If you are one of the many, many IT admins who were asked to effectively transition a whole workforce to remote working overnight due to impact of COVID-19, you will no doubt also have been concerned about the security implications of doing so.
One of the most powerful and effective means IT admins have of ensuring tight security with a remote workforce is through identity management and authentication. Azure Active Directory does exactly that and this upcoming webinar from Altaro on October 7 will teach you how to use Azure Active Directory in your business.
As always Altaro will present this webinar live twice to allow as many people in different time zones to attend, ask questions and receive instant feedback from the presenters: IT security expert Paul Schnackenburg and Microsoft MVP Andy Syrewicze.
This event will include a live demo of Azure Active Directory showing you how to use the tools being discussed which include: Microsoft Cloud App Security, Password Protection, Multi Factor Authentication (MFA), Windows Hello for Business, Privileged Identity Management (PIM), and Identity Protection & Conditional Access.
Azure Active Directory is simply an essential tool for IT admins managing remote users. Save your seat for this valuable event and find out how you can optimize its use in your infrastructure.
Check or change Azure services settings in the appropriate sections (naming convention (prefix/suffix), location, SKUs and etc.)
Run terraform init to get required Terraform providers
Run terraform plan to initiate pre-deployment check
Run terraform apply to start a deployment
(optional) terraform destroy to delete Azure resources
The script uses Service Principal authentication, so define the subscription ID, client ID, tenand ID and principal secret in the auth.tf (or use another authentication type – Managed Identity, if your CI is running on Azure VMs, for instance)
If you are going to deploy Analysis Server (enabled, by default), provide valid Azure AD user(s) UPN(s) to set them as administrators of Analysis Server (az_ansrv_users variable, file – terraform.tfvars)
P.S. feel free to share/commit/fork/slam/sell/copy and do anything that your conscience allows you 🙂