In most common scenarios hackers targets open ports in servers to gain access. It can be web server port, RDP ports, SQL ports etc. If genuine users also use same ports to access the system it’s hard to keep these ports closed. There are other methods such as firewalls that we can use to secure the access but it will still keep the ports open. when it comes to public clouds, its increase…
This is the part 3 of the series of articles which explains about the AD FS and configuration. If you still not read the part 1 and 2 you can find it here.
Active Directory Federation Services (AD FS) – Part 1
Active Directory Federation Services (AD FS) – Part 2
In this post let’s see how we can install AD FS web application proxy. As I explain on part 1 of the series, web…