Freshly brewed with Microsoft Azure and Microsoft 365

Tag: Multi-Factor Authentication Page 3 of 5

Are you looking for information about Multi-Factor Authentication in Microsoft Azure and Microsoft 365? In this archive you will find all our posts about Multi-Factor Authentication.

Microsoft Entra Privileged Identity Management (PIM) and FIDO2: Increasing the security of privileged roles

Privileged roles and permissions in Microsoft Entra ID allow you to manage all aspects of Microsoft Azure and Microsoft 365. To make phishing and other attacks more difficult, a secure password for privileged Microsoft Entra roles is no longer enough. Phishing-resistant multi-factor-authentication, such as FIDO2 protocol on a security key in combination with Microsoft Entra Privileged Identity Management (PIM), significantly increases security for the Microsoft Tenant and convenience for the user.

Secure Emergency Access: Create and Manage Microsoft Entra Emergency Accounts with YubiKey (FIDO2)

A Microsoft Entra emergency access account, also known as a “Break Glass Account”, is a special account set up for accessing Azure resources in emergency situations. This account typically has higher permissions and is only used when conventional access routes are not available. This could be, for example, a service outage, so that no multi-factor authentication can be performed via a mobile phone. The use of emergency accounts is strictly controlled, monitored, and restricted.

Microsoft Entra Private Access: secure access to internal resources and cloud services without VPN

Microsoft Entra Private Access gives users secure access to the internal network and cloud-based services from anywhere in the world. Setting up and maintaining (complex) VPN connections is now a thing of the past. Microsoft Entra Private Access is part of Microsoft Global Secure Access, which includes a range of identity and network access security products. The service is based on the SASE framework (Secure Access Service Edge), which combines WAN functions and zero-trust network access (ZTNA) in a cloud-based platform.

Microsoft Authenticator App: Improve security with number matching

The use of multi-factor authentication is considered one of the most secure methods to protect an account and is therefore recommended by pretty much every provider by now. Due to this fact, the user receives many multi-factor authentication requests every day, which are probably no longer considered carefully and are approved out of habit.
Microsoft introduces number matching, a method that can prevent blind approval of the request.

For existing users with the Microsoft Authenticator App, number matching will be enabled by default on February 27, 2023.
The following tutorial will immediately enable number matching and therefore increase login security.

Page 3 of 5

Powered by WordPress & Theme by Anders Norén