Question : You manage an Azure Active Directory (AD) tenant You plan to allow users to log in to a third-party application by using their Azure AD credentials. To access the application, users will be prompted for their existing third-party user names and passwords. You need to add the application to Azure AD. Which type of application should you add?
Correct Answer : Get Lastest Questions and Answer : Explanation: https://msdn.microsoft.com/en-us/library/azure/dn308588.aspx User provisioning enables automated user provisioning and deprovisioning of accounts in third-party SaaS applications from within the Azure Management Portal, using your Windows Server Active Directory or Azure AD identity information. When a user is given permissions in Azure AD for one of these applications, an account can be automatically created (provisioned) in the target SaaS application.
From the scenario - Users will be prompted for the EXISTING 3rd party credentials. No need to provision them then.
Configuring password-based single sign-on enables the users in your organization to be automatically signed in to a third-party SaaS application by Azure AD using the user account information from the third-party SaaS application. When you enable this feature, Azure AD collects and securely stores the user account information and the related password.
Question : You plan to use Password Sync on your DirSync Server with Azure Active Directory {Azure AD) on your company network. You configure the DirSync server and complete an initial synchronization of the users.
Several remote users are unable to log in to Office 365. You discover multiple event log entries for "Event ID 611 Password synchronization failed for domain. You need to resolve the password synchronization issue. Which two actions should you perform? Each correct answer presents part of the solution.
A. Restart Azure AD Sync Service.
B. Run the Set-FullPasswordSync Power Shell cmdlet.
C. Force a manual synchronization on the DirSync server.
D. Add the DirSync service account to the Schema Admins domain group.
Question : You administer an Access Control Service namespace named contosoACS that is used by a web application. ContosoACS currently utilizes Microsoft and Yahoo accounts. Several users in your organization have Google accounts and would like to access the web application through ContosoACS. You need to allow users to access the application by using their Google accounts. What should you do?
1. Register the application directly with Google. 2. Edit the existing Microsoft Account identity provider and update the realm to include Google. 3. Access Mostly Uused Products by 50000+ Subscribers 4. Add a new WS-Federation identity provider and configure the WS-Federation metadata to point to the Google sign-in URL.
Correct Answer : Get Lastest Questions and Answer : Explanation: Configuring Google as an identity provider eliminates the need to create and manage authentication and identity management mechanism. It helps the end user experience if there are familiar authentication procedures.
Reference: How to: Configure Google as an Identity Provider URL: http://msdn.microsoft.com/en-us/library/azure/gg185976.aspx
1. By configuring a Site-to-Site (S2S) VPN. 2. By configuring a VNet-toVNet VPN. 3. By configuring a Point-to-Site (P2S) VPN. 4. By configuring DirectAccess on a Windows Server 2012 server VM.
1. Configure and enable a retention policy. 2. Configure a separate blob container for the logs. 3. Rename the $Logs container. 4. Wait for the logs to expire.