Summary
After reading this chapter you should be able to explain and design the authentication and authorization capabilities of Azure Active Directory. You should know which functions, protocols, and interfaces Azure AD provides as an identity provider and you should be able to design a flexible and secure application workplace for the business to improve its productivity. Additionally, you will have seen the different reports for monitoring your solution. This will help you to design a proactive security solution and to mitigate security issues. Let's move on to implementing a designed example solution - see you in the next chapter!