Implementing Multi-Factor Authentication (MFA)

In the previous chapter, we covered the fifth part of the Implementing Workloads and Security objective. We've covered how to manage role-based access control (RBAC), how to configure access to Azure resources by assigning RBAC roles from the Azure portal, and more.

This chapter covers the last part of this objective, by covering how to configure user accounts for multi-factor authentication (MFA), how to configure fraud alerts, how to configure bypass options, how to configure trusted IPs, and how to configure verification methods. 

The following topics will be covered in this chapter:

  • Understanding Azure MFA
  • Configuring user accounts for MFA
  • Configuring verification methods
  • Configuring fraud ...

Get Microsoft Azure Architect Technologies: Exam Guide AZ-300 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.