We may earn an affiliate commission when you visit our partners.
Sahil Malik

Authentication is just part of the story, what can you do, once we know who you are, is authorization. This course will teach you techniques and architectural patterns around how to build authorization in your Azure AD protected applications.

Read more

Authentication is just part of the story, what can you do, once we know who you are, is authorization. This course will teach you techniques and architectural patterns around how to build authorization in your Azure AD protected applications.

Authentication is just part of the story, what can you do, once we know who you are, is authorization, a rather weedier topic. In this course, Building Authorization in Azure Active Directory for Developers, you’ll learn to build authorization your AAD protected applications. First, you’ll explore RBAC based authorization and it’s limits. Next, you’ll discover scope based authorization. Finally, you’ll learn how to use custom claims. When you’re finished with this course, you’ll have the skills and knowledge of effectively building authorization needed to build real world enterprise applications.

Enroll now

What's inside

Syllabus

Course Overview
What Is Authorization?
RBAC Based Authorization
Scope Based Authorization
Read more
Custom Claims Based Authorization

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers authorization in modern cloud based environments, which is relevant to industry
Taught by Sahil Malik, who are recognized for their work in security and authorization
Develops authorization techniques and patterns, which are core skills for cloud computing

Save this course

Save Building Authorization in Azure Active Directory for Developers to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Building Authorization in Azure Active Directory for Developers with these activities:
Create a study guide for the course
Enhance your understanding and retention of course materials by creating a comprehensive study guide that summarizes key concepts, definitions, and examples.
Show steps
  • Review the course materials and identify key concepts.
  • Summarize the concepts in a clear and concise manner.
  • Include examples and explanations to reinforce understanding.
  • Review the study guide regularly to reinforce your learning.
Follow the Microsoft Azure AD B2C documentation on implementing authorization
Expand your understanding of authorization by exploring Microsoft Azure AD B2C documentation, which provides in-depth guidance on implementing authorization in real-world applications.
Show steps
  • Read the documentation on authorization in Azure AD B2C.
  • Follow the tutorials on implementing authorization with RBAC, scope-based, and custom claims.
  • Apply the concepts to your own application development.
Set up an AAD-protected ASP.NET Core application
Gain hands-on experience with setting up an application protected by Azure Active Directory, which will help you understand the practical implementation of authorization concepts covered in the course.
Show steps
  • Follow the steps outlined in the course materials to set up an AAD-protected ASP.NET Core application.
  • Test the application to ensure that authorization is working as expected.
  • Experiment with different authorization configurations.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Attend a study group on authorization in Azure AD
Engage with peers to reinforce your understanding of authorization concepts, share experiences, and learn from others' approaches to implementing authorization.
Show steps
  • Find a study group or organize one with fellow learners.
  • Discuss the concepts covered in the course.
  • Work together on practice exercises.
Read 'Enterprise Application Architecture' by Martin Fowler
Understand the principles and patterns of enterprise application architecture, including authorization mechanisms commonly used in real-world systems.
Show steps
  • Read and understand the chapters on architectural patterns for authorization.
  • Identify the architectural patterns used in the course and their advantages.
  • Explore the trade-offs between different authorization patterns.
Design an authorization strategy for a sample application
Apply the concepts of RBAC, scope-based, and custom claims-based authorization to design a comprehensive authorization strategy for a real-world application.
Show steps
  • Identify the different roles and permissions required for the application.
  • Design an authorization strategy using RBAC, scope-based, and custom claims-based authorization.
  • Document the authorization strategy.
Write a blog post on authorization best practices
Demonstrate your understanding of authorization by sharing your knowledge and insights with others, which helps reinforce your own learning and contributes to the broader community.
Show steps
  • Identify the best practices for authorization.
  • Write a blog post that explains these best practices and provides examples.
  • Share your blog post with others.
Participate in a hackathon or coding challenge related to authorization
Test your skills and knowledge of authorization by participating in a competition that requires you to apply authorization concepts in a practical setting.
Show steps
  • Find a hackathon or coding challenge focused on authorization.
  • Form a team or work individually on the challenge.
  • Develop a solution that demonstrates your understanding of authorization.

