- Services
- 
	
- Who we are
- Resources
- 
	- 
		- Stay up-to-date—read our experts' unique takes on trends in cybersecurity.
 
- 
		- Explore our resources for advice on boosting your organization's security.
 
 
- 
		
 
- 
	
- Get in touch
Tag: Microsoft Graph
					Not all organizations require their own PKI solution; however, most leverage Microsoft Active Directory Certificate Services because it integrates directly with their existing Active Directory environment... [...]				
				
					Digital certificates (most commonly represented by the X.509 public key certificate standard) are signed data objects that associate a public key with an individual user, device, or entity. In this [...]				
				
					One important function of Certificate Authorities that’s mentioned briefly in Part 2 of our “Components of a PKI” blog series is the ability to perform certificate revocation, or the CA’s [...]				
				
					In Part 1 of our “Components of a PKI” blog series, we defined several PKI terms that are useful for understanding Certificate Authorities (CAs—also known as Certification Authorities) and CA [...]				
				
					User attributes are important metadata that should be treated with care. Some organizations do not take user attributes seriously enough, which creates problems when the company tries to automate system [...]				
				
					Planning for a Microsoft Information Protection deployment can seem complicated at first; however, the recommendations in this article can help guide you in the right direction. An efficient design will [...]				
				
 
								

 
								 
								