- Module 1: Learn the basics of Microsoft identity including the different types of tokens, account types, and supported topologies.
- Explain the different types of tokens used in Microsoft Identity solutions
- Compare and contrast the different account types
- Compare and contrast the supported Microsoft Identity Topologies
- Module 2: Learn how developers can leverage Microsoft identity in different types of applications.
- Compare and contrast different grant types (flows) in the OAuth 2.0 protocol
- Evaluate which authentication protocol to use based on the app scenario
- Implement different authentication protocols in different application types
- Module 3: Learn the basics of Microsoft identity including the different types of tokens, account types, and supported topologies.
- Compare and contrast different permission types supported by the Microsoft identity platform
- Compare and contrast the difference between static and dynamic consent in user permissions
- Create an app that implements dynamic consent for incrementally obtaining permissions as needed from users
- Module 4: Learn how to secure a web API with Microsoft identity and how to call it from another application.
- Create a custom web API that is secured with Microsoft identity
- Create a custom web app that calls a custom web API secured with Microsoft identity
- Create a custom daemon app that calls a custom web API secured with Microsoft identity
- Module 5: In this module, you’ll learn how to use both Azure AD Groups and Application Roles to provide fine grained access control to an application.
- Create a custom ASP.NET web app that is secured with Microsoft identity
- Demonstrate how to obtain security groups as a claim in the token and use them in the app
- Demonstrate how to use app roles to grant users access to an app
At the end of this module, you should be able to:
At the end of this module, you should be able to:
At the end of this module, you should be able to:
By the end of this module, you'll be able to:
By the end of this module, you'll be able to: