Category: IAM

Configure Azure Role Permissions for Management Groups, Subscriptions, Resource Groups, and Resources Key Concepts Here’s a comparison table between Microsoft Entra ID roles (formerly Azure AD roles) and Azure roles (RBAC). These operate in different scopes: Entra roles manage identity…

Identity is the new security perimeter—and Conditional Access is one of the most critical tools enterprises have to enforce modern, adaptive access control. In recent months, Microsoft has introduced powerful new enhancements to Microsoft Entra ID, further improving how organizations…

The process of creating Groups for PIM is super easy. Let’s go through it. History Before you had to assign roles to a particular user and they raised their permissions. Then you added the same role to another person and…

First things first, Security defaults were automatically enabled for all new tenants created after October 22, 2019. This was to ensure a strong security posture right from the start for all users. Set the stage Let’s imagine this scenario. You…

Microsoft’s Cross-tenant features When it comes to the cross-tenant access features, Microsoft has a strong road plan so far. There won’t be any more external users or jumping between Teams tenants when you require access to various tenants, which we…

Or Azure AD for customers, yes Azure AD for customers. That’s the name of the game. Microsoft released this excellent feature at Build yesterday and I wanted to elaborate it a bit more. Why to use it? Azure AD makes…

This is huge for all the Power Platform users. Now you can use Key vault to store your key, if you aren’t familiar with concept of Key vault, let me open it a bit. What features will be supported? Power…

Have you seen Azure Chaos Studio? If not, soon you have. What is Chaos Studio? Chaos Studio is a managed service that employs chaos engineering to assist you in measuring, understanding, and improving the resilience of your cloud applications and…

The new Microsoft 365 Defender RBAC model makes it simple to migrate existing permissions from the individual supported RBAC models to the new RBAC model. All permissions listed within the Microsoft 365 Defender RBAC model align to permissions in the…

Why? Like we all know Identity is a hot topic after the MFA fatigue methods or discovering and attacking our resources as external or internal entities but the often overlooked aspect of security is inside the data layer. You could…