Entra ID

Highly Available, Secure, and Convenient: Leveraging Azure Blob Storage for your PKI Needs, Part 1

For as long as public key infrastructure (PKI) has existed, it has relied on certificate revocation lists (CRLs) and authority information access (AIA). CRLs are a fundamental part of most PKIs that allow clients to be 100% sure a certificate has not been revoked. AIA is a certificate extension that provides information on how to […]

Highly Available, Secure, and Convenient: Leveraging Azure Blob Storage for your PKI Needs, Part 1 Read More »

Deploying the eduPerson Schema to Active Directory

If you work in a higher education environment, there exists a set of standards that must be implemented to allow students and faculty to collaborate on projects at other schools or to use higher education specific services. One of these standards is the eduPerson schema, which provides storage for widely used education-specific attributes about a

Deploying the eduPerson Schema to Active Directory Read More »

Office 365 for IT Pros

[E BOOK] Office 365 for IT Pros Subscribe to the only always up-to-date eBook about the Microsoft 365 cloud Office system, covering Exchange Online, SharePoint Online, OneDrive for Business, Microsoft Teams, Planner, Entra ID (formerly Azure Active Directory), Microsoft Purview Compliance Solutions, PowerShell, the Microsoft Graph (and more).  Office 365 for IT Pros is co-authored

Office 365 for IT Pros Read More »

Improving Entra ID B2B User Management with Cross-Tenant Synchronization

B2B user management is a challenge for many organizations that utilize it for collaboration. In this blog, we discuss how to address this challenge using cross-tenant synchronization. Cross-tenant synchronization connects two or more Entra ID (formerly Azure Active Directory) tenants and copies users between them while keeping attributes in sync. In intra-organization collaboration scenarios, such

Improving Entra ID B2B User Management with Cross-Tenant Synchronization Read More »

Flattening Group Memberships to a Single Group

In previous blog posts (Part 1, Part 2), we discussed a powerful feature in Entra ID (formerly Azure Active Directory) known as dynamic membership rules. In short, Entra ID’s dynamic membership rules feature allows you to use any attributes from Entra ID’s base set or custom extension properties to construct groups that automatically add and

Flattening Group Memberships to a Single Group Read More »

Securing On-Premises Access Is Easier Than You Think: Utilizing the Entra Application Proxy

In a previous blog post , we discussed taking advantage of Entra (formerly Azure Active Directory) Application Proxies to allow access to on-premises applications without a dependency on traditional tools such as a VPN. That blog includes a few great points that should be highlighted again. For example, in most organizations an Entra Application Proxy:

Securing On-Premises Access Is Easier Than You Think: Utilizing the Entra Application Proxy Read More »

Win32 App Deployment with Intune Supersedence Rules

There are several ways to deploy applications to users or devices that are managed by Microsoft Intune. In addition to application types, you must also take into consideration the method of assignment and how it will affect you long term from a management and maintenance standpoint. Deploying an application installer via Intune is usually accomplished

Win32 App Deployment with Intune Supersedence Rules Read More »

Manage Entra Groups with the Graph API

In my previous blog [Win32 App Deployment with Intune Supersedence Rules] I explained how to update Win32 applications deployed within Microsoft Intune by using the supersedence feature. Although the process is typically straightforward and simple, the requirement of keeping a security group populated with all user or device objects can make the task time-consuming. This

Manage Entra Groups with the Graph API Read More »

3 Components of Cloud Authentication: Enterprise SSO, Zero Trust, Passwordless

In the past few years, we’ve seen a rapid expansion in remote and remote-hybrid workforces. Remote employees primarily use cloud-native services to manage their daily workloads from the comfort of their home (or public) internet. This has caused a great deal of stress for IT departments, especially those that rely heavily on their internal infrastructure.  

3 Components of Cloud Authentication: Enterprise SSO, Zero Trust, Passwordless Read More »

Configure Entra User Authentication for Cloud-Native Apps

[WEBINAR] Configure Entra User Authentication for Cloud-Native Apps Ready to enhance your skills with the latest cloud-native app authentication techniques?    In this webinar, Andy Schneider will teach you how to use open standards with Entra ID (formerly Azure AD) for authentication and work with protocols like OAUTH and SAML.     This session is a

Configure Entra User Authentication for Cloud-Native Apps Read More »