Identity Management

  • Blog
  • Identity Management

LATEST

microsoft security hero approved

What is Azure AD B2C?

Last Update: Feb 12, 2024

Azure Active Directory (Azure AD) B2C is a cloud-based customer identity and access management service that provides business-to-customer (B2C) Identity-as-a-Service. It allows organizations to secure and manage their customer-facing applications – so external parties can seamlessly sign up and log in. Learn more about the features and benefits of Azure AD B2C below. What is…

View Article
Security hero image

What is Azure AD B2B?

Discover the benefits of using Azure AD B2B in your organization. Learn how it can improve collaboration and streamline access for external partners, and boost your users’ productivity, safely and securely. What is Azure B2B? Microsoft Entra B2B (formerly Azure AD B2B) is a feature/service within the Microsoft Entra ID that allows collaboration between your…

View Article
Network Security

Enhanced Data Governance: Microsoft Purview Now Supports Scanning Fabric Items

Microsoft has recently added support for Fabric items to its Microsoft Purview service. The new feature allows IT admins to scan a Fabric tenant and view metadata and lineage from Fabric items such as Power BI. Microsoft Fabric is a new end-to-end data and analytics platform built on Microsoft’s OneLake Data Lake. It offers various…

View Article
Security hero image

Azure Active Directory Flavors

Last Update: Feb 07, 2024

Sjoukje Zaal gives an overview of the different flavors of Azure Active Directory.

View Article
Security

Microsoft Entra Verified ID Gets Face Check Support for Enhanced Identity Verification

Microsoft has introduced new Face Check support to its Entra Verified ID service. The feature allows organizations to verify a user’s identity by matching their selfie with trusted documents like government IDs or employee credentials. Microsoft Entra Verified ID is a managed service based on open standards that is used to create free verifiable credentials….

View Article
Security

Five Tactics Towards Achieving Zero Trust with Azure Active Directory

Last Update: Feb 01, 2024

For any modern enterprise that uses Azure Active Directory (now Microsoft Entra ID) to manage user and service access to cloud resources, it’s hard to escape the term Zero Trust (ZT), which implies that your organization must have a layered approach to security. In this article, you’ll learn about five Microsoft Zero Trust tactics for…

View Article
Datacenter networking servers

Best Practices for Installing Active Directory Domain Controllers in a Virtual Machine

Last Update: Feb 01, 2024

Installing Active Directory domain controllers in a virtual machine (VM) can be useful if you want to separate them from the physical network, giving you more flexibility and additional protection for your Active Directory infrastructure. In this guide, we’re going to detail the best practices for installing Active Directory domain controllers (DCs) in a virtual…

View Article
Windows Logo

Microsoft Entra ID Gets Advanced Customization Options for Certificate-Based Authentication

Microsoft has released a new update for its Entra ID Conditional Access service that provides more granular controls over certificate-based authentication (CBA) methods. The advanced CBA options are currently in preview, allowing access to specific resources based on certificate Issuer or Policy Object Identifiers (OIDs) properties. Microsoft Entra ID Conditional Access is a service that…

View Article
Cloud Computing

How to Audit LDAP Signing in an Active Directory Domain

Last Update: Jan 30, 2024

Microsoft is planning to make changes to LDAP security settings in Windows Server. In today’s Ask the Admin, I show you how to audit for unsigned LDAP traffic hitting Windows Server Active Directory.

View Article
Security hero image

Active Directory Security – 5 Steps to Secure AD

Last Update: Jan 30, 2024

In this guide about Active Directory security, we’re going to detail five steps that IT admins need to follow to secure Active Directory environments in an organization. There are many best practices you’ll need to be familiar with to ensure Active Directory security, including restricting the use of privileged accounts, monitoring Windows Event Log for…

View Article
Go to page