Explore >> Select a destination


You are here

aadinternals.com
| | dirteam.com
3.8 parsecs away

Travel
| | vCenter in VMware vSphere 7 introduces support for role-based access control (RBAC), based on standards-based federation. While this sounds fantastic, there are a couple of things you should know about this vCenter Identity Provider Federation feature, before you blindly implement it. vCenter 7.0 or later The vCenter Identity Provider Federation feature is only available [...]
| | www.descope.com
3.3 parsecs away

Travel
| | This blog will cover an authentication implementation flaw Descope discovered in Microsoft Azure AD OAuth applications that, when exploited, could lead to full account takeover.
| | blog.xpnsec.com
4.8 parsecs away

Travel
| | Originally presented at SOCON-2024, and continuing the series into post-exploitation techniques against Identity Providers, in this blog post we'll look at Ping, OneLogin and Entra ID. I'll discuss how post-exploitation techniques effective against Okta apply to other providers, release new tools for post-exploitation, and look at what proves to be effective when critical assets lie beyond an Identity Provider portal.
| | paulbutcher.com
25.6 parsecs away

Travel
| [AI summary] This article explains how to deploy a Clojure Ring application to AWS Lambda using serverless infrastructure as code, leveraging tools like SAM and SnapStart to simplify deployment and reduce cold start issues.