Entra Enterprise Application Cleanup
The process of cleaning up your applications can be time-consuming but there are useful ways to report and manage applications in Azure.
Entra Enterprise Application Cleanup Read More »
The process of cleaning up your applications can be time-consuming but there are useful ways to report and manage applications in Azure.
Entra Enterprise Application Cleanup Read More »
Time synchronization is an important yet sometimes overlooked part of security. Ensuring proper time settings is paramount to security in unexpected ways.
In Sync: Proper Active Directory Time Sync Methods Read More »
In this post learn how to implement claims-based application access control when Azure AD B2C is federated with another identity provider.
Application Access Control Restrictions via Claims in Azure AD B2C Read More »
In this blog, I’ll show you how to configure a service provider-initiated SAML application to integrate with Azure AD B2C.
How to Federate a SAML Application with Azure AD B2C Read More »
Applications that use Lightweight Directory Access Protocol (LDAP) are prevalent in virtually every organization that uses Active Directory (AD). Unfortunately, the default AD configuration provides opportunities for insecure LDAP connections. These defaults have come into focus because of common, widely available AD attack tools such as NTLMRelayX. (For more information about NTLMRelayX, see How to
Monitoring for LDAP Client Security Read More »
Azure AD B2C offers authentication as a service. Knowing the trade-offs between out-of-the-box user flows and custom policies can be a huge advantage.
Introduction to Azure AD B2C Custom Policies Read More »
Microsoft announced that after October 31, 2021, viral Azure Active Directory tenants would no longer be created for B2B collaboration.
A Farewell to Viral Tenants Read More »
Inactive accounts that aren’t disabled in a timely manner threaten your AD environment. Cleanup of these accounts is crucial to keeping an organization secure.
Identifying Inactive Users in a Remote Hybrid World Read More »
Deciding who can access data is a key part of zero-trust. With Azure AD authentication contexts and other tools, you can do exactly this.
Shortcuts for when you’re building scripts to work with AD or working on servers with limited access to tools.
Fun with ADSI: Shortcuts for Binding to Active Directory Objects Read More »