John Craddock Identity and Access Training
John Craddock Identity and Access Training
  • Видео 19
  • Просмотров 51 930
Configuring Microsoft Entra Custom authentication extensions
Configuring Microsoft Entra Custom authentication extensions
In my first video on Microsoft Entra Custom Authentication Extensions, I showed you how external claims can be added to a Microsoft Entra Identity token.
Deep dive into configuring all the required components in this video.
You learn how to request a token, call out to a workflow before the token is issued, create an API and workflow using Pipedream and add the appropriate claims to the token.
I am showing you a lot of tips and tricks in this video.
You can find the code and other supporting files here:
github.com/xtseminars/CustomAuthenticationExtensions
Security considerations:
learn.microsoft.com/en-gb/entra/identity-platform/jwt-cla...
Просмотров: 1 294

Видео

Introducing Microsoft Entra Custom Authentication Extensions
Просмотров 919Год назад
Originally in Entra ID or as it was then Azure Active Directory, the information contained in an Identity token was limited. Now you can add custom claims, with the claim values coming from the Entra directory. However, until now there has been no easy way to add claims with values from external sources. In this video I am going to introduce you to Microsoft Entra Custom Authentication Extensio...
Understanding Microsoft Entra Protected Actions
Просмотров 659Год назад
Understanding Microsoft Entra Protected Actions In this video I am going to introduce you to Microsoft Entra Protected Actions and show how they can be used to trigger the evaluation of Conditional Access policies when a particular task is performed within the directory This allows you to specify additional security measures when an administrator executes a specific task This video is demo orie...
Microsoft Entra Global Secure Access Q&A with Thomas Detzner August 2023
Просмотров 1,4 тыс.Год назад
Microsoft Entra Global Secure Access Q&A with Thomas Detzner August 2023 This recording I made with Thomas Detzner who is a Principal Product Manager with the Microsoft Identity and Network Access division. Thomas is involved in the development of Microsoft Entra Global Secure Access and has profound technical insights. See the timeline below for the topics we discussed. There are a number of p...
Techie introduction to Microsoft Entra Internet Access & Microsoft Entra Private Access
Просмотров 10 тыс.Год назад
Techie introduction to Microsoft Entra Internet Access & Microsoft Entra Private Access I have been actively involved in the Microsoft private preview of Microsoft Entra Internet Access and Microsoft Entra Private Access components of which were released into public preview on the 11th of July. The umbrella name is Global Secure Access which embodies Zero Trust Network Access to M365 services, ...
Understanding Azure AD Conditional Access Authentication Contexts
Просмотров 3,3 тыс.Год назад
Understanding Azure AD Conditional Access Authentication Contexts This session is all about Authentication Contexts. An application can use Authentication Contexts to trigger the evaluation of a Azure AD Conditional Access policy. This allows the policy to match the requirements for individual components of an app. For instance a website could require MFA or Terms of Use to be agreed when a par...
Understanding Azure AD Conditional User and Sign-in Risk
Просмотров 6 тыс.Год назад
Understanding Azure AD Conditional User and Sign-in Risk This session is all about managing user and sign-in risk with Azure AD Conditional Access policies. I explain how user and sign-in risk are evaluated through Identity Protect and the reasons for using conditional access policies to remediate risk rather than using the policies that are part of Identity Protection. In demos you will see ho...
Understanding Azure AD Conditional Access Workload Identities
Просмотров 1,3 тыс.Год назад
Understanding Azure AD Conditional Access Workload Identities This Session is all about Azure AD Conditional Access and Workload identities. I explain exactly what workload identities are how they can authenticate to Azure AD using a shared secret or signed assertion. We then go on to look at how workloads can be secured through Conditional Access. If you want an introduction to setting up Cond...
Understanding Azure AD Conditional Access configuration
Просмотров 1,9 тыс.Год назад
Understanding Azure AD Conditional Access configuration In this session I explain how Conditional Access policies are configured. I started putting together this video with detail description of all the settings, but it got way too long. To provide the best possible learning experience, this video covers the core configuration of Conditional Access and subsequent videos will go into more detail...
When is Azure AD Conditional Access evaluated? - Deep-dive
Просмотров 2,1 тыс.Год назад
When is Azure AD Conditional Access evaluated? - Deep-dive Join me for this video and learn about the triggers that cause Azure AD conditional access to be evaluated. The triggers originate when a user signs-in, session tokens (cookies) are used to prove authentication to Azure AD, or a refresh token is used to obtain a new access token. Azure AD Continuous Access Evaluation (CAE) further enhan...
Azure AD Custom Security Attributes and Conditional Access
Просмотров 2,7 тыс.Год назад
Azure AD Custom Security Attributes and Conditional Access You may have seen the mention of Custom Security Attributes in Conditional Access. In this session, you will learn all about these new attributes. You will discover how to create attribute sets, add attributes and assign attribute sets and values to users and service principals. Using the security attributes and associated values, you w...
Azure AD Mastery with AI, Supercharge your Cloud Skills!
Просмотров 432Год назад
Azure AD Mastery with AI, Supercharge your Cloud Skills! There is so much hype around AI at the moment that I decided to look at how ChatGPT could help in the administration of Azure AD. I discovered a new AI buddy that could help me learn and resolve problems. It's an ideal buddy situation, providing a sounding board to exchange ideas and mature a solution. Just like a human buddy, sometimes t...
Azure AD Certificated Based Authentication Deep-Dive
Просмотров 6 тыс.Год назад
Azure AD Certificated Based Authentication Deep-Dive This session will teach you how to set up certificate-based authentication in your Azure AD tenant. You will learn the following: 00:37 How CBA works and why it is phishing resistant 09:15 How to create and store certificates 24:45 How to enable Azure AD to trust our certificates 27:40 How to configure the certificate user mapping and authent...
The path towards Zero Trust Network Access with Azure AD / M365
Просмотров 713Год назад
The path towards Zero Trust Network Access with Azure AD / M365 Once upon a time, in a land far, far away, we built castles with solid walls and a single entrance to protect our assets. We originally built IT systems like this, and for on-premises Active Directory, we created walls through a combination of our building, network and domain/forest boundaries. As with the castle, once inside the p...
Azure AD, Fido2, Temporary Access Pass and Phishing
Просмотров 1,7 тыс.Год назад
Azure AD, Fido2, Temporary Access Pass and Phishing In this session, you will learn how FIDO2 keys work. We'll then go on to provision the FIDO2 Keys in Azure AD. Strong Authentication is required for a user to register a key. You will see how an administrator can create a Temporary Access Pass (TAP) and how the user uses the TAP to add their keys. You will also discover how FIDO2 keys are phis...
Understanding and using Microsoft Entra Verified ID
Просмотров 1,2 тыс.Год назад
Understanding and using Microsoft Entra Verified ID
Introducing John Craddock - Deep-dives on Azure AD Identity
Просмотров 1,7 тыс.Год назад
Introducing John Craddock - Deep-dives on Azure AD Identity
Azure AD Authentication Methods and Policies
Просмотров 8 тыс.Год назад
Azure AD Authentication Methods and Policies
A comprehensive Introduction to Computer Network Security
Просмотров 462Год назад
A comprehensive Introduction to Computer Network Security

