Chapter 4
Manage secure access and authentication
Authentication allows the identity of a user, device, or application to be verified. Authentication usually occurs through credentials such as usernames and passwords or specially created digital certificates. During the authentication process, credentials are verified against a secure database. If the credentials match those stored in the database, access is granted to the entity that provided the credentials.
Skills in this chapter:
Get Exam Ref MS-102 Microsoft 365 Administrator now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.