Web application owners need to generate and submit certificate requests to secure traffic to their websites. Application owners often use IIS to generate or renew
The authority on identity and security in Microsoft
Does securing your business keep you up at night? Sleep better staying in the know – read our experts’ unique takes on trends in cybersecurity.
The process of cleaning up your applications can be time-consuming but there are useful ways to report and manage applications in Azure.
In this post learn how to implement claims-based application access control when Azure AD B2C is federated with another identity provider.
In this blog, I’ll show you how to configure a service provider-initiated SAML application to integrate with Azure AD B2C.
Azure AD B2C offers authentication as a service. Knowing the trade-offs between out-of-the-box user flows and custom policies can be a huge advantage.
Microsoft announced that after October 31, 2021, viral Azure Active Directory tenants would no longer be created for B2B collaboration.
Inactive accounts that aren’t disabled in a timely manner threaten your AD environment. Cleanup of these accounts is crucial to keeping an organization secure.
Azure Active Directory Connect (AADC) installation creates a set of permissions that in most cases does not follow the concept of least privilege.
The first domain in an AD forest is unique. There are two groups in this domain that we must be aware of: Enterprise Admins and Schema Admins.
The PetitPotam exploit can be used to completely own an environment, with very few prerequisites—but mitigation is within reac