{"id":9165,"date":"2023-08-25T15:47:00","date_gmt":"2023-08-25T20:47:00","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=9165"},"modified":"2025-04-03T11:54:29","modified_gmt":"2025-04-03T16:54:29","slug":"avepoint-microsoft-365-identity-management-public-sector-blog-2023","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/","title":{"rendered":"Securing the Digital Workplace: Microsoft 365 Identity Management for Public Sector Leaders"},"content":{"rendered":"\n<p>Zero Trust is a critical focus for public sector organizations as they navigate today\u2019s evolving digital workplace and cybersecurity landscape. But one issue is emerging as increasingly troublesome: insider threats.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.proofpoint.com\/us\/resources\/threat-reports\/cost-of-insider-threats\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"AvePoint - Microsoft 365 Identity Management Blog - 2023 - Resource 1\">The 2022 Cost of Inside Threats: Global Report<\/a>&nbsp;found incidents involving insider threats surged 44% over the past two years. While some of these threats may be malicious insiders, seeking to misuse their authorized access for personal gain or harm, many are the result of cybercriminals exploiting vulnerabilities in identities to enter your environment. These criminals use tactics like compromised credentials \u2013&nbsp;<a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"AvePoint - Microsoft 365 Identity Management Blog - 2023 - Resource 2\">the leading cause of data breaches<\/a>&nbsp;\u2013 as well as phishing scams and social engineering to impersonate identities and gain unauthorized access.<\/p>\n\n\n\n<p>To effectively counter these increasingly sophisticated threats, organizations must strengthen identity management. When executed properly, identity management not only enhances the security of your digital workplace but enables a Zero Trust strategy.<\/p>\n\n\n\n<p>Let\u2019s discuss what identity management is, how to build a comprehensive strategy in Microsoft 365, and how it can fortify your Zero Trust deployment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Identity Management?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"625\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/AvePoint-Zero-Trust-Blog_300x300.jpg\" alt=\"AvePoint Identity Management Blog Embedded Image 2023\" class=\"wp-image-9419\" style=\"width:300px\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/AvePoint-Zero-Trust-Blog_300x300.jpg 625w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/AvePoint-Zero-Trust-Blog_300x300-300x300.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/AvePoint-Zero-Trust-Blog_300x300-150x150.jpg 150w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/figure><\/div>\n\n\n<p>Identity management establishes and manages the digital identities of anyone entering your environment \u2013 from employees and contractors to guest users. Identities could refer to people, but they could also be services or devices entering your environment.<\/p>\n\n\n\n<p>Identity management enables organizations to implement robust access controls, granting privileges based on roles \u2013 which is why identity management is an integral piece of Zero Trust. Without it, you will have no way to verify users and devices are who they say they are, let alone establish proper privileges and access, which are key Zero Trust principles.<\/p>\n\n\n\n<p>When done effectively, identity management provides the right access to the right individuals at the right time for the right reason. This process not only improves your security posture, but can streamline user access, reduce administrative overhead, and help you better meet your compliance obligations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Building Identity Management in Microsoft 365<\/h2>\n\n\n\n<p>When building your identity management strategy in Microsoft 365, remember these three basic elements: identify, authenticate, and authorize.<\/p>\n\n\n\n<p>Here\u2019s how to get started:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identify:&nbsp;<\/strong>The backbone of identity management in Microsoft 365 is Azure Activity Directory (Azure AD). Azure AD provides a cloud identity for users, groups, and resources. It is where you build out your users\u2019 identities and control access to internal and external resources \u2013 like your intranet or even Microsoft Teams. The solution will recognize users (based on Microsoft\u2019s powerful machine learning and AI\u2019s understanding of typical user and tenant behavior) and flag risks that fall outside of normal behavior, triggering the next steps of the process.<\/li>\n\n\n\n<li><strong>Authenticate:&nbsp;<\/strong>Multi-factor authentication (MFA) is today\u2019s gold standard for authenticating identities. There are a variety of ways to do this, from smart cards to one-time passwords, that add layers of protection to your security. Microsoft\u2019s Authenticator App helps implement MFA across your applications in a convenient and easy way for users, allowing them to verify their and their devices\u2019 identities from their phones.<\/li>\n\n\n\n<li><strong>Authorize:&nbsp;<\/strong>It\u2019s critical to grant access privileges based on the conditions specific to your organization. Conditional Access policies take a two-phased approach: first, it collects information about the person (their device, IP address, etc.) and then enforces any policies you have in place. This could mean if it detects a new device, it may enforce multi-factor authentication (MFA) or request the user sign in again. It could also prohibit access under certain conditions, like if a user is attempting access from a mobile device. These policies provide granular control over access while reducing the risk of authorized access.