This article is part of the Identity and Access Management Security School lesson on building an IAM architecture. Visit the Building an identity and access management architecture lesson page for more learning resources.
If you got two or more wrong, revisit these materials in the Building an identity and access management architecture lesson:
Video: Demystifying identity management
Tip: From the gateway to the application: Effective access control strategies
Podcast: Five key challenges in managing identities
Dig deeper on Microsoft identity and access management