Pluralsight - Design Authorization for Microsoft Azure by John Savill
- 收录时间:2020-01-24 23:58:52
- 文件大小:378MB
- 下载次数:46
- 最近下载:2020-11-21 12:33:20
- 磁力链接:
-
文件列表
- 1. Authorization Foundation/9. Using Consent and Authorization.mp4 30MB
- 2. Authorization with Azure Resource Manager and Azure AD/7. Using Privileged Identity Management.mp4 28MB
- 2. Authorization with Azure Resource Manager and Azure AD/5. Azure AD Roles.mp4 24MB
- 2. Authorization with Azure Resource Manager and Azure AD/4. Using Custom Azure Roles.mp4 24MB
- 2. Authorization with Azure Resource Manager and Azure AD/9. Conditional Access Overview.mp4 23MB
- 2. Authorization with Azure Resource Manager and Azure AD/8. Leveraging Identity Protection.mp4 20MB
- 1. Authorization Foundation/12. Token Details.mp4 18MB
- 2. Authorization with Azure Resource Manager and Azure AD/12. Two Key Application Scenarios.mp4 17MB
- 2. Authorization with Azure Resource Manager and Azure AD/2. Azure Resource Structure.mp4 16MB
- 1. Authorization Foundation/4. The Two Buckets for Authorization.mp4 15MB
- 2. Authorization with Azure Resource Manager and Azure AD/14. Azure Key Vault.mp4 15MB
- 2. Authorization with Azure Resource Manager and Azure AD/3. Azure Roles.mp4 15MB
- 1. Authorization Foundation/10. Front and Back-end Channels.mp4 14MB
- 2. Authorization with Azure Resource Manager and Azure AD/1. Azure AD Group Refresher.mp4 12MB
- 2. Authorization with Azure Resource Manager and Azure AD/13. Applications Have Secrets.mp4 12MB
- 2. Authorization with Azure Resource Manager and Azure AD/10. Using Conditional Access.mp4 10MB
- 1. Authorization Foundation/3. What Is Authorization.mp4 8MB
- 2. Authorization with Azure Resource Manager and Azure AD/11. Conditional Access Demo.mp4 8MB
- 2. Authorization with Azure Resource Manager and Azure AD/16. Repudiation Options.mp4 8MB
- 1. Authorization Foundation/8. The Importance of Authorization.mp4 8MB
- 2. Authorization with Azure Resource Manager and Azure AD/6. Using Access Reviews.mp4 8MB
- 1. Authorization Foundation/13. Token Brokers.mp4 7MB
- 1. Authorization Foundation/7. Course and Fine-grained Authorization.mp4 5MB
- microsoft-azure-authorization-design.zip 5MB
- 1. Authorization Foundation/6. Least Privilege and Just-in-Time.mp4 4MB
- 1. Authorization Foundation/5. Authorization Schemes.mp4 4MB
- 2. Authorization with Azure Resource Manager and Azure AD/15. Enforcing Application Scope.mp4 4MB
- 1. Authorization Foundation/11. Token Flows.mp4 3MB
- 0. Course Overview/0. Course Overview.mp4 2MB
- 1. Authorization Foundation/0. Module Introduction.mp4 2MB
- 1. Authorization Foundation/1. Why This Is Important.mp4 2MB
- 1. Authorization Foundation/2. Four Pillars of Identity Review.mp4 2MB
- 1. Authorization Foundation/14. Module Summary.mp4 2MB
- 2. Authorization with Azure Resource Manager and Azure AD/17. Module Summary.mp4 1MB
- 2. Authorization with Azure Resource Manager and Azure AD/0. Module Introduction.mp4 1MB
- 1. Authorization Foundation/9. Using Consent and Authorization.srt 16KB
- 1. Authorization Foundation/4. The Two Buckets for Authorization.srt 14KB
- 2. Authorization with Azure Resource Manager and Azure AD/9. Conditional Access Overview.srt 13KB
- 2. Authorization with Azure Resource Manager and Azure AD/7. Using Privileged Identity Management.srt 12KB
- 2. Authorization with Azure Resource Manager and Azure AD/5. Azure AD Roles.srt 10KB
- 2. Authorization with Azure Resource Manager and Azure AD/2. Azure Resource Structure.srt 10KB
- 2. Authorization with Azure Resource Manager and Azure AD/4. Using Custom Azure Roles.srt 9KB
- 1. Authorization Foundation/12. Token Details.srt 8KB
- 2. Authorization with Azure Resource Manager and Azure AD/12. Two Key Application Scenarios.srt 8KB
- 2. Authorization with Azure Resource Manager and Azure AD/8. Leveraging Identity Protection.srt 8KB
- 2. Authorization with Azure Resource Manager and Azure AD/3. Azure Roles.srt 8KB
- 2. Authorization with Azure Resource Manager and Azure AD/1. Azure AD Group Refresher.srt 8KB
- 1. Authorization Foundation/10. Front and Back-end Channels.srt 7KB
- 1. Authorization Foundation/3. What Is Authorization.srt 6KB
- 2. Authorization with Azure Resource Manager and Azure AD/13. Applications Have Secrets.srt 6KB
- 2. Authorization with Azure Resource Manager and Azure AD/14. Azure Key Vault.srt 6KB
- 1. Authorization Foundation/8. The Importance of Authorization.srt 6KB
- 1. Authorization Foundation/5. Authorization Schemes.srt 5KB
- 2. Authorization with Azure Resource Manager and Azure AD/10. Using Conditional Access.srt 5KB
- 2. Authorization with Azure Resource Manager and Azure AD/6. Using Access Reviews.srt 5KB
- 1. Authorization Foundation/11. Token Flows.srt 5KB
- 2. Authorization with Azure Resource Manager and Azure AD/16. Repudiation Options.srt 5KB
- 1. Authorization Foundation/6. Least Privilege and Just-in-Time.srt 4KB
- 1. Authorization Foundation/7. Course and Fine-grained Authorization.srt 3KB
- 1. Authorization Foundation/13. Token Brokers.srt 3KB
- 2. Authorization with Azure Resource Manager and Azure AD/15. Enforcing Application Scope.srt 3KB
- 2. Authorization with Azure Resource Manager and Azure AD/11. Conditional Access Demo.srt 3KB
- 1. Authorization Foundation/0. Module Introduction.srt 3KB
- 1. Authorization Foundation/14. Module Summary.srt 2KB
- 2. Authorization with Azure Resource Manager and Azure AD/17. Module Summary.srt 2KB
- 1. Authorization Foundation/2. Four Pillars of Identity Review.srt 2KB
- 1. Authorization Foundation/1. Why This Is Important.srt 2KB
- content.txt 2KB
- 0. Course Overview/0. Course Overview.srt 1KB
- 2. Authorization with Azure Resource Manager and Azure AD/0. Module Introduction.srt 1KB