An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.
Author Archives: Angelica Faber
Joiners – Movers – Leavers (JML) Part 1
An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.
Building secure applications using modern authentication (part 4)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Building secure applications using modern authentication (part 3)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Building secure applications using modern authentication (part 2)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Building secure applications using modern authentication (part 1)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Restrict downloads for sensitive (confidential) documents to only compliant devices
Yes, you can restrict file access within a folder. Keep reading to see how you can restrict downloads or other actions for specific files to only allow certain access from compliant devices.
Guest Access Reviews
A super simple way to review all guests with access to a tenant.
Passwordless Azure VM SSH login using FIDO2 security keys (Part 3)
Passwordless ssh to Azure VMs using FIDO2 security keys. *Part 3*.
Passwordless Azure VM SSH login using FIDO2 security keys (Part 2)
Passwordless ssh to Azure VMs using FIDO2 security keys. *Part 2*.