|
You are here |
aadinternals.com | ||
| | | | |
www.cloudpartner.fi
|
|
| | | | | And to the next section from SC-300 study guide, now covering: implement and manage Azure Active Directory Connect (AADC)implement and manage Azure AD Connect cloud syncimplement and manage Passwor... | |
| | | | |
blog.xpnsec.com
|
|
| | | | | Originally presented at SOCON-2024, and continuing the series into post-exploitation techniques against Identity Providers, in this blog post we'll look at Ping, OneLogin and Entra ID. I'll discuss how post-exploitation techniques effective against Okta apply to other providers, release new tools for post-exploitation, and look at what proves to be effective when critical assets lie beyond an Identity Provider portal. | |
| | | | |
www.descope.com
|
|
| | | | | This blog will cover an authentication implementation flaw Descope discovered in Microsoft Azure AD OAuth applications that, when exploited, could lead to full account takeover. | |
| | | | |
troubleshootingsql.com
|
|
| | | In the first post of this series, I had talked about the cheat sheet which documents the best practices for storage for SQL Server workloads running on Azure Virtual Machines. In this post, I am going to show how to automate additional checks for your virtual machine and your storage configuration. I am going to... | ||