When organizations want to use same user name and passwords to log in to on-premises and cloud workloads (azure), there are two options. One is to sync user name and password hashes from on-premises active directory to azure AD. Other option is to deploy ADFS farm on-premises and use it to authenticate cloud based logins. But it needs additional planning and resources. On-premises AD uses hash…
Healthy SYSVOL replication is key for every active directory infrastructure. when there is SYSVOL replication issues you may notice,
1. Users and systems are not applying their group policy settings properly.
2. New group policies not applying to certain users and systems.
3. Group policy object counts is different between domain controllers (inside SYSVOL folders)
4. Log on scripts…
Symantec released their latest Internet Security Threat Reportin early June. This report includes data about infrastructure threats for year 2016. It says, for year 2016, near 1.1 billion identities has been exposed. Also for last 8 years total identity breach is around 7.1 billion which is almost equal to total world population.
In Identity infrastructure breach, most of the time…
When it comes to manage access to resources in infrastructure, there are two main questions we usually ask.
“Who” is the user and “What” resources?
Is it allow or deny access?
Answers to above questions are enough to define the base rules. But depending on the tools and technologies that can use to manage the access, we will have additional questions which will…