<\/li>\n<\/ul>\n\n\n\n<p>By following this framework, you can easily begin using the powerful tools Microsoft offers to build your identity management strategy, ensuring only authorized individuals have access to critical systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Three Ways to Take a More Proactive Approach to Identity Management<\/h2>\n\n\n\n<p>Once you\u2019ve taken the initial steps to start building your identity management approach, take it to the next level to enhance your security:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/www.avepoint.com\/blog\/protect\/policy-enforcement\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"AvePoint - Microsoft 365 Identity Management Blog - 2023 - Resource 3\">Right-size your policies:<\/a>&nbsp;<\/strong>Strict, one-size-fits-all rules can hinder productivity; if security is in the way of getting the job done, users will find a way around it. Customizing your policies to specific users, workspaces, or even content creates a more tailored approach to access control, striking a balance between security and productivity.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.avepoint.com\/blog\/manage\/identity-data-governance\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"AvePoint - Microsoft 365 Identity Management Blog - 2023 - Resource 4\">Implement lifecycles:<\/a>&nbsp;<\/strong>Identities should not permanently exist in your environment. People switch jobs or upgrade their devices. Establish a process to evaluate and recertificate identities \u2013 whether users (both external and internal) or devices \u2013 to ensure they still require access to your content and workspaces.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.avepoint.com\/blog\/protect\/microsoft-secure-score\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"AvePoint - Microsoft 365 Identity Management Blog - 2023 - Resource 5\">Monitor your environment:<\/a>&nbsp;<\/strong>Even with the best-laid security plans, things can still fall through the cracks. That\u2019s why it\u2019s critical to monitor your environment \u2013 including users, devices, locations, and behavior \u2013 to identify any anomalies or suspicious activities that should be addressed.<\/li>\n<\/ul>\n\n\n\n<p>These strategies can help you build a more proactive identity management approach that actively reduces risks and attack surfaces, allowing you to go beyond verifying identity to create a secure and efficient digital workplace.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Build a Secure Digital Workplace with Zero Trust<\/h2>\n\n\n\n<p>While identity management is an important aspect of building your secure digital workplace, ensuring only authorized individuals have access to your systems, it is not enough to protect your data or the workspaces where it lives in today\u2019s ever-evolving cyber threat landscape.<\/p>\n\n\n\n<p>Public sector organizations must embrace a comprehensive Zero Trust security framework to effectively build a secure digital workplace. To do so, you must combine identity management best practices with other robust security measures, like role-based access controls, workspace governance policies, lifecycle management processes, and risk assessments. Together, these strategies can enhance the protection of your digital environment and minimize your risk of data breach or unauthorized access.<\/p>\n\n\n\n<p><em><strong>Download the free AvePoint guide,&nbsp;&#8220;<a href=\"https:\/\/cdn.avepoint.com\/pdfs\/en\/ebooks\/Zero-Trust-Standards-eBook_US_Aug2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"AvePoint - Microsoft 365 Identity Management Blog - 2023 - Bottom CTA\">How to Achieve Zero Trust Standards Without Limiting Collaboration in Microsoft 365,&#8221;<\/a> for more information about protecting your digital collaboration workspaces with a Zero Trust framework.<\/strong><\/em><\/p>\n<head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/community\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\"><\/head>","protected":false},"excerpt":{"rendered":"<p>Zero Trust is a critical focus for public sector organizations as they navigate today\u2019s evolving digital workplace and cybersecurity landscape. But one issue is emerging as increasingly troublesome: insider threats. The 2022 Cost of Inside Threats: Global Report&nbsp;found incidents involving &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":9923,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,1493,952],"tags":[1217,545,1321,443],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing the Digital Workplace: Microsoft 365 Identity Management for Public Sector Leaders | Carahsoft<\/title>\n<meta name=\"description\" content=\"Let\u2019s discuss what identity management is, how to build a comprehensive strategy in Microsoft 365, and how it can fortify your Zero Trust deployment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the Digital Workplace: Microsoft 365 Identity Management for Public Sector Leaders | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Let\u2019s discuss what identity management is, how to build a comprehensive strategy in Microsoft 365, and how it can fortify your Zero Trust deployment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-25T20:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T16:54:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/AvePoint-Zero-Trust-Blog_875x635.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1215\" \/>\n\t<meta property=\"og:image:height\" content=\"882\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Carahsoft Team\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Carahsoft Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/\"},\"author\":{\"name\":\"The Carahsoft Team\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\"},\"headline\":\"Securing the Digital Workplace: Microsoft 365 Identity Management for Public Sector Leaders\",\"datePublished\":\"2023-08-25T20:47:00+00:00\",\"dateModified\":\"2025-04-03T16:54:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/\"},\"wordCount\":994,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/AvePoint-Zero-Trust-Blog_875x635.jpg\",\"keywords\":[\"AvePoint\",\"Cybersecurity\",\"Multi-Factor Authentication\",\"Zero Trust\"],\"articleSection\":[\"Cybersecurity\",\"Partners\",\"Zero Trust\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/\",\"name\":\"Securing the Digital Workplace: Microsoft 365 Identity Management for Public Sector Leaders | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/AvePoint-Zero-Trust-Blog_875x635.jpg\",\"datePublished\":\"2023-08-25T20:47:00+00:00\",\"dateModified\":\"2025-04-03T16:54:29+00:00\",\"description\":\"Let\u2019s discuss what identity management is, how to build a comprehensive strategy in Microsoft 365, and how it can fortify your Zero Trust deployment.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/AvePoint-Zero-Trust-Blog_875x635.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/AvePoint-Zero-Trust-Blog_875x635.jpg\",\"width\":1215,\"height\":882,\"caption\":\"AvePoint Identity Management Blog Preview Image 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the Digital Workplace: Microsoft 365 Identity Management for Public Sector Leaders\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\",\"name\":\"The Carahsoft Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"caption\":\"The Carahsoft Team\"},\"description\":\"The Digital Media team at Carahsoft.\",\"sameAs\":[\"https:\/\/www.carahsoft.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing the Digital Workplace: Microsoft 365 Identity Management for Public Sector Leaders | Carahsoft","description":"Let\u2019s discuss what identity management is, how to build a comprehensive strategy in Microsoft 365, and how it can fortify your Zero Trust deployment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/","og_locale":"en_US","og_type":"article","og_title":"Securing the Digital Workplace: Microsoft 365 Identity Management for Public Sector Leaders | Carahsoft","og_description":"Let\u2019s discuss what identity management is, how to build a comprehensive strategy in Microsoft 365, and how it can fortify your Zero Trust deployment.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/","og_site_name":"| Carahsoft","article_published_time":"2023-08-25T20:47:00+00:00","article_modified_time":"2025-04-03T16:54:29+00:00","og_image":[{"width":1215,"height":882,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/AvePoint-Zero-Trust-Blog_875x635.jpg","type":"image\/jpeg"}],"author":"The Carahsoft Team","twitter_misc":{"Written by":"The Carahsoft Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/"},"author":{"name":"The Carahsoft Team","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083"},"headline":"Securing the Digital Workplace: Microsoft 365 Identity Management for Public Sector Leaders","datePublished":"2023-08-25T20:47:00+00:00","dateModified":"2025-04-03T16:54:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/"},"wordCount":994,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/AvePoint-Zero-Trust-Blog_875x635.jpg","keywords":["AvePoint","Cybersecurity","Multi-Factor Authentication","Zero Trust"],"articleSection":["Cybersecurity","Partners","Zero Trust"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/","url":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/","name":"Securing the Digital Workplace: Microsoft 365 Identity Management for Public Sector Leaders | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/AvePoint-Zero-Trust-Blog_875x635.jpg","datePublished":"2023-08-25T20:47:00+00:00","dateModified":"2025-04-03T16:54:29+00:00","description":"Let\u2019s discuss what identity management is, how to build a comprehensive strategy in Microsoft 365, and how it can fortify your Zero Trust deployment.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/AvePoint-Zero-Trust-Blog_875x635.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/08\/AvePoint-Zero-Trust-Blog_875x635.jpg","width":1215,"height":882,"caption":"AvePoint Identity Management Blog Preview Image 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/avepoint-microsoft-365-identity-management-public-sector-blog-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Securing the Digital Workplace: Microsoft 365 Identity Management for Public Sector Leaders"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083","name":"The Carahsoft Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","caption":"The Carahsoft Team"},"description":"The Digital Media team at Carahsoft.","sameAs":["https:\/\/www.carahsoft.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9165"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=9165"}],"version-history":[{"count":4,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9165\/revisions"}],"predecessor-version":[{"id":9421,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9165\/revisions\/9421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/9923"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=9165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=9165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=9165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}