Комментарии

  • @munishtyagi1212
    @munishtyagi1212 2 дня назад

    Nice Explanation....

  • @sahild6584
    @sahild6584 9 дней назад

    Where is nonce? Looks like incomplete explanation very high level, details missing.

  • @abdulmananclasses.7793
    @abdulmananclasses.7793 25 дней назад

    Need more videos John on identity.

  • @dimplemenghani4104
    @dimplemenghani4104 Месяц назад

    Great explanation!

  • @edemfromeden5432
    @edemfromeden5432 Месяц назад

    Thank you, love your content, such high quality ! For the Session - Sign-in frequency does it have to be set to Every time for the user risk policy to work ?

  • @jmhphotographic
    @jmhphotographic Месяц назад

    Thanks John. What a brilliantly put together video.

  • @pmatos0071
    @pmatos0071 2 месяца назад

    Thank you for the video

  •  2 месяца назад

    Thanks! This helped me a lot!

  • @yulaw3289
    @yulaw3289 3 месяца назад

    enjoying this video for today learning, thanks a lot! .

  • @tonysmith-g5t
    @tonysmith-g5t 3 месяца назад

    Any idea why the Session section in my external tenant is disabled?

  • @DevBabu
    @DevBabu 3 месяца назад

    Thank you John. I grasped the fundamentals and details so clearly only through this video. Your power to teach is fantastic.

