Identity configuration recommendations for MSSPs.
Category Archives: identity
Review any “Don’t know” reviewees prior to the end of an access review
Steps to create access reviews that meet strict compliance requirements by allowing auditors to review any “Don’t know” reviewees prior to the end of a review.
My adventures (so far) with verifiable credentials.
Sharing my initial experience with verifiable credentials.
No, really, you don’t need that access
CloudKnox initial setup and the incredible value it brings to organizations and the security professionals working hard to keep them secure.
Cross-tenant workload identities with a single secret
You can have cross-tenant workload identities authenticating using the secret or certificate from their home tenant.
Joiners – Movers – Leavers (JML) Part 4
An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.
Joiners – Movers – Leavers (JML) Part 3
An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.
Joiners – Movers – Leavers (JML) Part 2
An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.
Joiners – Movers – Leavers (JML) Part 1
An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.
Building secure applications using modern authentication (part 4)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.