Microsoft Entra Connect
Are you looking for information about Microsoft Entra Connect? In this archive you will find all our posts about Microsoft Entra Connect.
Microsoft Entra Connect: Migration to Application Based Authentication (ABA)
With the introduction of Application Based Authentication (ABA), Microsoft introduces modern authentication mechanisms to Microsoft Entra Connect. Previously, the synchronization service used a service account with a locally stored password to sign in to Microsoft Entra ID, an approach considered outdated and potentially vulnerable from a security perspective.
Microsoft Defender for Identity: Getting Started
Microsoft Defender for Identity (MDI) secures the on-premises Active Directory (AD) against identity threats as a cloud-based security solution. By thoroughly analyzing user activities and detecting complex attack vectors, Microsoft Defender for Identity (MDI) ensures comprehensive protection against identity compromises.
Microsoft Entra ID: Revoke User Access in an Emergency
At a time when digital security is becoming increasingly important, managing user access is a crucial factor in protecting sensitive data and resources. Microsoft Entra provides companies with powerful tools to control and monitor access to critical information and systems. Especially in critical situations, such as compromised user accounts or employee departures, it is essential to quickly and securely revoke access to minimize potential security risks.
Kerberos Cloud Trust and Windows Hello for Business: Secure and Seamless Authentication in Hybrid Environments
Kerberos Cloud Trust is a hybrid authentication protocol developed by Microsoft to enable secure and passwordless sign-ins. Kerberos Cloud Trust combines the strengths of Kerberos and Windows Hello for Business to offer a modern, secure, and user-friendly authentication solution. It is particularly useful in hybrid environments where both cloud and on-premises resources are utilized. Users authenticate securely and seamlessly both locally and in the cloud.
Microsoft Entra ID: Automatically Roll Over Kerberos Decryption Key
The regular roll over of the Kerberos decryption key is crucial to ensure the security and integrity of seamless Single Sign-On (SSO) in hybrid IT environments. Microsoft recommends rolling over this key every 30 days to close potential security gaps and ensure smooth integration between on-premises Active Directory and Microsoft Entra ID. This process can be automated to minimize administrative effort and ensure continuous security.