata:
44
title: Explore identity in Microsoft Entra ID
5-
description: "This module will cover a wide view of the definition and available services for identity provided in the Microsoft Cloud from Microsoft Entra ID and to Microsoft 365. You start with the basics of authentication, authorization, and access tokens. This builds a firm foundation of what an identity is, why it is important. Then we move into governance and lifecycle management of your identities and identity solutions. The final topic opens up the term zero trust to see how it should be applied to your identity solutions."
5+
description: "This module covers a wide view of the definition and available services for identity provided in the Microsoft Entra ID. Start with the basics of authentication, authorization, and access tokens. After building a firm foundation of what an identity is, why it's important. Then we move into governance and lifecycle management of your identities and identity solutions. The final topic opens up the term Zero Trust to see how it should be applied to your identity solutions."
66
ms.date: 03/27/2025
77
author: wwlpublish
88
ms.author: roberts
99
ms.topic: module
1010
ms.service: identity-platform
11+
ai-usage: human-only
1112
title: Explore identity in Microsoft Entra ID
12-
summary: This module covers definitions and available services for identity provided in Microsoft Entra ID and to Microsoft 365. You start with authentication, authorization, and access tokens then build into full identity solutions.
13+
summary: This module covers definitions and available services for identity, provided in Microsoft Entra ID. Explore authentication, authorization, and access tokens, then build into full identity solutions.
1314
abstract: |
14-
By the end of this module, you'll be able to:
15+
By the end of this module, you're able to:
1516
16-
- Define common identity terms and explain how they're used in the Microsoft Cloud
17+
- Define common identity terms and explain how they're used in the Microsoft Cloud.
1718
18-
- Explore the common management tools and needs of an identity solution
19+
- Explore the common management tools and needs of an identity solution.
1920
20-
- Review the goal of Zero Trust and how it's applied in the Microsoft Cloud
21+
- Review the goal of Zero Trust and how it applies in the Microsoft Cloud.
2122
22-
- Explore the available identity services in the Microsoft Cloud
23+
- Explore the available identity services in the Microsoft Cloud.
2324
prerequisites: '- None'
2425
iconUrl: /training/achievements/explore-identity-azure-active-directory.svg
2526
levels:

0 commit comments

Comments
 (0)