Sharing my initial experience with verifiable credentials.
Tag Archives: AAD
No, really, you don’t need that access
CloudKnox initial setup and the incredible value it brings to organizations and the security professionals working hard to keep them secure.
Cross-tenant workload identities with a single secret
You can have cross-tenant workload identities authenticating using the secret or certificate from their home tenant.
Joiners – Movers – Leavers (JML) Part 4
An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.
Joiners – Movers – Leavers (JML) Part 3
An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.
Joiners – Movers – Leavers (JML) Part 2
An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.
Joiners – Movers – Leavers (JML) Part 1
An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.
Building secure applications using modern authentication (part 4)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Building secure applications using modern authentication (part 3)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Building secure applications using modern authentication (part 2)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.