Security, compliance and identity
Microsoft Build | May 25-27, 2021 | Digital event
Watch our on-demand sessions covering security, compliance, and identity.
|Application Authentication in the Microsoft Identity platform
The Microsoft Identity platform enables developers to build different types of applications to satisfy diverse business requirements. By supporting multiple OAuth 2.0 standard authentication protocols, developers can secure different types of applications such as single page applications (SPA), web apps, mobile or native apps, and services or daemon apps. In this session, you'll learn about implementing different OAuth 2.0 protocol grant types in popular application types.
John Patrick Dandison, Christos Matskas
|Broadening Confidential Computing Support across Azure
Latest developments in Azure confidential computing leveraging the latest Intel and AMD technologies to enable offerings such as SQL Always Encrypted, new confidential VMs that provide full lift and shift of applications, and innovations with Azure Confidential Ledger to provide tamper-proof audit logs.
|Build secure B2C applications with Azure AD External Identities
In this session, we will share best practices for how you can use Azure Active Directory External Identities to customize your user journey and enable a Zero Trust approach to securing your customer-facing applications. We will highlight new features that make it easier for developers to configure user journeys using Azure AD B2C user flows and API connectors, including how to set up custom domains, new identity providers, and advanced security with Identity Protection. Also, join us to see how verifiable credentials and External Identities together can support the next generation of customer identity verification.
Christer Ljung, Gayan Randeny, Jas Suri
|Build Secured IoT Solutions for Azure Sphere with IoT Hub
Learn best practices and strategies to build secure scalable IoT solutions with Azure Sphere and Azure IoT Hub. The session will cover Azure Sphere and IoT Hub trust, data types and serialization considerations to optimize IoT Hub data enrichment and message routing capabilities. And finally, we'll cover approaches to Azure Sphere command and control with IoT Hub.
David Glover, Mike Hall, Daisuke Nakahara
|Build Zero Trust ready applications starting with the Microsoft identity platform
The Zero Trust model assumes breach and verifies every access request, regardless of origin or access resource. When you are building a Zero Trust ready app, the Microsoft identity platform is here for you. In this session, you will learn how to ensure your app is built according to Zero Trust best practices and is ready to be managed when your customers want to embrace Zero Trust.
Saeed Akhter, Kalyan Krishna
|Build, integrate and accelerate Multi-cloud Compliance
Our customers and partners want to be able to extend Compliance value beyond Microsoft. Microsoft provides broad set of built-in compliance capabilities to protect and govern data as well as intelligently manage risk and compliance. A key ask from our partners and customers is for APIs to integrate Microsoft Compliance solutions with applications and services that are part of their broader security, compliance, identity and operations ecosystems. Join this session to learn all about Compliance APIs and extensibility capabilities that enable multi-cloud compliance!
Yaron Hezroni, Anne Raheem, Hammad Rajjoub, Nick Robinson
|Develop Compliance Powered LOB Applications with Microsoft Information Protection MIP SDK
The MIP SDK exposes the labeling and protection services from Microsoft 365 Compliance Center, to third-party applications and services. Developers can use the SDK to build native support for applying labels and protection to files. Developers can reason over which actions should be taken when specific labels are detected, and reason over MIP-encrypted information. Come join us in this session as we share how to build line of business applications using latest and greatest in MIP SDK.
Arvind Chandaka, Hammad Rajjoub
|Down with sign-ups, just sign-in!
Come learn how to use Azure AD Verifiable Credentials (VCs) to issue or accept custom credentials such as Verified Employee or Student as well as verify identity documents, electronic data and biometric authentication. You can use VCs to remotely hire new employees, verify your partners and onboard customers. Best of all, you can enhance existing apps in minutes!. With this new open standards-based approach users can verify once and use their credentials everywhere.
Matthijs Hoekstra, Ankur Patel
Keep improving your skill set
Microsoft Build only happens once a year, but that doesn't mean you can’t keep learning more about the new products and features you discovered during the event. Our curated set of learning paths and modules helps you not only improve the skills you already have, but helps you keep moving forward with new ideas and training opportunities.
Did you like these sessions? Share this page with your followers