Pluralsight - Design Authorization for Microsoft Azure by John Savill
- 收录时间:2020-12-15 05:44:08
- 文件大小:397MB
- 下载次数:4
- 最近下载:2021-01-03 00:46:33
- 磁力链接:
-
文件列表
- 02. Authorization Foundation/10. Using Consent and Authorization.mp4 30MB
- 03. Authorization with Azure Resource Manager and Azure AD/08. Using Privileged Identity Management.mp4 28MB
- 03. Authorization with Azure Resource Manager and Azure AD/06. Azure AD Roles.mp4 24MB
- 03. Authorization with Azure Resource Manager and Azure AD/05. Using Custom Azure Roles.mp4 24MB
- 03. Authorization with Azure Resource Manager and Azure AD/10. Conditional Access Overview.mp4 23MB
- 03. Authorization with Azure Resource Manager and Azure AD/09. Leveraging Identity Protection.mp4 20MB
- 02. Authorization Foundation/05. The Two Buckets for Authorization.mp4 19MB
- 02. Authorization Foundation/13. Token Details.mp4 18MB
- 03. Authorization with Azure Resource Manager and Azure AD/03. Azure Resource Structure.mp4 17MB
- 03. Authorization with Azure Resource Manager and Azure AD/13. Two Key Application Scenarios.mp4 17MB
- 03. Authorization with Azure Resource Manager and Azure AD/15. Azure Key Vault.mp4 15MB
- 03. Authorization with Azure Resource Manager and Azure AD/04. Azure Roles.mp4 15MB
- 02. Authorization Foundation/11. Front and Back-end Channels.mp4 14MB
- 03. Authorization with Azure Resource Manager and Azure AD/18. Controlling Physical Access.mp4 13MB
- 03. Authorization with Azure Resource Manager and Azure AD/02. Azure AD Group Refresher.mp4 12MB
- 03. Authorization with Azure Resource Manager and Azure AD/14. Applications Have Secrets.mp4 12MB
- 03. Authorization with Azure Resource Manager and Azure AD/11. Using Conditional Access.mp4 10MB
- 02. Authorization Foundation/04. What Is Authorization-.mp4 8MB
- 03. Authorization with Azure Resource Manager and Azure AD/12. Conditional Access Demo.mp4 8MB
- 03. Authorization with Azure Resource Manager and Azure AD/17. Repudiation Options.mp4 8MB
- 02. Authorization Foundation/09. The Importance of Authorization.mp4 8MB
- 03. Authorization with Azure Resource Manager and Azure AD/07. Using Access Reviews.mp4 8MB
- 02. Authorization Foundation/14. Token Brokers.mp4 7MB
- 02. Authorization Foundation/08. Course and Fine-grained Authorization.mp4 5MB
- 02. Authorization Foundation/07. Least Privilege and Just-in-Time.mp4 4MB
- microsoft-azure-authorization-design.zip 4MB
- 02. Authorization Foundation/06. Authorization Schemes.mp4 4MB
- 03. Authorization with Azure Resource Manager and Azure AD/16. Enforcing Application Scope.mp4 4MB
- 02. Authorization Foundation/12. Token Flows.mp4 3MB
- 01. Course Overview/01. Course Overview.mp4 2MB
- 02. Authorization Foundation/01. Module Introduction.mp4 2MB
- 02. Authorization Foundation/02. Why This Is Important.mp4 2MB
- 02. Authorization Foundation/03. Four Pillars of Identity Review.mp4 2MB
- 02. Authorization Foundation/15. Module Summary.mp4 2MB
- 03. Authorization with Azure Resource Manager and Azure AD/19. Module Summary.mp4 1MB
- 03. Authorization with Azure Resource Manager and Azure AD/01. Module Introduction.mp4 1MB
- image.jpg 824KB
- 02. Authorization Foundation/05. The Two Buckets for Authorization.srt 15KB
- 02. Authorization Foundation/10. Using Consent and Authorization.srt 15KB
- 03. Authorization with Azure Resource Manager and Azure AD/10. Conditional Access Overview.srt 13KB
- 03. Authorization with Azure Resource Manager and Azure AD/08. Using Privileged Identity Management.srt 12KB
- 03. Authorization with Azure Resource Manager and Azure AD/03. Azure Resource Structure.srt 11KB
- 03. Authorization with Azure Resource Manager and Azure AD/06. Azure AD Roles.srt 10KB
- 03. Authorization with Azure Resource Manager and Azure AD/05. Using Custom Azure Roles.srt 9KB
- 02. Authorization Foundation/13. Token Details.srt 8KB
- 03. Authorization with Azure Resource Manager and Azure AD/13. Two Key Application Scenarios.srt 8KB
- 03. Authorization with Azure Resource Manager and Azure AD/18. Controlling Physical Access.srt 8KB
- 03. Authorization with Azure Resource Manager and Azure AD/09. Leveraging Identity Protection.srt 8KB
- 03. Authorization with Azure Resource Manager and Azure AD/04. Azure Roles.srt 8KB
- 03. Authorization with Azure Resource Manager and Azure AD/02. Azure AD Group Refresher.srt 8KB
- 02. Authorization Foundation/11. Front and Back-end Channels.srt 7KB
- 02. Authorization Foundation/04. What Is Authorization-.srt 6KB
- 03. Authorization with Azure Resource Manager and Azure AD/14. Applications Have Secrets.srt 6KB
- 03. Authorization with Azure Resource Manager and Azure AD/15. Azure Key Vault.srt 6KB
- 02. Authorization Foundation/09. The Importance of Authorization.srt 6KB
- 03. Authorization with Azure Resource Manager and Azure AD/11. Using Conditional Access.srt 5KB
- 02. Authorization Foundation/06. Authorization Schemes.srt 5KB
- 03. Authorization with Azure Resource Manager and Azure AD/07. Using Access Reviews.srt 5KB
- 02. Authorization Foundation/12. Token Flows.srt 5KB
- 03. Authorization with Azure Resource Manager and Azure AD/17. Repudiation Options.srt 5KB
- 02. Authorization Foundation/07. Least Privilege and Just-in-Time.srt 4KB
- 02. Authorization Foundation/08. Course and Fine-grained Authorization.srt 3KB
- 02. Authorization Foundation/14. Token Brokers.srt 3KB
- 03. Authorization with Azure Resource Manager and Azure AD/16. Enforcing Application Scope.srt 3KB
- 02. Authorization Foundation/01. Module Introduction.srt 3KB
- 03. Authorization with Azure Resource Manager and Azure AD/12. Conditional Access Demo.srt 3KB
- 02. Authorization Foundation/15. Module Summary.srt 2KB
- 03. Authorization with Azure Resource Manager and Azure AD/19. Module Summary.srt 2KB
- 02. Authorization Foundation/03. Four Pillars of Identity Review.srt 2KB
- content.txt 2KB
- 02. Authorization Foundation/02. Why This Is Important.srt 2KB
- 01. Course Overview/01. Course Overview.srt 1KB
- 03. Authorization with Azure Resource Manager and Azure AD/01. Module Introduction.srt 1KB