Day 28 Explore monitoring and reporting

Compare authentication and authorization
Authentication(AuthN)

  • Establish identity of person or service looking to access resource
  • Involve act of challenging party for legitimate credentials
  • Provide basis for creating security principal for identity and access control use

Authorization(AuthZ)

  • Establish what level of access authenticated person or service
  • Specify what data allowed to access

Explore Azure Active Directory

  • Microsoft cloud-based identity and access management service
  • Helps employees of organization sign in and access resources
    • External resources - include Microsoft 365, Azure portal and SaaS
    • Internal resources - include apps on corporate network and intranet

<<:  Day 31:RecyclerView Loads More

>>:  Google Recaptcha v3 使用心得

【课程推荐】2021/1/23~1/24 软件需求与系统分析实务班

课程对象 软件专案开发商之业务人员与Pre-Sales、软件系统专案经理、软件系统系统分析师。 详细...

【在厨房想30天的演算法】Day 07 资料结构:阵列 Array

Aloha~又是我少女人妻 Uerica ! 中秋节过後就是秋天了,秋高气爽是最适合旅游的日子了,可...

Day 2 浮点运算及记忆体

今天先来谈一下浮点运算的问题,在ARMv8的架构下,主要还是依IEEE 754的规定来作运算标准,唯...

JS 33 - 在触控装置侦测手势的滑动方向!

大家好! 今天我们要实作在触控装置中侦测手势的方向。 我们进入今天的主题吧! 备注:前几天和今天的范...

Rust-定义函式Function(一)

如果编写多次相同的代码,则可以把代码封装在一个块中,然後为该代码命名 通过这种方式就定义了函式,然後...