Showing Post From Azure AD
Zero Trust Common Identity and Device Access Protection
This is the 3rd step in the series Zero to Zero Trust in an automated way. In the previous steps, we configured an emergency account and protected the account with conditional access policies.
Read moreProtect Privileged Accounts the Zero Trust Way Automated
Identities are the key to environments and must be configured as securely as possible. To achieve this goal, conditional access policies are indispensable. In this blog post, I show how to secure privileged accounts that need more attention than MFA only.
Read moreConfigure Break Glass Accounts Infrastructure Automated
Nowadays a good cloud environment has strict security policies. Well-known policies are conditional access policies. Policies that require a compliant device before login for example or forcing MFA.
Read moreAutomate user sign-in experience with company branding
Recently Microsoft redesigned the company branding functionality. That means you have more flexibility in the main layout, full-screen background image for example. But also the ability to change the header, footer and even link relating to self-service password reset, privacy & cookies or Terms of Use.
Read moreDisable user tenant creation
It looks like Microsoft has added a new option that allows users to create tenants. Some people have seen the Tenant Creation option in the regular Azure portal but was removed fast.
Read moreUse internal main.iam.ad API with Logic Apps
This blog post is a follow-up to my post about using the hidden API in automation. In that post, I explained how to authenticate to the https://main.
Read moreUse internal main.iam.ad API in automation
We all know the Graph API, graph.microsoft.com, and the Azure management API, management.azure.com. Both APIs are used very often and lots of automation tasks depend on those APIs.
Read moreDeploy and monitor conditional access authentication strength automated
Conditional access is an indispensable configuration setting in Azure AD. Conditional Access policies are in basic if-then statements, if a user wants to access a resource, then they must complete an action.
Read more