SC-900T00-A Learning Path: Describe The Concepts of Security, Compliance, and Identity
SC-900T00-A Learning Path: Describe The Concepts of Security, Compliance, and Identity
1 Describe the shared responsibility and the defense in depth security models.
Authentication (AuthN)
Authentication is the process of proving that a person is
who they say they are. Authentication grants access.
Authorization (AuthZ)
Authorization determines the level of access or the
permissions an authenticated person has to your data
and resources.
1 At the center of modern authentication is the role of the identity provider (IdP).
IdP enables organizations to establish authentication and authorization policies, monitor user
3 behavior, and more.
Fundamental capabilities of an IdP and “modern authentication” include support for secure
4 authentication methods, single sign-on, federation with other IdPs, and more.
A directory service stores directory data and makes it available to network users,
administrators, services, and applications.
The best-known service of this kind is Active Directory Domain Services (AD DS), a
central component in organizations with on-premises IT infrastructure.
© Copyright Microsoft Corporation. All rights reserved. © Copyright Microsoft Corporation. All rights reserved.
Knowledge check
The human resources organization wants to ensure that stored employee data is
encrypted. Which security mechanism would they use?
A. Hashing.
B. Encryption in transit.
C. Encryption at rest.
A. There are regulations that govern the physical locations where data can be stored and
how and when it can be transferred, processed, or accessed internationally.
B. Data, particularly personal data, is subject to the laws and regulations of the
country/region in which it's physically collected, held, or processed.
C. Trust no one, verify everything.
A. Claim relationship.
B. Shared access relationship.
C. Trust relationship.