Career center

Learners who complete Building Authorization in Azure Active Directory for Developers will develop knowledge and skills that may be useful to these careers:
Identity and Access Management (IAM) Engineer
IAM Engineers design and implement identity and access management systems. This course can help IAM Engineers build secure and scalable Azure AD protected applications. It provides a deep understanding of authorization mechanisms and how to implement them in IAM systems.
Application Security Engineer
Application Security Engineers are responsible for securing web and mobile applications. This course can help Application Security Engineers build secure Azure AD protected applications. It provides a comprehensive understanding of authorization techniques and how to implement them in web and mobile applications.
Cloud Architect
Cloud Architects design and manage cloud computing solutions. This course can help Cloud Architects build secure and compliant Azure AD protected applications. It provides a deep understanding of authorization mechanisms and how to implement them in cloud environments.
Security Engineer
Security Engineers are responsible for protecting systems and data from unauthorized access and attacks. This course can help Security Engineers build secure Azure AD protected applications. It provides a comprehensive understanding of authorization techniques and how to implement them to prevent unauthorized access.
DevOps Engineer
DevOps Engineers are responsible for bridging the gap between development and operations teams. This course may be useful for DevOps Engineers who want to build and maintain secure Azure AD protected applications. It will provide a basic understanding of authorization techniques and how to implement them in DevOps pipelines.
System Administrator
System Administrators are responsible for managing and maintaining computer systems. This course may be useful for System Administrators who want to secure Azure AD protected applications. It will provide a basic understanding of authorization techniques and how to implement them in system administration tasks.
Network Engineer
Network Engineers are responsible for designing, implementing, and maintaining computer networks. This course may be useful for Network Engineers who want to secure Azure AD protected applications. It will provide a basic understanding of authorization techniques and how to implement them in network security.
Database Administrator
Database Administrators are responsible for managing and maintaining databases. This course may be useful for Database Administrators who want to secure Azure AD protected applications. It will provide a basic understanding of authorization techniques and how to implement them in database security.
Security Analyst
Security Analysts are responsible for monitoring and analyzing security threats. This course may be useful for Security Analysts who want to understand how to build secure Azure AD protected applications. It will provide a basic understanding of authorization techniques and how to implement them in security analysis.
Software Engineer
Software Engineers design, develop, test, and maintain software systems. This course may be useful for Software Engineers who want to build scalable and secure Azure AD protected applications. It will provide a solid foundation in authorization techniques and architectural patterns.
Information Security Manager
Information Security Managers are responsible for developing and implementing security policies and procedures. This course may be useful for Information Security Managers who want to understand how to build secure Azure AD protected applications. It will provide a basic understanding of authorization techniques and how to implement them in information security management.
Privacy Officer
Privacy Officers are responsible for protecting personal data and ensuring compliance with privacy regulations. This course may be useful for Privacy Officers who want to understand how to build privacy-compliant Azure AD protected applications. It will provide a basic understanding of authorization techniques and how to implement them in privacy compliance.
Compliance Officer
Compliance Officers are responsible for ensuring compliance with laws and regulations. This course may be useful for Compliance Officers who want to understand how to build compliant Azure AD protected applications. It will provide a basic understanding of authorization techniques and how to implement them in compliance management.
Risk Manager
Risk Managers are responsible for identifying and managing risks. This course may be useful for Risk Managers who want to understand how to build secure Azure AD protected applications. It will provide a basic understanding of authorization techniques and how to implement them in risk management.
Auditor
Auditors are responsible for reviewing and assessing the effectiveness of internal controls. This course may be useful for Auditors who want to understand how to build secure Azure AD protected applications. It will provide a basic understanding of authorization techniques and how to implement them in auditing.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Building Authorization in Azure Active Directory for Developers.
Provides a practical guide to implementing OAuth 2.0 and OpenID Connect, which are essential protocols for building secure and scalable applications.
Provides practical guidance on how to secure web services, including the use of authentication, authorization, and encryption.
Provides a comprehensive overview of zero trust networks, which are becoming increasingly important for securing applications and data in the cloud.
This cookbook provides practical guidance on how to implement authorization in Azure Active Directory, with step-by-step instructions and real-world examples.
Focuses on role-based access control (RBAC) in Azure Active Directory, providing a detailed overview of how to implement and manage RBAC.
Provides a guide to building secure web applications with ASP.NET Core 2, including authorization and authentication.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Building Authorization in Azure Active Directory for Developers.
Developing Daemons and Services Protected by Azure Active...
Most relevant
OAuth 2.0 in Spring Boot Applications
Most relevant
Developing Web Applications and Web APIs Protected by...
Most relevant
Authentication and Authorization in PHP
Most relevant
Implement Windows Server 2019 Identity Federation and...
Most relevant
Cloud Design Patterns for Azure: Design and Implementation
Most relevant
Credential Management and Access Control with Active...
Most relevant
Authentication and Authorization in React
Most relevant
ASP.NET Core 2 Authentication Playbook
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser