Secure Identities and Access Workshop Delivery Guide 4 July 2022



Download 1.16 Mb.
Page33/37
Date08.08.2023
Size1.16 Mb.
#61825
1   ...   29   30   31   32   33   34   35   36   37
Secure Identities and Access

Demos




Use this module of the Secure Identities and Access Workshop to demonstrate Microsoft Identity solutions.




Objectives

  • Demonstrate how Microsoft Identity solutions work, going through key scenarios that will help you land product value and key differentiators.

  • Define and agree with the customer on next steps in terms of follow-up activities and/or engagements.
Format

Can be delivered as an onsite or online workshop.
Customer resources

  • Executive Sponsor

  • Security Team
Delivery resources

  • Security Architect

  • Engagement Manager
Supporting materials

  • The most up-to-date resources for these demos, are available as part of the CDX platform:

    • Conversation Demo - Identity and Access Management

    • Zero Trust Pillar Demo

    • Identity and Access Management Pillar Demo

    • Azure Active Directory Product Demo

  • Interactive guides:

    • Secure remote access to on-prem apps AAD App Proxy

    • Integrate SaaS applications with Azure AD

    • Enable combined MFA & SSPR registration w/ AAD

  • 10 - Secure Identities and Access Workshop - Key results, Recommendations and Next Steps.pptx
Preparation

The delivery resource will need to familiarize itself with the most up-to-date resources for the demos listed above in the “Supporting materials” section.
Pre-requisites

The activities outlined in 12.1 Customer Value Conversation should be completed prior to starting this activity.
Deliverables

The deliverables are defined as:

  • Next steps defined and agreed upon with the customer (follow-up engagements).
Guidance

Deliver the module by presenting the latest, up-to-date versions of the demo resources listed above in the “Supporting materials” section.



  • When presenting, be concise and stick to the facts.

  • Allow the customer to draw their own conclusions.

  • Make sure that you discuss, define, and agree with the customer on next steps in terms of follow-up activities and/or engagements. If possible, identify owners from both the customer and delivery organization, expected timelines, and resources needed. Document the next steps as part of the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.

  • Make sure you reserve some time for Q&A.
Background reading

To prepare for delivery of the Secure Identities and Access Workshop engagement, refer to Appendix A - Readiness and Technical Content for links to relevant online learning content.
Duration and effort

  • Preparation 1 Hrs.

  • Delivery 2 Hrs.



    1. Download 1.16 Mb.

      Share with your friends:
1   ...   29   30   31   32   33   34   35   36   37




The database is protected by copyright ©ininet.org 2024
send message

    Main page