Plan and Implement Workload Identities


Curated for IT professionals and administrators looking to enhance their understanding of Azure workloads, this course will walk you through the essentials of designing and implementing workload identities. You will learn to configure Azure services that use managed identities, manage the life cycle of managed identities, and understand how to plan for Azure AD roles for governance of Azure resources. Explore real-world scenarios and practical applications of these concepts, equipping you to effectively manage workload identities within your Azure environment.
Plan and Implement Workload Identities Overview
Join Charles and Sophia as they guide you through the crucial aspects of designing and implementing workload identities in an Azure environment. Embark on this engaging journey to master the configuration of Azure services, management of identity life cycles, and governance planning for Azure AD roles.
Clock icon0h 3m
WEBVTT Welcome and thanks for joining us for this overview for the module plan and implement workload identities. This is a Microsoft centered course. So if you're not a Microsoft guy or gal, you might be in the wrong place. I'm Sophie Goodwin, I'll be your host for this course. I'll be just asking questions of our good friend Charles here along the way. It's going to help you parse through this information and understand it a little better, asking questions you have at home. Charles over here though, Mr. Charles Pluto, is going to be teaching this information, helping us get through these different portals and learn how we can plan and implement these workload identities. Charles, could you tell us a little about yourself? Sure. Thanks Sophie. Hey everyone. My name is Charles. I'm a Microsoft certified trainer. I've been working with these Microsoft products for going on like 15 years now or something. It's been quite a while. So happy to talk to you today about the different workload identities that we have available through Intra and the various Cloud services. I know we've got this broken down into different sections. So what kind of specific material are we going to be getting into in this course? Yeah. So we're focused on the, and I guess maybe to define the workload identity, we're focused on applications that exist in our environment. And so we're saying that the application is equivalent to a workload. That's a solution. That's a thing in our environment that needs authentication, needs permissions, needs access to, needs some security monitoring. We have this resource, this artifact in our environment that is an application, has data. Maybe that data is sensitive, needs certain permissions to be able to access it. And so what are the things that we can put in place to make that happen? And so we, in this module, as part of the course, we'll go through the different types of workload identities. There's service principles and app registrations that we can create. There's managed identities that we can add to our environment to associate with specific resources in Azure. We also have enterprise apps and ways to control access to that through conditional access and policies and device compliance there. And then finally, we'll get into Defender for Cloud apps where we can kind of protect and put some security monitoring in place for these different applications. - Now, I know there is a little bit of assumed knowledge here where we're getting into this stuff and there might be some terms and things that come up that probably at this point you already know. So what kind of prerequisite knowledge should we have as learners going into this course? - Yeah, it'll be super helpful if you've already been through a little bit of the Intra portals, maybe the Azure portal you're already familiar with, Intra ID, the concept of an application, because then we'll jump into creating the registration, putting the application in place, and then adding these policies on top of the app. So if you've already got an application or you've worked with other third parties applications before, that would be super helpful and to just kind of have some general knowledge about the other Microsoft services that exist, like Defender, like Power Platform, Power Automate, there's some tie-ins there, just kind of being aware of the other things that you can integrate to. - Well, I think that pretty much covers it for this overview. We've got a good idea of what we're gonna learn in this course, what we should know kind of before we get started, and we even got a little bit of background on Charles. 15 years teaching Microsoft, that is impressive. Congratulations, I don't know if they give awards for that, but they definitely should. Thank you so much for joining me for this overview, Charles, and giving us an idea of what we can expect in this course, and thank you of course for joining us, and we'll see you in the course. (upbeat music)

Learning Style

On Demand

Length of course

3h 23m
16 Episodes

Here are the topics we'll cover

  • Course Overview
  • Plan and Implement Identities for Applications and Azure Workloads
  • Plan, Implement, and Monitor the Integration of Enterprise Applications
  • Plan and Implement App Registrations
  • Manage and Monitor App Access by Using Microsoft Defender for Cloud Apps
Learning Options

Options for this course

Train your team
Stay ahead of the curve and future-proof your business with training programs designed for you.
Channel & Reseller
Transform your experience and integrate with our unique evolving library of Audit, Cybersecurity, and Information Technology courses.
Individual learners
Learn at your own pace and get your certification training.