Author: Harri Jaakkonen

Section 5 – Implement platform protection – Implement advanced network security – Azure Firewall

Time for the next part in the AZ-500 study preparation guide. This time were looking at: Create and configure Azure Firewall Create and configure Azure Firewall Manager What is Azure Firewall? Azure Firewall is a cloud-native and intelligent network firewall…

Continue Reading Section 5 – Implement platform protection – Implement advanced network security – Azure Firewall

Azure AD Verifiable Credentials (PowerShell version)

In this blog post I will cover the setup Verifiable Credentials but first. What are Verifiable credentials? We use IDs in our daily lives. We have drivers licenses that we use as evidence of our ability to operate a car….

Continue Reading Azure AD Verifiable Credentials (PowerShell version)

AAD Connect multi-tenant sync now available

Couple of months ago I wrote about multi-tenant sync when it was still in public preview. So what has changed after it’s globally available? Before the documentation was stating: It is not supported to use the same custom domain name…

Continue Reading AAD Connect multi-tenant sync now available

Section 5 – Implement platform protection – Implement advanced network security – Hybrid and virtual networks

In this part we will be discover the following: Secure the connectivity of hybrid networks Secure the connectivity of virtual networks Best practices for securing Your networks: There is a lot more than these but these are a good way…

Continue Reading Section 5 – Implement platform protection – Implement advanced network security – Hybrid and virtual networks

Azure AD certificate-based authentication (Preview) + Publishing CRL with Application Proxy

Azure AD CBA allows user to sign-in with a certificate. Microsoft has removed the need for external ADFS federation. You can see the situation before this change from Sami Lamppu’s post. Feature highlights Facilitates onboarding to Azure quickly without being…

Continue Reading Azure AD certificate-based authentication (Preview) + Publishing CRL with Application Proxy

Section 4 – Manage access control

This is the next section from AZ-500 study guide, now I’m concentrating on the following topics: Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Interpret role and resource permissions Assign built-in Azure AD roles Create and…

Continue Reading Section 4 – Manage access control

Cross-tenant access settings (Preview)

Cross-tenant access settings in now in preview. You can use cross-tenant access settings to manage collaboration with external Azure AD organizations but for non-Azure AD organizations, use collaboration settings. https://portal.azure.com/#blade/Microsoft_AAD_IAM/AllowlistPolicyBlade What is Cross-tenant access? External Identities cross-tenant access settings to…

Continue Reading Cross-tenant access settings (Preview)

Section 3 – Manage application access

This is the last part of section 3 and will cover two topics: Manage API permissions to Azure subscriptions and resources Configure an authentication method for a service principal Manage API permissions to Azure subscriptions and resources What is Azure…

Continue Reading Section 3 – Manage application access

Information barriers, the GUI experience (Public preview)

This pic above is exactly the opposite of how information barriers work. So how it works? When information barrier policies are in place, people who should not communicate or share files with other specific users won’t be able to find,…

Continue Reading Information barriers, the GUI experience (Public preview)