One important function of Certificate Authorities that’s mentioned briefly in Part 2 of our “Components of a PKI” blog series is the ability to perform certificate revocation, or the CA’s ability to revoke certificates it issued previously.
The authority on identity and security in Microsoft
Does securing your business keep you up at night? Sleep better staying in the know – read our experts’ unique takes on trends in cybersecurity.
In Part 1 of our “Components of a PKI” blog series, we defined several PKI terms that are useful for understanding Certificate Authorities (CAs—also known as Certification Authorities) and CA hierarchies…
Digital certificates (most commonly represented by the X.509 public key certificate standard) are signed data objects that associate a public key with an individual user, device, or entity. In this case, we’re specifically referring to digital certificates formatted using the X.509 standard.
User attributes are important metadata that should be treated with care. Some organizations do not take user attributes seriously enough, which creates problems when the company tries to automate system access.
Planning for a Microsoft Information Protection deployment can seem complicated at first; however, the recommendations in this article can help guide you in the right direction. An efficient design will result in a simpler deployment, which will allow for a faster and more widely adopted end-user experience.
There are a few key terms that are critical when understanding and deploying Microsoft Information Protection (MIP). For example, sensitivity labels give you a way to classify and protect data by using visual markings, protections such as encryption, and restrictions on data access…
How to Effectively Manage Microsoft Intune Application Assignments with PowerShell and the Microsoft Graph API
In large-scale Microsoft Intune deployments, you’ll typically find both production and development tenants. For effective application testing, you’ll need to assign your applications to test groups of devices or users. Performing this process manually can be time-consuming and repetitive. To simplify the mass addition of a group for application deployment, you can leverage the Intune PowerShell SDK.
In Part 3 of this blog series, we discuss some other important considerations when taking this approach to automation.
Authentication Options for Automated Azure PowerShell Scripts, Part 2: Create and Configure an App Registration
Part 2 of this blog series gets into the details of how to create and configure an app registration for use with an automated PowerShell script.
Authentication Options for Automated Azure PowerShell Scripts, Part 1: Service Account vs. App Registration
Automation is a fundamental requirement for good systems administration, no matter what the platform. Being able to automate tasks ensures consistency and prevents mistakes caused by forgetfulness or by simply mistyping or mis-clicking—aka “fat-finger errors.”
Several high-risk events have recently highlighted the importance of a fully functional and secure Active Directory environment to a company’s business operations.
Migrating your Active Directory Federation Services (AD FS) integrated SaaS applications to Azure Active Directory (Azure AD) provides many benefits. For example, Azure AD B2B lets you give your business partners and customers access to your organization’s applications without creating a user account in AD or Azure AD.