As you might have seen, last week Microsoft Press published Vittorio Bertocci’s Modern Authentication with Azure Active Directory for Web Applications, an authoritative, deep-dive guide to building Active Directory authentication solutions. Yesterday Microsoft happy to share the book’s Foreword, by Mark Russinovich (Chief Technology Officer for Microsoft Azure), in which Mark describes the importance of Azure AD: “Microsoft Azure Active Directory (Azure AD) is arguably the heart of Microsoft’s cloud platform. All Microsoft cloud services, including Microsoft Azure, Microsoft Xbox Live, and Microsoft Office 365, use Azure AD as their identity provider. And because Azure AD is a public cloud...
Azure Active Directory was averaging just over 1 billion authentications a day.
Today Microsoft averaging over 1.3B authentications a day:
Microsoft Identity Manager 2016 offers a comprehensive solution for managing identities, credentials, and identity-based access policies across heterogeneous environments. MIM empowers users with self-service password reset and embeds self-help tools in Office and Windows so users can manage routine aspects of identity and access, gives IT professionals rich administrative tools and enhanced automation, and delivers .NET, REST and Web Services-based extensibility for developers.
Mobile apps are a popular method for receiving a multi-factor authentication request. To provide your users with a better app experience, Microsoft have recently released a new version of the Azure Authenticator.
Microsoft Security Advisory 3062591 is offering the Local Administrator Password Solution (LAPS) that provides a solution to the issue of using a common local account with an identical password on every computer in a domain. LAPS resolves this issue by setting a different, random password for the common local administrator account on every computer in the domain. Domain administrators using the solution can determine which users, such as helpdesk administrators, are authorized to read passwords.
a updated public preview of Microsoft Identity Manager (MIM, the product formerly known as Forefront Identity Manager) is now available.
For more Details follow the link below:
Microsoft Active Directory uses Kerberos to handle authentication requests by default. However, if the domain is compromised, how bad can it really be? With the loss of the right hash, Kerberos can be completely compromised for years after the attacker gained access.
An Interesting Video by Alva Duckwall and Benjamin Delpy
Recently, I happened to attend on the Dynamics AX identity , working with strong authentication protocol , the standard configuration option allows by default the NTLM mix with Kerberos.
At AX 2009/2012R2/2012R3 versions, We can configure to Kerberos Authentication only .
The link below guide and describes how to implement it:
Earlier this week Microsoft announced that they turned on support in there Azure MFA server for One Time Passwords of SMS, the #1 feature customers have asked them to add.
for more details follow the link below: