Explore >> Select a destination


You are here

aadinternals.com
| | blog.xpnsec.com
3.1 parsecs away

Travel
| | Originally presented at SOCON-2024, and continuing the series into post-exploitation techniques against Identity Providers, in this blog post we'll look at Ping, OneLogin and Entra ID. I'll discuss how post-exploitation techniques effective against Okta apply to other providers, release new tools for post-exploitation, and look at what proves to be effective when critical assets lie beyond an Identity Provider portal.
| | dirteam.com
4.3 parsecs away

Travel
| | Most Microsoft-based Hybrid Identity implementations use Active Directory Federation Services (AD FS) Servers, Web Application Proxies and Azure AD Connect installations. In this series, labeled Hardening Hybrid Identity, we're looking at hardening these implementations, using recommended practices. In this part of the series, we'll look at the benefits of implementing Azure AD Connect with a [...]
| | www.cloudpartner.fi
2.2 parsecs away

Travel
| | And to the next section from SC-300 study guide, now covering: implement and manage Azure Active Directory Connect (AADC)implement and manage Azure AD Connect cloud syncimplement and manage Passwor...
| | homepressurecooking.com
28.0 parsecs away

Travel
| Our Affiliate Disclosure explains how partnerships enrich our content while supporting HomePressureCooking.com, all with your interests in mind.