Skip to content

Commit 376d01f

Browse files
Merge pull request #54348 from ceperezb/CEPEREZB-sc900-describe-identity-concepts
add video
2 parents e30cfb2 + a4a62eb commit 376d01f

2 files changed

Lines changed: 5 additions & 1 deletion

File tree

learn-pr/wwl-sci/describe-identity-principles-concepts/3-define-identity-primary-security-perimeter.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,6 @@ metadata:
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 6
11+
durationInMinutes: 11
1212
content: |
1313
[!include[](includes/3-define-identity-primary-security-perimeter.md)]

learn-pr/wwl-sci/describe-identity-principles-concepts/includes/3-define-identity-primary-security-perimeter.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,10 @@ Digital collaboration has transformed how and where work gets done. Employees an
33

44
This shift has fundamentally changed how organizations need to think about security.
55

6+
Watch the video that follows to learn about identities and the new security perimeter.
7+
8+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=25959c9a-c652-42fc-af31-cf751e478792]
9+
610
## The traditional security perimeter
711

812
Historically, organizations protected their resources using a *network perimeter*—a defined boundary, enforced by firewalls and VPN gateways, around corporate systems. Security controls at the edge of the network kept untrusted traffic out and allowed trusted internal traffic to flow freely.

0 commit comments

Comments
 (0)