External Collaboration Settings with Application Permissions
External Collaboration Settings with Application Permissions Managing guest user invitations in Entra ID can be complex, especially when balancing collaboration…
External Collaboration Settings with Application Permissions Managing guest user invitations in Entra ID can be complex, especially when balancing collaboration…
A Comprehensive Guide and Simplified Results for Non-Technical Stakeholders – Using Maester and HRProvisioningTests to Unit Test Your HR DrivenProvisioning…
Table of Contents Introduction Design Steps Validation Checks Introduction We need to enable communication between two instances in separate VPCs.…
Table of Contents Introduction Design Steps Validation Checks Introduction NAT Gateway can be used to allow outbound access from private…
AWS Cookbook 2.2 Creating a Network Tier with Subnets and a Route Table in a VPC Here’s the Table of…
Table of Contents Introduction Design Steps Set variables for the deployment Create and Tag VPC Create Subnets, Route Tables and…
AWS Cookbook 2.1 Defining your private virtual network in the Amazon Cloud Design Solution Create a VPC with an IPV4…
AWS CookBook 1.6 Connecting to EC2 Instances using AWS SSM Session Manager #aws/cookbook/security AWS CookBook 1.6 Connecting to EC2 Instances…
AWS CookBook 1.5 Delegating IAM Administrative Capabilities using Permission Boundaries #aws/cookbook/security AWS CookBook 1.5 Delegating IAM Administrative Capabilities using Permission…
AWS CookBook 1.3: Enforcing IAM User Password Policies in Your AWS Account #aws/cookbook/security Problem Your Security Policy requires that you…
AWS CookBook 1.1 : Creating and Assuming an IAM Role for Developer Access #aws/cookbook/security AWS CookBook 1.1 : Creating and…
Deploying Serverless Architecture AWS Cloud Resume Challenge – Deploying Serverless Architecture in AWS Cloud: AWS Cloud Resume Challenge Step 1…
Unlocking the Mysteries of Entra PowerShell Connector, A Beginner’s Guide to Entra ID Powershell Connector – Entra Powershell Connector for…
Managing Claim Mapping Policies with Microsoft Graph API Identity and Access Management (IAM) Engineer, I grapple with a crucial challenge:…
Simplifying the Conversion of External Users to Internal Users in Entra ID – Simplifying the Conversion of External Users to…
Creating a Custom Claims Provider with LDAP Integration – How to add claims from external systems in Entra ID token…
Powershell Connector for EntraID Table of Contents Introduction Prerequisites Entra ID PowerShell Connector Setup On-Premises Agent Setup Powershell Connector Setting…
Require Re-authentication for Registering Security Info Microsoft deserves commendation for its relentless efforts in pushing organizations to adopt stronger authentication…
Require Sign in every time a user activates role membership in Entra ID One of the most common Privileged Identity…
Authentication Context Sign-in EveryTime – Require Sign in every time a user activates role membership in Entra ID One of…
Containerization using Docker for IIQ – A Primer – Containerization using Docker for IIQ Containerization using Docker has become increasingly…
Enforce Best Practices for Azure AD Applications using Terraform and Entra ID – Customize your Entra ID Tenant with Directory…
Enforce Best Practices for Azure AD Applications using Terraform and Entra ID – Prevent Overpriviliged Application Creation and tie it…
Automatically Update Dynamic Group Membership Rules to Ensure Offboarding Users Are Removed – Keep Your Groups Compliant: Automate Offboarding with…
Creating a Custom Claims Provider with LDAP Integration – How to add claims from external systems in Entra ID token…
Creating Custom Github Actions for the new Entra Inbound Provisioning API for automatic user provisioning – Creating Custom Actions for…
Deploy , Manage and Monitor Conditional Access using Terraform and GitHub Actions – Deploy Conditional Access Policies for a Zero…
Demystifying API Authentication – Table of Contents Introduction Diagram Steps Entra ID Implementation Register an Application in Azure AD to…
Unlocking Secure and Automated Deployment of Conditional Access Policy – Simplifying GitHub Authentication with Entra ID Federated Credentials: Terraforming Conditional…
Reduce the Risk of Unauthorized Access with JITAA – Just In Time Application Administration Using PIM in Microsoft Entra ID…
A step-by-step guide to securing your local administrator passwords with LAPS – How to Implement and Manage LAPS for Microsoft…
Understanding the Impact of Entra ID Alternate Login ID on OAuth/OIDC Tokens – Entra ID Alternate Login ID: A Useful…
Zero Trust Network Access with Entra ID Private Access – Securing Legacy Applications with Entra Private Access and Conditional Access…
The Next Generation of Provisioning for Enterprise IAM – Part 2 Continuing the same discussion from my Previous article The…
Introducing the Azure AD Bulk Upload API, The Next Generation of Provisioning for Enterprise IAM – Replacing MIM: Introducing the…
? Restricting Access to User Data in Entra ID (Azure AD) ? Let’s address one of the key concerns: default…
Custom Security Attribute in Microsoft Graph Powershell This is a PowerShell function that creates custom security attributes in Azure Active…
Terraform Associate Exam Practice Questions – Terraform Associate Level Questions Part 2 How many ways you can assign variables in…
Terraform Associate Exam Practice Questions – Terraform Associate Level Questions Part 1 What is idempotent in IAC? In the context…
Automate provisioning and governance of your on-premises applications – SCIMming into the Future: Provisioning On-Premises Apps with Azure AD Identity…
Don’t leave your Azure AD environment vulnerable – Take action to secure it now! – Tutorial : Require Step Up…
Securing Azure Cloud Environment with Terraform and Microsoft Defender – Enabling Microsoft Defender for Cloud Plan using Terraform Terraform is…
Automate provisioning and governance of your on-premises applications – SCIMming into the Future: Provisioning On-Premises Apps with Azure AD Identity…
How to Connect Users Across Multiple Tenants in a Multi-Tenant Organization – Cross Tenant Sync Cross-tenant synchronization is a new…
A Guide to Implementing Precise Access Control in Microsoft Azure – Azure Attribute-based Access Control (ABAC) As an organization expands,…
Exploring the Challenges and Benefits of Microsoft Identity Manager in Hybrid AD Environment – The Importance of Microsoft Identity Manager…