Category: Azure AD

SSPR writeback to disconnected forests using AAD cloud sync (Public preview)

What is AAD Cloud sync? Azure AD Connect Cloud sync is a light-weight agent that is commanded from the cloud. So there is no databases with the agent unlike with the old Azure AD Connect. I wrote a post about…

Continue Reading SSPR writeback to disconnected forests using AAD cloud sync (Public preview)

Insider risk management, what, why and how

What is Insider risk management Insider risk management is a solutions for example to prevent leavers to take precious company data with them when to go. But there is also options to lower the risk for users, example anonymizing usernames….

Continue Reading Insider risk management, what, why and how

Temporary Access Pass what and the how

What is Azure Temporary Access Pass? Passwordless authentication methods, such as FIDO2 and Passwordless Phone Sign-in through the Microsoft Authenticator app, enable users to sign in securely without a password. Users can bootstrap Passwordless methods in one of two ways:…

Continue Reading Temporary Access Pass what and the how

Whats new with conditional access and Microsoft authenticator

Conditional access has some new cool features that will provide extra security for your user logins. In this post I will cover some of them. Will be digging deeper on these as they evolve but for now it’s important for…

Continue Reading Whats new with conditional access and Microsoft authenticator

Moving from SfB Hybrid to Teams-only

Time to move from On-premises Hybrid to the cloud. What it takes and what could be the problems with the process? End of Life for On-premises versions Skype for Business 2015 mainstream end date was October 13, 2020. However, the…

Continue Reading Moving from SfB Hybrid to Teams-only

Access reviews for External Guest users

Access reviews let’s an external users or an internal users to verify the access of a user. Access reviews honors a time frame set but the minimum time that the reviews will be automatically ran is 1 day. The other…

Continue Reading Access reviews for External Guest users

Hybrid identity and how to protect your users?

Hybrid identity in a trendy way to distribute your identity across cloud services. Identity has always been an important part in user interactions with services. It’s your unique identifier in the directory that you belong to. This theme can also…

Continue Reading Hybrid identity and how to protect your users?

Retention policies why and how?

The picture above is from one of the many CISSP videos that I have watched but it came to good point as I was planning to write a posts about data retention and why it matters. So why it matters?…

Continue Reading Retention policies why and how?

AAD Identity protection and Hybrid Identity

In the past years Microsoft made some excellent improvements for securing the Identity. One of these features was Azure AD Identity Protection and it’s proxy version to allow your policies to flow inside on-premises AD. It uses the same kinda…

Continue Reading AAD Identity protection and Hybrid Identity

Continuous Access Evaluation and working with tokens

Access, ID, and SAML2 ID tokens are JSON web tokens (JWT). These ID tokens consist of a header, payload, and signature. The header and signature are used to verify the authenticity of the token, while the payload contains the information about…

Continue Reading Continuous Access Evaluation and working with tokens