|
You are here |
aadinternals.com | ||
| | | | |
blog.xpnsec.com
|
|
| | | | | Originally presented at SOCON-2024, and continuing the series into post-exploitation techniques against Identity Providers, in this blog post we'll look at Ping, OneLogin and Entra ID. I'll discuss how post-exploitation techniques effective against Okta apply to other providers, release new tools for post-exploitation, and look at what proves to be effective when critical assets lie beyond an Identity Provider portal. | |
| | | | |
dirteam.com
|
|
| | | | | Most Microsoft-based Hybrid Identity implementations use Active Directory Federation Services (AD FS) Servers, Web Application Proxies and Azure AD Connect installations. In this series, labeled Hardening Hybrid Identity, we're looking at hardening these implementations, using recommended practices. In this part of the series, we'll look at the benefits of implementing Azure AD Connect with a [...] | |
| | | | |
www.cloudpartner.fi
|
|
| | | | | And to the next section from SC-300 study guide, now covering: implement and manage Azure Active Directory Connect (AADC)implement and manage Azure AD Connect cloud syncimplement and manage Passwor... | |
| | | | |
homepressurecooking.com
|
|
| | | Our Affiliate Disclosure explains how partnerships enrich our content while supporting HomePressureCooking.com, all with your interests in mind. | ||