Skip to content

The Cyber Security, Compliance & Cloud

Cyber Security | Digital Transformation | Cloud Computing

  • Home
  • About Me
  • Contact Me:

Tag: Identity Access Management

Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault

December 13, 2022 Babar Zia Azure, Certificates, CyberSecurity

The certificates can be public and private Secure Sockets Layer (SSL)/Transport Layer Security (TLS) certificates signed by a certificate authority

Continue reading

FIDO – FIDO2: an open authentication standard

June 20, 2022 Babar Zia AD, Azure, Cloud, CyberSecurity, Security

FIDO2 is an open authentication standard hosted by the FIDO Alliance that consists of the W3C Web Authentication specification (WebAuthn

Continue reading

Cross-Domain Identity management

June 9, 2022 Babar Zia AD, Microsoft

The System for Cross-domain Identity Management (SCIM) specification is designed to make managing user identities in cloud-based applications and services

Continue reading

Azure Multifactor Authentication MFA and Conditional Access

January 9, 2019 Babar Zia tech

Two-step verification is important for modern workplaces especially when employees are working remotely more and more, organisation boundaries are limitless,

Continue reading

Moving Migrating from DirSync or FIM to Azure Active Directory Connect sync

October 18, 2018 Babar Zia AD, ADFS, Azure, Cloud, Office365, Security, SERVER Leave a comment

Azure AD Connect sync is the successor of DirSync, Azure AD Sync, and Forefront Identity Manager with the Azure Active

Continue reading

Azure Active Directory AD/ Identity Access Management; Migration from On Premise AD to the Azure AD

October 18, 2018 Babar Zia AD, Azure, Cloud, migration Leave a comment

Azure Active Directory is not designed to be the cloud version of Active Directory. It is not a domain controller

Continue reading

Categories

ADADFSAmazonAppleAppsArticlesAWSAzureAzure PolicyAzure PurviewbackupCertificatesCiscoCloudComplianceCyberSecuritydamwaredataData GovernanceDigital ForensicexcelExchangeflashflexGPOHadoopHPInformation ProtectionIntelligent securityJSON

Recent Posts

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types

Top Cyber Security Posts

Datbricks vs SQL Server

April 14, 2023

Designing SQL Database in Azure

February 21, 2023

Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault

December 13, 2022

FIDO – FIDO2: an open authentication standard

June 20, 2022

Build next-generation security operations with Azure Sentinel

December 16, 2020

How to Apply Microsoft Information Protection’s (MIP) sensitivity labels to Azure assets in Azure Purview

December 4, 2020

Unknown Feed

WordPress Theme: Tortuga by ThemeZee.