Azure services

Step-by-Step guide to configure risk-based azure conditional access policies

Some time ago I wrote this article about sign-in risk-based conditional access policies. But things have been changed over time and I thought it is time to update it with new content. The updated post can access using  https://www.rebeladmin.com/2020/11/step-by-step-guide-how-to-configure-sign-in-risk-based-azure-conditional-access-policies/ In my previous blog posts about conditional access…
Read more

Microsoft Entra Permissions Management – Part 01 – Azure Subscription Onboarding

Step-by-Step Guide : Automate JML(Joiners/Movers/Leavers) process with Microsoft Entra lifecycle workflows

Azure servicesMicrosoft Technologies

Step-by-Step guide to enable MFA for applications using Azure conditional access

Azure AD conditional access allows to apply MFA (multi factor authentication) rules per application based on groups, locations, sign-in risks. In this demo I am going to show how we can create conditional access policy to control MFA per application. 1) As first step, I am logging in to https://portal.azure.comas global admin. 2) Then go to Azure Active Directory 3) Then click…
Read more

Microsoft Entra Permissions Management – Part 01 – Azure Subscription Onboarding

Microsoft Entra lifecycle workflows Part 02 - How to synchronize value for employeeHireDate attribute from on-premises Active Directory ?

Azure services

Step-by-Step guide to Azure Point-to-Site VPN

In one of my previous article, I explain how we can create site-to-site VPN connection between local network and azure virtual network. This VPN connection is initiated in your edge firewall or router level. But what if you connecting from remote location such as home? we can use point-to-site method to do that. In this method it will use certificates to do the authentication between end point and…
Read more

Microsoft Entra Permissions Management – Part 01 – Azure Subscription Onboarding

Step-by-Step Guide : Automate JML(Joiners/Movers/Leavers) process with Microsoft Entra lifecycle workflows

Azure services

Step-by-Step Guide to Azure Firewall (Preview)

When it comes to network security, we use firewalls for perimeter defense. It helps to define security boundaries for infrastructure. There are many conversations about validity of perimeter defense against modern security threats as its more about identities now. However, firewall is still the most commonly used tool to control in & out communications in a network. In Azure so far, we…
Read more

Microsoft Entra Permissions Management – Part 01 – Azure Subscription Onboarding

Step-by-Step Guide : Automate JML(Joiners/Movers/Leavers) process with Microsoft Entra lifecycle workflows