Category: Identity

Section 2 – Secure access by using Azure AD – Configure access reviews

This will be end of Section 2 and the ending will done with Access Reviews. What are Access Reviews? Access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User’s access can be reviewed…

Continue Reading Section 2 – Secure access by using Azure AD – Configure access reviews

Section 2- Secure access by using Azure AD – Implement passwordless authentication

Passwordless authentication is a hot topic, if You have a password it can be cracked or phished. In the last parts we enabled MFA so let’s continue from there. What is passwordless? Passwordless means that You sign-in without a password,…

Continue Reading Section 2- Secure access by using Azure AD – Implement passwordless authentication

Running PowerShell scripts under Azure Automation Accounts

Before You had to schedule PowerShell scripts from Your task scheduler inside servers or workstations but not that has changed, You can run Your favorite scripts directly from Azure with Automation Accounts and runbooks. What is Azure Automation Account? Azure…

Continue Reading Running PowerShell scripts under Azure Automation Accounts

Section 2 – Secure access by using Azure AD – Implement Azure AD Identity Protection

Still in section 2, there is a lot to write about. Now we are covering Identity protection. What is Identity Protection? Identity Protection uses the learnings Microsoft has acquired from their position in organizations with Azure AD, the consumer space…

Continue Reading Section 2 – Secure access by using Azure AD – Implement Azure AD Identity Protection

Section 2 – Secure access by using Azure AD – Implement Conditional Access policies, including multifactor authentication

First we will cover the solutions in hand. What is Conditional access? Conditional Access is based on conditions for a location, devices used, risks discovered. Here is an excellent picture from Microsoft which explain the flow. Licensing You need at…

Continue Reading Section 2 – Secure access by using Azure AD – Implement Conditional Access policies, including multifactor authentication

Section 2 – Secure access by using Azure AD – How to Configure Azure AD Privileged Identity Management (PIM)

This is part of section two for AZ-500 exam preparation. First we have to see what PIM is? Privileged Identity Management (PIM) provides a time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions to…

Continue Reading Section 2 – Secure access by using Azure AD – How to Configure Azure AD Privileged Identity Management (PIM)

Section 1 – Manage Azure Active Directory identities

This is the first section from study series for AZ-500 – Manage Azure Active Directory identities and starting with Create and manage a managed identity for Azure resources In my example I will use Virtual Machines, you can also use…

Continue Reading Section 1 – Manage Azure Active Directory identities

Azure storage accounts and how to secure them?

In the last part I explained what storage accounts are and how you can access them. In this part I will explain how to protect them from insider or external risks. Defender for storage Azure storage accounts are billed hourly….

Continue Reading Azure storage accounts and how to secure them?

Azure B2C with AFD and custom domain(s)

Be default Azure B2C comes with onmicrosoft.com login url. If you want to change it, you have to make use of custom domains via Azure Frontdoor. How to? Microsoft has an excellent article to establish this requirement. In the article…

Continue Reading Azure B2C with AFD and custom domain(s)

Storage accounts and the differences between SAS keys and Access keys.

Do you know how to secure your Storage Accounts? How about the differences between SAS keys and Access Keys? Some of you do but many of you don’t, so let me make an introduction to the differences. This is a…

Continue Reading Storage accounts and the differences between SAS keys and Access keys.