Symantec released their latest Internet Security Threat Reportin early June. This report includes data about infrastructure threats for year 2016. It says, for year 2016, near 1.1 billion identities has been exposed. Also for last 8 years total identity breach is around 7.1 billion which is almost equal to total world population.
In Identity infrastructure breach, most of the time…
When it comes to manage access to resources in infrastructure, there are two main questions we usually ask.
“Who” is the user and “What” resources?
Is it allow or deny access?
Answers to above questions are enough to define the base rules. But depending on the tools and technologies that can use to manage the access, we will have additional questions which will…
In Part 01 of this series I have explained what is Azure AD application proxy and how it works. If you didn’t read it yet you can find it in http://www.rebeladmin.com/2017/06/azure-active-directory-application-proxy-part-01/
In this part of the series I am going to demonstrate how we can configure Azure AD application proxy.
Demo Setup
In my demo environment I have following,
1. Azure AD…
Azure Active Directory Application Proxy another great feature which comes with Azure Active Directory. Rebeladmin Corp. does have a CRM application which use by its employees. This is web based app and hosted in internal network. This app uses windows authentication. From internal, users can log in to it with SSO. Rebeladmin Corp. also uses some application hosted in Azure as well as Office…