Azure Active Directory

Boost Security and Transform Conditional Access with Entra ID’s Authentication Strengths

Microsoft Entra ID is a critical component of modern identity and access management. It acts as a front door to your applications and data by providing secure and auditable identity management. One of Entra ID’s key capabilities is Conditional Access (CA). CA allows you to require specific authentication controls. It also lets you make policy […]

Boost Security and Transform Conditional Access with Entra ID’s Authentication Strengths Read More »

Highly Available, Secure, and Convenient: Leveraging Azure Blob Storage for your PKI Needs, Part 1

For as long as public key infrastructure (PKI) has existed, it has relied on certificate revocation lists (CRLs) and authority information access (AIA). CRLs are a fundamental part of most PKIs that allow clients to be 100% sure a certificate has not been revoked. AIA is a certificate extension that provides information on how to

Highly Available, Secure, and Convenient: Leveraging Azure Blob Storage for your PKI Needs, Part 1 Read More »

Improving Entra ID B2B User Management with Cross-Tenant Synchronization

B2B user management is a challenge for many organizations that utilize it for collaboration. In this blog, we discuss how to address this challenge using cross-tenant synchronization. Cross-tenant synchronization connects two or more Entra ID (formerly Azure Active Directory) tenants and copies users between them while keeping attributes in sync. In intra-organization collaboration scenarios, such

Improving Entra ID B2B User Management with Cross-Tenant Synchronization Read More »

Securing On-Premises Access Is Easier Than You Think: Utilizing the Entra Application Proxy

In a previous blog post , we discussed taking advantage of Entra (formerly Azure Active Directory) Application Proxies to allow access to on-premises applications without a dependency on traditional tools such as a VPN. That blog includes a few great points that should be highlighted again. For example, in most organizations an Entra Application Proxy:

Securing On-Premises Access Is Easier Than You Think: Utilizing the Entra Application Proxy Read More »