Valid SC-100 Dumps shared by ExamDiscuss.com for Helping Passing SC-100 Exam! ExamDiscuss.com now offer the newest SC-100 exam dumps, the ExamDiscuss.com SC-100 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com SC-100 dumps with Test Engine here:
You have a Microsoft 365 tenant. Your company uses a third-party software as a service (SaaS) app named App1 that is integrated with an Azure AD tenant. You need to design a security strategy to meet the following requirements: * Users must be able to request access to App1 by using a self-service request. * When users request access to App1, they must be prompted to provide additional information about their request. * Every three months, managers must verify that the users still require access to Appl. What should you include in the design?
Correct Answer: B
Recent Comments (The most recent comments are at the top.)
sam - Jan 17, 2025
Microsoft Entra Identity Governance
Microsoft Entitlement Management, part of Azure AD Identity Governance, allows you to implement access reviews and request workflows for applications, including third-party SaaS apps like App1. With this solution, you can configure self-service access requests, request approval workflows, and access reviews. Users can request access to App1, provide additional information during the request, and managers can periodically review and verify access.
Connected apps in Microsoft Defender for Cloud Apps and . Access policies in Microsoft Defender for Cloud Apps are more focused on the security and monitoring aspects of cloud applications but do not provide the specific access request and review workflows required for this scenario.
Recent Comments (The most recent comments are at the top.)
Microsoft Entra Identity Governance
Microsoft Entitlement Management, part of Azure AD Identity Governance, allows you to implement access reviews and request workflows for applications, including third-party SaaS apps like App1. With this solution, you can configure self-service access requests, request approval workflows, and access reviews. Users can request access to App1, provide additional information during the request, and managers can periodically review and verify access.
Connected apps in Microsoft Defender for Cloud Apps and . Access policies in Microsoft Defender for Cloud Apps are more focused on the security and monitoring aspects of cloud applications but do not provide the specific access request and review workflows required for this scenario.