In this post learn how to implement claims-based application access control when Azure AD B2C is federated with another identity provider.
The authority on identity and security in Microsoft
Does securing your business keep you up at night? Sleep better staying in the know – read our experts’ unique takes on trends in cybersecurity.
Deciding who can access data is a key part of zero-trust. With Azure AD authentication contexts and other tools, you can do exactly this.
Until passwordless authentication is a more viable option, we must take steps to defend against password spray attacks. Azure Active Directory can help.
Azure Active Directory Connect (AADC) installation creates a set of permissions that in most cases does not follow the concept of least privilege.
Planning for a Microsoft Information Protection deployment can seem complicated at first; however, the recommendations in this article can help guide you in the right direction. An efficient design will result in a simpler deployment, which will allow for a faster and more widely adopted end-user experience.
There are a few key terms that are critical when understanding and deploying Microsoft Information Protection (MIP). For example, sensitivity labels give you a way to classify and protect data by using visual markings, protections such as encryption, and restrictions on data access…
Forgotten passwords are a key driver of Help desk calls for many organizations. They are also a major cost factor. Azure Active Directory (AD) Premium includes a Self-Service Password Reset (SSPR) solution that is completely hosted in the cloud and accessible from anywhere, including on mobile devices.
Enabling single sign-on (SSO) for SaaS applications adds convenience for end users, as well as reduces security risks and enables you to better meet compliance requirements. Using Azure Active Directory (AD) Premium to add SSO to your applications can solve these challenges, but there are a few things you need to plan for.
With the Azure AD Application Proxy, you can provide remote access to web applications and Remote Desktop Services (RDS) farms without opening any inbound holes in your firewall. You also don’t need to re-train your users because the URL they use to access an application doesn’t change.
Without a license, end users will not be able to use Office 365 services like Exchange Online or OneDrive for Business, so it’s critical that users have the right license(s) assigned to them. Historically, automating the assignment of licenses has required the development of custom PowerShell scripts or purchasing a third-party solution.