Filename | Size |
| 0. Course Overview/0. Course Overview.mp4 | 2.4 MB |
| 0. Course Overview/0. Course Overview.srt | 1.5 KB |
| 1. Authorization Foundation/0. Module Introduction.mp4 | 2.4 MB |
| 1. Authorization Foundation/0. Module Introduction.srt | 3 KB |
| 1. Authorization Foundation/1. Why This Is Important.mp4 | 2.3 MB |
| 1. Authorization Foundation/1. Why This Is Important.srt | 1.7 KB |
| 1. Authorization Foundation/10. Front and Back-end Channels.mp4 | 13.9 MB |
| 1. Authorization Foundation/10. Front and Back-end Channels.srt | 6.6 KB |
| 1. Authorization Foundation/11. Token Flows.mp4 | 3.5 MB |
| 1. Authorization Foundation/11. Token Flows.srt | 4.7 KB |
| 1. Authorization Foundation/12. Token Details.mp4 | 17.9 MB |
| 1. Authorization Foundation/12. Token Details.srt | 8.5 KB |
| 1. Authorization Foundation/13. Token Brokers.mp4 | 7.2 MB |
| 1. Authorization Foundation/13. Token Brokers.srt | 3.4 KB |
| 1. Authorization Foundation/14. Module Summary.mp4 | 1.7 MB |
| 1. Authorization Foundation/14. Module Summary.srt | 2.3 KB |
| 1. Authorization Foundation/2. Four Pillars of Identity Review.mp4 | 2.2 MB |
| 1. Authorization Foundation/2. Four Pillars of Identity Review.srt | 2.2 KB |
| 1. Authorization Foundation/3. What Is Authorization.mp4 | 8.5 MB |
| 1. Authorization Foundation/3. What Is Authorization.srt | 6.5 KB |
| 1. Authorization Foundation/4. The Two Buckets for Authorization.mp4 | 15.1 MB |
| 1. Authorization Foundation/4. The Two Buckets for Authorization.srt | 14.2 KB |
| 1. Authorization Foundation/5. Authorization Schemes.mp4 | 4.4 MB |
| 1. Authorization Foundation/5. Authorization Schemes.srt | 5.4 KB |
| 1. Authorization Foundation/6. Least Privilege and Just-in-Time.mp4 | 4.5 MB |
| 1. Authorization Foundation/6. Least Privilege and Just-in-Time.srt | 4.3 KB |
| 1. Authorization Foundation/7. Course and Fine-grained Authorization.mp4 | 4.8 MB |
| 1. Authorization Foundation/7. Course and Fine-grained Authorization.srt | 3.5 KB |
| 1. Authorization Foundation/8. The Importance of Authorization.mp4 | 7.6 MB |
| 1. Authorization Foundation/8. The Importance of Authorization.srt | 5.7 KB |
| 1. Authorization Foundation/9. Using Consent and Authorization.mp4 | 30.3 MB |
| 1. Authorization Foundation/9. Using Consent and Authorization.srt | 15.8 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/0. Module Introduction.mp4 | 1.4 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/0. Module Introduction.srt | 1.4 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/1. Azure AD Group Refresher.mp4 | 12.1 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/1. Azure AD Group Refresher.srt | 7.6 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/10. Using Conditional Access.mp4 | 10.2 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/10. Using Conditional Access.srt | 5.4 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/11. Conditional Access Demo.mp4 | 8.1 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/11. Conditional Access Demo.srt | 3 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/12. Two Key Application Scenarios.mp4 | 16.5 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/12. Two Key Application Scenarios.srt | 8.4 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/13. Applications Have Secrets.mp4 | 12 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/13. Applications Have Secrets.srt | 6.1 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/14. Azure Key Vault.mp4 | 14.9 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/14. Azure Key Vault.srt | 6.1 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/15. Enforcing Application Scope.mp4 | 4 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/15. Enforcing Application Scope.srt | 3.2 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/16. Repudiation Options.mp4 | 7.9 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/16. Repudiation Options.srt | 4.7 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/17. Module Summary.mp4 | 1.4 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/17. Module Summary.srt | 2.2 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/2. Azure Resource Structure.mp4 | 15.8 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/2. Azure Resource Structure.srt | 10.2 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/3. Azure Roles.mp4 | 14.6 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/3. Azure Roles.srt | 7.9 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/4. Using Custom Azure Roles.mp4 | 23.5 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/4. Using Custom Azure Roles.srt | 9 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/5. Azure AD Roles.mp4 | 24.1 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/5. Azure AD Roles.srt | 10.4 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/6. Using Access Reviews.mp4 | 7.6 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/6. Using Access Reviews.srt | 5.3 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/7. Using Privileged Identity Management.mp4 | 27.5 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/7. Using Privileged Identity Management.srt | 12.4 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/8. Leveraging Identity Protection.mp4 | 19.9 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/8. Leveraging Identity Protection.srt | 7.9 KB |
| 2. Authorization with Azure Resource Manager and Azure AD/9. Conditional Access Overview.mp4 | 23 MB |
| 2. Authorization with Azure Resource Manager and Azure AD/9. Conditional Access Overview.srt | 13 KB |
| content.txt | 1.6 KB |
| microsoft-azure-authorization-design.zip | 4.8 MB |