Author: Harri Jaakkonen

Azure (AD) recommendations with some explanations

This post is on recommendations, so here is my personal red alert type recommendation for all. You still have 83 days, give or take to establish a migration from ADAL to MSAL. Read from more Learn In the past months…

Continue Reading Azure (AD) recommendations with some explanations

Azure Arc with Defender for cloud

Deploying external server to Defender for Cloud Deploying those servers can be done with the following methods: And this is the reason we are talking about Arc as an onboarding tools. See more here But as many use Azure for…

Continue Reading Azure Arc with Defender for cloud

Microsoft certification changes and study materials

Microsoft rebranded their Learn during last year, now it has a fresh new look. Future-proofing your career Microsoft certifications are crucial component for you personally and for the organizations you present. Many organizations have good compensation for skilling-up and they…

Continue Reading Microsoft certification changes and study materials

Azure AD External Identities with SAML IdP part 1 of 2

In the picture above, you can see how Conditional Access will evaluate those guest users. The majority of users who are typically thought of as guests fall into this category. This B2B collaboration user has guest-level access in your organization…

Continue Reading Azure AD External Identities with SAML IdP part 1 of 2

Power Platform and customer-managed encryption key (preview) with some HSM

This is huge for all the Power Platform users. Now you can use Key vault to store your key, if you aren’t familiar with concept of Key vault, let me open it a bit. What features will be supported? Power…

Continue Reading Power Platform and customer-managed encryption key (preview) with some HSM

Azure AD Privileged Identity Management and new features

What is PIM? PIM has and will be a backbone for permission Just In Time access in Microsoft based environments. You can easily assign Permanent roles but also Eligible roles for admins and define timeout for the roles. They either…

Continue Reading Azure AD Privileged Identity Management and new features

Section 4 – Mitigate identity threats part 2 of 2

Identity protecting is challenging if you don’t know what you should protect and when you do, you should know how to protect it. In the second part we will be discovering more on Conditional Access as a dynamic boundary in…

Continue Reading Section 4 – Mitigate identity threats part 2 of 2