Azure servicesMicrosoft Entra ID

Step-by-Step Guide: Azure AD Authentication for Azure Point-to-Site (P2S) VPN (PowerShell Guide)

Azure AD authentication is supported for Azure Point-to-Site (P2S) VPN. This means we can use Azure AD features such as conditional access, user-based policies, Azure MFA with VPN authentication. In this Demo, I am going to demonstrate how to enable Azure AD authentication for Azure P2S VPN. As we go along, we will be working on the following tasks, • Setup Azure point-to-site VPN with native…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

Azure servicesMicrosoft Entra ID

Step-by-Step Guide: Enable Windows 10 password-less authentication with FIDO2 security keys (Azure AD + Microsoft Intune)

In my previous blog post, I explained how we can use FIDO2 security keys to perform password-less authentication with Azure AD. You can access it using Step-by-Step Guide: Azure AD password-less sign-in using FIDO2 Security keys We also can use FIDO2 security keys to sign-in to Azure AD Joined or Hybrid Azure AD Joined Windows 10 devices. In this demo, I am going to demonstrate how we can enable…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

Microsoft Entra ID

Step-by-Step Guide: Azure AD password-less sign-in using FIDO2 Security keys

Passwords are the most commonly used method to protect user identities in a system. This is applying to Active Directory as well. However, with growing data breaches, it is obvious that passwords are no longer strong. In Verizon Data Breach Investigations Report (2017), it says, 81% of hacking-related breaches used either stolen or weak passwords. So, if passwords are not safe, what else we can do…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes