Chapter 4

Manage secure access and authentication

Authentication allows the identity of a user, device, or application to be verified. Authentication usually occurs through credentials such as usernames and passwords or specially created digital certificates. During the authentication process, credentials are verified against a secure database. If the credentials match those stored in the database, access is granted to the entity that provided the credentials.

Skills in this chapter:

Get Exam Ref MS-102 Microsoft 365 Administrator now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.