Skip to document
This is a Premium Document. Some documents on Studocu are Premium. Upgrade to Premium to unlock it.

CMIT382 Project 3 Template

In this deliverable, you will demonstrate the creation of user groups,...
Course

Managing Microsoft 365 Identity (CMIT 382)

9 Documents
Students shared 9 documents in this course
Academic year: 2023/2024
Uploaded by:

Comments

Please sign in or register to post comments.

Preview text

User Management and

Authentication

Prepared by:

Objective

In Project 2 deliverable, you implemented a strategy for user identity. Managing user identity is equally

important as implementing it. Proper management of identity ensures that users have access to

resources they need to perform their job functions and accounts are properly secured. In this

deliverable, you will demonstrate the creation of user groups, manage Role-Based Access Control (RBAC)

roles, view user login activity, the configuration of Azure AD self-service password reset policy, and

create a customed banned password.

Part 1: Create Groups

The recommended format is to provide screenshots incorporated within the written narrative. No

external sources are required for this phase of the project; however, the screenshots must be your

own. Screenshots from external sources are not permitted.

1. Step 1 –

Part 2: Manage Role-Based Access Control (RBAC) Roles

The recommended format is to provide screenshots incorporated within the written narrative. No

external sources are required for this phase of the project; however, the screenshots must be your

own. Screenshots from external sources are not permitted.

1. Step 1 – Helpdesk Administrator

2. Step 2 – Global Administrator –

Part 3: Examine User Login Activity

The recommended format is to provide screenshots incorporated within the written narrative. No

external sources are required for this phase of the project; however, the screenshots must be your

own. Screenshots from external sources are not permitted.

1. Step 1 – Banned Password

Part 6: Authentication

The Opportunity: Basic Authentication and Moden Authentication

Basic authentication involves transmitting a user's login credentials, username and password, across the

network for authentication confirmation. It relies solely on the provided user credentials to grant access,

lacking additional security layers like encryption or multi-factor authentication (MFA). While the

straightforward nature of basic authentication facilitates its implementation, it also exposes inherent

vulnerabilities. The transmission of credentials in plaintext leaves them vulnerable to interception and

misuse, heightening the risk to data integrity. Depending on basic authentication raises great security

concerns, specifically in a time of escalating cyber threats. [1]

Modern authentication is seen as the counterpart within Microsoft 365, encompassing a more

sophisticated authentication instance. Integrating top of the line technologies like OAuth 2 and

OpenID Connect, it facilitates robust, token-based authentication mechanisms. Users undergo

authentication by means of tokens rather than the direct transmission of passwords. Modern

authentication supports MFA which fortifies security with an extra layer of authentication beyond usual

username and password verification. It enhances security measures through features such as conditional

access policies, empowering administrators to enforce tailored access controls based on factors like user

location or device status. This approach to authentication in Microsoft 365 not only enhances security

but also enables greater flexibility and control over access management. [2]

KCoder's implementation of M365 tenant, opting for modern authentication is greatly recommended for

several reasons. Modern authentication provides enhanced security measures compared to that of basic

authentication by utilizing token-based authentication and supporting multi-factor authentication

(MFA), thereby significantly reducing the risk of unauthorized access and credential compromise.

Modern authentication enables compliance with regulatory standards and industry best practices,

ensuring that KCoder's operations align with regulatory requirements. It grants access to features such

as conditional access policies within Microsoft 365, empowering KCoder to implement tailored security

measures for better tenant management and protection. By choosing modern authentication, KCoder

future-proofs their security infrastructure which ensures a level of resilience against evolving

technological advancements and future security threats. This type of prioritization of modern

authentication enhances KCoder's overall security posture which equips them with the tools neccesary

to navigate future challenges.

Was this document helpful?
This is a Premium Document. Some documents on Studocu are Premium. Upgrade to Premium to unlock it.

CMIT382 Project 3 Template

Course: Managing Microsoft 365 Identity (CMIT 382)

9 Documents
Students shared 9 documents in this course
Was this document helpful?

This is a preview

Do you want full access? Go Premium and unlock all 6 pages
  • Access to all documents

  • Get Unlimited Downloads

  • Improve your grades

Upload

Share your documents to unlock

Already Premium?
User Management and
Authentication
Prepared by:
Objective
In Project 2 deliverable, you implemented a strategy for user identity. Managing user identity is equally
important as implementing it. Proper management of identity ensures that users have access to
resources they need to perform their job functions and accounts are properly secured. In this
deliverable, you will demonstrate the creation of user groups, manage Role-Based Access Control (RBAC)
roles, view user login activity, the configuration of Azure AD self-service password reset policy, and
create a customed banned password.
Part 1: Create Groups
The recommended format is to provide screenshots incorporated within the written narrative. No
external sources are required for this phase of the project; however, the screenshots must be your
own. Screenshots from external sources are not permitted.
1. Step 1 –

Why is this page out of focus?

This is a Premium document. Become Premium to read the whole document.

Why is this page out of focus?

This is a Premium document. Become Premium to read the whole document.