Active Directory Fundamentals

Migrating from AD FS to Azure AD SSO

Many organizations built their hybrid identity strategy around Active Directory Federation Services (AD FS) for single sign-on (SSO). Today, Microsoft Entra ID (formerly Azure AD) can deliver the same sign-in experience for most apps—often with less infrastructure, lower operational overhead, and better native controls like Conditional Access. This guide walks you through a practical…
Read more
Active Directory FundamentalsActive Directory PoliciesUncategorized

Role-based access control (RBAC) in Azure

Azure RBAC is the authorization system used to control who can do what across Azure resources. It is designed to keep access granular, auditable, and aligned to real operational responsibilities—without turning permissions into a messy pile of one-off exceptions. In practice, Azure RBAC works best when it is treated as an operating model, not a one-time configuration task: define roles clearly…
Read more
Active Directory Fundamentals

Federation strategies using Entra

Federation is still a critical tool in hybrid identity—but the “best” federation strategy depends on what you’re trying to achieve: modern SSO for SaaS, partner access, legacy app support, or a phased retirement of AD FS. This guide explains practical federation patterns using Microsoft Entra ID, how to choose between them, and how to implement them safely. …
Read more
Active Directory Fundamentals

Tracking privilege escalation in Azure AD

Tracking Privilege Escalation in Azure AD (Microsoft Entra ID) Privilege escalation in Microsoft Entra ID (formerly Azure AD) rarely looks like a single “hacker flips a switch” moment. In real environments, it’s usually a chain of small, legitimate-looking changes—role assignments, consent grants, group membership edits, Conditional Access exceptions, or…
Read more
Active Directory Fundamentals

Zero Trust architecture with Entra at the core

Zero Trust Architecture with Microsoft Entra at the Core Zero Trust is not a product you “turn on.” It’s an operating model for security where every access request is treated as hostile until proven otherwise. The big shift is psychological and architectural: you stop trusting network location (VPN, office LAN, “inside”) and you start trusting verified identity +…
Read more