
Leveraging Azure Blob Storage for Your PKI Needs, Part 2: Automation
This blog post is a follow up to my previous post on leveraging Azure Blob Storage to serve HTTP certificate revocation lists (CRLs). If you
—
read our experts' unique takes on trends in cybersecurity.Connect with a Ravenswood expert using the form below.
Ravenswood Technology Group regularly publishes valuable content, including blog articles, webinars, e-guides, and other digital resources to help you with your Microsoft security, identity, and compliance needs. You can also follow us on LinkedIn for more content and resources.
This blog post is a follow up to my previous post on leveraging Azure Blob Storage to serve HTTP certificate revocation lists (CRLs). If you
Microsoft’s Active Directory (AD)—released in 1999 as part of Windows 2000 Server Edition—is currently the most popular directory service for Windows domain networks. AD has
Maintaining security in a Windows environment is important to reduce the risk of bad actors being able to cause harm to an organization. Although Windows
Remote Desktop Gateway (RDG) is a widely deployed Windows Server Role that allows secure remote access to a protected resource (e.g. a Windows Server via
HR-driven provisioning is a capability of Entra ID that allows data from Human Resource (HR) systems to be used to create and update accounts in
Public key infrastructure (PKI) is the bedrock of modern telecommunications. It is a foundational technology to uniquely identify clients and facilitate their secure transmission and
© Ravenswood Technology Group, LLC