Содержание
Course Overview 1m 0s Course Overview 1m 0sAuthorization Foundation 54m 33s Module Introduction 1m 47s Why This Is Important 1m 5s Four Pillars of Identity Review 1m 22s What Is Authorization 4m 7s The Two Buckets for Authorization 8m 21s Authorization Schemes 3m 31s Least Privilege and Just-in-Time 2m 32s Course and Fine-grained Authorization 2m 8s The Importance of Authorization 3m 29s Using Consent and Authorization 10m 10s Front and Back-end Channels 4m 0s Token Flows 3m 6s Token Details 5m 8s Token Brokers 2m 23s Module Summary 1m 16sAuthorization with Azure Resource Manager and Azure AD 1h 22m 22s Module Introduction 59s Azure AD Group Refresher 4m 51s Azure Resource Structure 6m 27s Azure Roles 4m 58s Using Custom Azure Roles 6m 4s Azure AD Roles 6m 57s Using Access Reviews 3m 13s Using Privileged Identity Management 8m 52s Leveraging Identity Protection 5m 23s Conditional Access Overview 8m 44s Using Conditional Access 3m 36s Conditional Access Demo 2m 22s Two Key Application Scenarios 5m 36s Applications Have Secrets 4m 2s Azure Key Vault 4m 1s Enforcing Application Scope 1m 59s Repudiation Options 2m 50s Module Summary 1m 20s