Category: Entra ID

Entra ID vs. Okta: Choosing the Right IAM Solution for Your Organization

In today’s hybrid and multi-cloud world, identity and access management (IAM) is the foundation of enterprise security. With cyber threats on the rise and the workforce increasingly distributed, having a robust IAM solution is not a luxury—it’s a necessity. While…

Continue Reading Entra ID vs. Okta: Choosing the Right IAM Solution for Your Organization

Exploring Microsoft Azure’s Security Technical Capabilities

Why security is important? In today’s digital landscape, securing cloud environments is more critical than ever. Microsoft Azure provides a comprehensive set of security capabilities designed to help organizations protect their workloads, data, and identities. From identity management to threat…

Continue Reading Exploring Microsoft Azure’s Security Technical Capabilities

Manage guest user lifecycle in Entra ID

Managing Guest User Lifecycle in Microsoft Entra Guest users play a crucial role in modern organizations, enabling external collaboration while maintaining security and governance. However, managing their lifecycle effectively is essential to prevent unnecessary access and security risks. Microsoft Entra…

Continue Reading Manage guest user lifecycle in Entra ID

Identity verification via Persona

Adding a verification to your LinkedIn profile is not mandatory. Name matching: The name on your government-issued ID (e.g., passport) must match the name on your LinkedIn profile. If you have a LinkedIn profile in another language, the name on…

Continue Reading Identity verification via Persona

AZ-500 Study guide – Section 2 – Manage identity and access – Manage Microsoft Entra authentication​

Implement multi-factor authentication (MFA) What is Multifactor Authentication (MFA)? MFA adds an extra layer of security by requiring a second form of identification during sign-in, like a code on your phone or fingerprint scan. This makes it harder for attackers…

Continue Reading AZ-500 Study guide – Section 2 – Manage identity and access – Manage Microsoft Entra authentication​

AZ-500 Study guide – Section 1 – Manage identity and access – Manage Microsoft Entra identities​

​ Here we go again. Study guides, oh those study guides, don’t you just love them. Microsoft is making their own, excellent guides but my idea is to make them little bit better. So sit back and enjoy! ​ Secure…

Continue Reading AZ-500 Study guide – Section 1 – Manage identity and access – Manage Microsoft Entra identities​

Bring Your Brand to Sign-Ins: Enable Custom Domains for External ID

What it is This feature allows you to replace Microsoft’s default domain name with your own custom domain for your applications’ sign-in endpoints in Microsoft Entra External ID for external tenants. This enhances your brand consistency during user sign-in. Important…

Continue Reading Bring Your Brand to Sign-Ins: Enable Custom Domains for External ID

External authentication method (EAM) in Entra

Supported providers Microsoft announced at RSA Conference 2024 integration with these identity providers as launch partners: DUO Duo MFA, also known as Cisco Duo Multi-Factor Authentication, is a cloud-based security solution that adds an extra layer of verification to the…

Continue Reading External authentication method (EAM) in Entra

Multi-tenant management in Microsoft Defender

Struggling to keep up with security across multiple organizations? Multi-tenant management in Microsoft Defender XDR streamlines your workflow, giving you a single pane of glass for all your tenants. This translates to faster threat detection, improved response times, and a…

Continue Reading Multi-tenant management in Microsoft Defender

Deep Dive into Conditional Access Policies

Entra ID Conditional Access Policy Evaluation: A Breakdown Phase Description Applies To 1: Signal Collection Gathers information about the user’s access attempt.Examples: Network location (IP address), device identity (type, OS version). Applies to all enabled Conditional Access policies, including those…

Continue Reading Deep Dive into Conditional Access Policies