Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Exam Ref AZ-304 Microsoft Azure Architect Design Certification and Beyond

You're reading from  Exam Ref AZ-304 Microsoft Azure Architect Design Certification and Beyond

Product type Book
Published in Jul 2021
Publisher Packt
ISBN-13 9781800566934
Pages 520 pages
Edition 1st Edition
Languages
Author (1):
Brett Hargreaves Brett Hargreaves
Profile icon Brett Hargreaves

Table of Contents (30) Chapters

Preface 1. Section 1: Exploring Modern Architecture
2. Chapter 1: Architecture for the Cloud 3. Chapter 2: Principles of Modern Architecture 4. Section 2: Identity and Security
5. Chapter 3: Understanding User Authentication 6. Chapter 4: Managing User Authorization 7. Chapter 5: Ensuring Platform Governance 8. Chapter 6: Building Application Security 9. Section 3: Infrastructure and Storage Components
10. Chapter 7: Designing Compute Solutions 11. Chapter 8: Network Connectivity and Security 12. Chapter 9: Exploring Storage Solutions 13. Chapter 10: Migrating Workloads to Azure 14. Section 4: Applications and Databases
15. Chapter 11: Comparing Application Components 16. Chapter 12: Creating Scalable and Secure Databases 17. Chapter 13: Options for Data Integration 18. Chapter 14: High Availability and Redundancy Concepts 19. Section 5: Operations and Monitoring
20. Chapter 15: Designing for Logging and Monitoring 21. Chapter 16: Developing Business Continuity 22. Chapter 17: Scripted Deployments and DevOps Automation 23. Section 6: Beyond the Exam
24. Chapter 18: Engaging with Real-World Customers 25. Chapter 19: Enterprise Design Considerations 26. Mock Exam
27. Mock Answers
28. Assessments 29. Other Books You May Enjoy

Working with security principals

Security principals are used primarily for two scenarios: system access and identity integration.

System access is the ability for one system to access another and is closer to traditional methods for providing application or service access to other systems. A typical example is a database-specific username and password that an application would use to access the backend database.

One of the use cases for secret management in Key Vault is storing a database connection string containing the database username and password as a secret in the vault. However, we must first authenticate to the key vault for our application to access it, which can be performed using a username and password for the vault.

This may seem counter-intuitive, but in reality, this process helps protect our data. Security Principals in Azure can only be used programmatically; that is, you cannot use the credentials directly. It also allows one set of credentials to access multiple...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}