Always design with Zero Trust : Verify explicitly, use least privilege, assume breach.
Microsoft provides identity services for:
o B2B, B2C, and Decentralized Identity models.
Shift from Classic Identity (trusted network perimeter) to Zero Trust Identity
(policy-based protection anywhere).