Category: Identity

Information barriers, the GUI experience (Public preview)

This pic above is exactly the opposite of how information barriers work. So how it works? When information barrier policies are in place, people who should not communicate or share files with other specific users won’t be able to find,…

Continue Reading Information barriers, the GUI experience (Public preview)

Section 3 – Manage application access – App Registrations

This is section 3 and part 2. In this post I will be covering App registrations with the following topics. Create an App Registration Configure App Registration permission scopes Manage App Registration permission consent What is App registration in Azure?…

Continue Reading Section 3 – Manage application access – App Registrations

Multi-tenant App registration and user (Admin) consent

What has changed? Microsoft have removed ability for getting user consent for unverified applications. This is an great addition towards security but it will make your life harder as a admin and as a software publisher. Different options Let’s go…

Continue Reading Multi-tenant App registration and user (Admin) consent

Section 2 – Secure access by using Azure AD – Configure access reviews

This will be end of Section 2 and the ending will done with Access Reviews. What are Access Reviews? Access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User’s access can be reviewed…

Continue Reading Section 2 – Secure access by using Azure AD – Configure access reviews

Section 2- Secure access by using Azure AD – Implement passwordless authentication

Passwordless authentication is a hot topic, if You have a password it can be cracked or phished. In the last parts we enabled MFA so let’s continue from there. What is passwordless? Passwordless means that You sign-in without a password,…

Continue Reading Section 2- Secure access by using Azure AD – Implement passwordless authentication

Running PowerShell scripts under Azure Automation Accounts

Before You had to schedule PowerShell scripts from Your task scheduler inside servers or workstations but not that has changed, You can run Your favorite scripts directly from Azure with Automation Accounts and runbooks. What is Azure Automation Account? Azure…

Continue Reading Running PowerShell scripts under Azure Automation Accounts

Section 2 – Secure access by using Azure AD – Implement Azure AD Identity Protection

Still in section 2, there is a lot to write about. Now we are covering Identity protection. What is Identity Protection? Identity Protection uses the learnings Microsoft has acquired from their position in organizations with Azure AD, the consumer space…

Continue Reading Section 2 – Secure access by using Azure AD – Implement Azure AD Identity Protection

Section 2 – Secure access by using Azure AD – Implement Conditional Access policies, including multifactor authentication

First we will cover the solutions in hand. What is Conditional access? Conditional Access is based on conditions for a location, devices used, risks discovered. Here is an excellent picture from Microsoft which explain the flow. Licensing You need at…

Continue Reading Section 2 – Secure access by using Azure AD – Implement Conditional Access policies, including multifactor authentication

Section 2 – Secure access by using Azure AD – How to Configure Azure AD Privileged Identity Management (PIM)

This is part of section two for AZ-500 exam preparation. First we have to see what PIM is? Privileged Identity Management (PIM) provides a time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions to…

Continue Reading Section 2 – Secure access by using Azure AD – How to Configure Azure AD Privileged Identity Management (PIM)

Section 1 – Manage Azure Active Directory identities

This is the first section from study series for AZ-500 – Manage Azure Active Directory identities and starting with Create and manage a managed identity for Azure resources In my example I will use Virtual Machines, you can also use…

Continue Reading Section 1 – Manage Azure Active Directory identities