Azure servicesMicrosoft Technologies

Step-by-Step Guide to setup Just-in-Time VM Access in Azure

In most common scenarios hackers targets open ports in servers to gain access. It can be web server port, RDP ports, SQL ports etc. If genuine users also use same ports to access the system it’s hard to keep these ports closed. There are other methods such as firewalls that we can use to secure the access but it will still keep the ports open. when it comes to public clouds, its increase…
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Step-by-Step Guide: How to setup Entra ID Restricted management Administrative Units ?

Active DirectoryMicrosoft Technologies

Active Directory Federation Services (AD FS) – Part 3

This is the part 3 of the series of articles which explains about the AD FS and configuration. If you still not read the part 1 and 2 you can find it here. Active Directory Federation Services (AD FS) – Part 1 Active Directory Federation Services (AD FS) – Part 2 In this post let’s see how we can install AD FS web application proxy. As I explain on part 1 of the series, web…
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Step-by-Step Guide: How to setup Entra ID Restricted management Administrative Units ?