  • @MaxGuilingHelen
    @MaxGuilingHelen 4 месяца назад

    This is a fantastic video - great to see a detailed how-to like this - anyone could follow this and get the same results. Thanks John!

  • @prakashjha26
    @prakashjha26 4 месяца назад

    Easy to understand.... Thank you John.

  • @fakeidmel
    @fakeidmel 5 месяцев назад

    nice video sir

  • @derekgb1971
    @derekgb1971 5 месяцев назад

    Excellent!

  • @keerthanak7841
    @keerthanak7841 6 месяцев назад

    Hi can you please explain the workflow for the identity protection..how the detection work,how investigation work and how remediation work and how the policies are framed..what is the use of conditional access policies and device compliance... please explain in detail

  • @DERLUMICHI
    @DERLUMICHI 7 месяцев назад

    Hi John, great introduction. One comment to bypassing protected actions - admins could just delete protected Action to circumvent it and nothing prevents it.

  • @danilorb7775
    @danilorb7775 8 месяцев назад

    Really nice video! Greetings from Brazil!

  • @securic911
    @securic911 8 месяцев назад

    You ROCK! Your guide is better than the doc. Thanks a lot!

  • @mikegaudreau5853
    @mikegaudreau5853 8 месяцев назад

    Very well done! I can't wait to up my CA skills with your other videos in the series!

  • @fdlessard
    @fdlessard 8 месяцев назад

    Thank you for this useful video, but when will this feature be released out of preview mode ?

  • @pavanr3701
    @pavanr3701 9 месяцев назад

    I learnt ADFS watching your videos many years ago :) (I can tell by your voice that you was the instructor behind the slides). Thank you very much for another great video.

  • @oyevivotumusica1762
    @oyevivotumusica1762 10 месяцев назад

    One of my Favorite channels. Thanks so Much!!

  • @mattq5474
    @mattq5474 10 месяцев назад

    subscribed! great stuff, thank you so much for not just reading the settings like some other youtube trainers but providing context and behind the scenes info, hugely appreciated!

  • @munnik85
    @munnik85 10 месяцев назад

    Hi John, Thank you for this crystal clear insight into Authentication methods. My question is this: How to migrate legacy MFA/authentication methods to the new Entra/Azure AD Authentication method policies for multiple tenants at once? Thanks for your insights in advance!

  • @berndeckenfels
    @berndeckenfels 10 месяцев назад

    With the SKI the smartcards could be anonymous and even pre-issued, that’s quite neat in addition to the high affinity. Is there an drawback if you don’t have attributes (for this specific Entra ID Login case)

  • @berndeckenfels
    @berndeckenfels 10 месяцев назад

    When using windows Keystore, it should use the cryptong rsa provider, as it uses credential isolation. And potential even tpm, but I am not sure how to enforce this.

  • @samjohnson5203
    @samjohnson5203 11 месяцев назад

    Even better than the last one. Thank you! Curious as to why you opted to use Pipedream instead of an Azure Function, especially since you did not validate the token in Pipedream.

  • @samjohnson5203
    @samjohnson5203 11 месяцев назад

    Phenomenal. Thank you very much!

  • @reginaldomoreno9898
    @reginaldomoreno9898 11 месяцев назад

    Nice video.

    • @john_craddock
      @john_craddock 11 месяцев назад

      Thanks Reginaldo, it's great to get your feedback

  • @Omeopaty
    @Omeopaty 11 месяцев назад

    hi, after 5 months seems that UDP and private dns feature for private access is still not present. Do you have any idea of when will be ready ?

    • @john_craddock
      @john_craddock 11 месяцев назад

      Hello, they are in private preview at the moment and will be released into public preview in the coming months

  • @PhantasyAI0
    @PhantasyAI0 11 месяцев назад

    please do this for .net web core api with entity framework

  • @mrbrojangles740
    @mrbrojangles740 Год назад

    Short of pausing the access client, is there any way to keep traffic from routing through the proxies when the PC is actually on the on-prem network?

    • @john_craddock
      @john_craddock Год назад

      I assume you are just referring to Private Access where the resource you want to access is on the on-prem network. All I can say is keep your eyes open and you will see something rather smart in the future.

  • @aaabbbeee9
    @aaabbbeee9 Год назад

    I love the way you explained this in a way that is easily understandable. Subscribed.

  • @joneslt
    @joneslt Год назад

    These videos are great! Very clear concise explanations. I am learning alot from your vids. Thank so much!

