Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Microsoft Azure Security Technologies (AZ-500) Cert Prep: 1 Manage Identity and Access

via LinkedIn Learning


Learn key skills from the Manage Identity and Access domain of the Microsoft Azure Security Technologies (AZ-500) exam.

Cybersecurity skills are in high demand, and the Microsoft Azure Security Technologies (AZ-500) exam is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers. This course prepares certification candidates to excel in the Manage Identity and Access domain of the AZ-500 exam. Microsoft MVP Pete Zerger has designed lectures and hands-on demos to teach the key skills, including configuring and managing app registrations, enabling multi-factor authentication, configuring conditional auth controls, and implementing Privileged Identity Management (PIM) for just-in-time access. Plus, learn how to manage API and subscription-level access, balancing programmatic access and automation with security.



  • About the Manage Identity and Access domain
  • What you should know

1. Manage Azure Active Directory Identities

  • Configure security for service principals
  • Manage Microsoft Azure AD groups
  • Manage Microsoft Azure AD users
  • Configure password writeback
  • Configure authentication methods including password hash

2. Configure Secure Access Using Azure AD

  • Monitor privileged access for Azure AD Privileged Identity Management (PIM)
  • Configure access reviews
  • Activate and configure PIM
  • Implement conditional access policies including multi-factor authentication
  • Configure Azure AD Identity Protection
  • Transfer Azure subscriptions between Azure AD tenants

3. Manage Application Access

  • Create app registrations
  • Configure app registration permission scopes
  • Manage app registration permission consent
  • Manage API access to Azure subscriptions and resources

4. Manage Access Control

  • Configure subscription and resource permissions
  • Configure resource group permissions
  • Configure custom RBAC roles
  • Identify the appropriate role
  • Apply the principle of least privilege
  • Interpret permissions
  • Check access


  • Next steps

Taught by

Pete Zerger

Related Courses


Start your review of Microsoft Azure Security Technologies (AZ-500) Cert Prep: 1 Manage Identity and Access

Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free