You can have cross-tenant workload identities authenticating using the secret or certificate from their home tenant.
Tag Archives: IdP
Joiners – Movers – Leavers (JML) Part 3
An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.
Building secure applications using modern authentication (part 4)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Building secure applications using modern authentication (part 3)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Building secure applications using modern authentication (part 2)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Building secure applications using modern authentication (part 1)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Passwordless Azure VM SSH login using FIDO2 security keys (Part 3)
Passwordless ssh to Azure VMs using FIDO2 security keys. *Part 3*.
Passwordless Azure VM SSH login using FIDO2 security keys (Part 2)
Passwordless ssh to Azure VMs using FIDO2 security keys. *Part 2*.
Passwordless Azure VM SSH login using FIDO2 security keys (Part 1)
Passwordless ssh to Azure VMs using FIDO2 security keys. *Part 1*.
Roles vs Groups
For an enterprise level solution that authorizes user access, use application roles as much as possible instead of security groups.