    • @john_craddock
      @john_craddock Год назад

      That's great to hear! Thanks for the feedback

  • @roelofsee
    @roelofsee Год назад

    Great content again, John! Thanks.

    • @john_craddock
      @john_craddock Год назад

      Hi Eric, Thanks for the feedback. Always appreciated

  • @joshuab8688
    @joshuab8688 Год назад

    Thanks John. It's a shame the protected actions list is a little small right now but it's a good start. I would love to see adding a federated domain isn't included as a protected action.

    • @john_craddock
      @john_craddock Год назад

      Joshua, thanks for leaving the comment. I am hoping more permissions will come into scope.

  • @supriyochatterjee4095
    @supriyochatterjee4095 Год назад

    Happy Christmas 🎄 and Happy December to you and your family Sir , Best wishes for everyone from Kolkata, West Bengal, India 🇮🇳

  • @RobertWaltercrantz
    @RobertWaltercrantz Год назад

    Awesome video - Thank you very much for sharing and explaining!

    • @john_craddock
      @john_craddock Год назад

      Your welcome Robert, thanks for taking the time to comment

  • @AndyMaloneMVP
    @AndyMaloneMVP Год назад

    Great video John 👌

  • @abdulmananclasses.7793
    @abdulmananclasses.7793 Год назад

    Thanks John, As per your commitment in one of the videos to make one video per week but I didn't see many uploaded recently. Can you please clarify when you gonna upload videos on other Authentication and Authorization methods. Thank you 😊

    • @john_craddock
      @john_craddock Год назад

      Hi Abdul, That was an ambitious commitment and now I'm embarrassed! Unfortunately I got completely committed to a customer project. However, I am now trying to get back on-track with the videos. I already have a video on authentication methods ruclips.net/video/lajeFoCr2KM/видео.html. What content are you looking for?

    • @abdulmananclasses.7793
      @abdulmananclasses.7793 Год назад

      Thanks John for replying on my message. I want to have some series on Application Registration and Enterprise Application.

    • @john_craddock
      @john_craddock Год назад

      @@abdulmananclasses.7793 It's on my list, Hopefully in the next couple of months!

  • @kb8570
    @kb8570 Год назад

    Your videos are amazing because you explain what you are doing.

    • @john_craddock
      @john_craddock Год назад

      Glad you like them! Thanks for leaving a comment.

  • @OFH_K
    @OFH_K Год назад

    Thank you for the video!

    • @john_craddock
      @john_craddock Год назад

      Glad it was helpful! Thanks for taking the time to leave a comment.

  • @BreaktheTrend
    @BreaktheTrend Год назад

    So informative. Thank you.

    • @john_craddock
      @john_craddock Год назад

      I'm glad it was helpful! Thanks for leaving a comment.

  • @discokrueger522
    @discokrueger522 Год назад

    What a great video! I struggled with my understanding of modern authentication on some points. This helped me a lot.

    • @john_craddock
      @john_craddock Год назад

      Hi, thanks for the feedback - it is great to hear that it helped.

  • @citizenearth3324
    @citizenearth3324 Год назад

    Wow, Thanks for making it .

    • @john_craddock
      @john_craddock Год назад

      Hi, thanks for leaving a comment. I am pleased you found it useful

  • @Marco-jf8jo
    @Marco-jf8jo Год назад

    This was just ... well ... fantastic! Thanks a lot, I learnt a lot from this.

    • @john_craddock
      @john_craddock Год назад

      Thank for letting me know - I am glad you found it useful

  • @milkthiscalf
    @milkthiscalf Год назад

    This content was so very helpful, your lab setup to see and test the token information is phenomenal. I wish I could duplicate this, to get a much better understanding of the authorization myself! Thanks John

    • @john_craddock
      @john_craddock Год назад

      Thanks for your feedback, I am pleased you found it useful

  • @apostleleoboschjeremiahjos4493

    Nice Work

  • @Tularis
    @Tularis Год назад

    What if you have users in an Azure Only environment without any server?

    • @john_craddock
      @john_craddock Год назад

      You will require a PKI to issue your certificates

    • @fbifido2
      @fbifido2 5 месяцев назад

      @@john_craddock does Microsoft intune not provide a way to issue Cert from my own ROOT certificate?

    • @fbifido2
      @fbifido2 5 месяцев назад

      @@john_craddock does Microsoft offer a private pki for intune ?