- Видео 19
- Просмотров 51 930
John Craddock Identity and Access Training
Великобритания
Добавлен 23 июн 2009
John Craddock Identity and Access Training
Hello, I am John Craddock, an Identity and Security Architect and also a Microsoft MVP
Find out about the channel and my background:
ruclips.net/video/xMJfHz-iR7s/видео.html
I’ve worked with both on-premise Active Directory and Azure AD since they were first released. I work extensively with Microsoft Product Development teams and have deep insights into the products.
My desire is to build a community of Identity Geeks.
I promise you great technical content explained in awesomely simple ways.
SUBSCRIBE and KEEP LEARNING
Join me for an intense 5-day masterclass on Azure AD Identity
learn.xtseminars.co.uk
Every effort has been made to make these videos as complete and accurate as possible, but no warranty or fitness is implied. The presenter, authors, publisher and distributor will not be liable for errors or omissions or for damages resulting from the use of the information presented and contained herein
Hello, I am John Craddock, an Identity and Security Architect and also a Microsoft MVP
Find out about the channel and my background:
ruclips.net/video/xMJfHz-iR7s/видео.html
I’ve worked with both on-premise Active Directory and Azure AD since they were first released. I work extensively with Microsoft Product Development teams and have deep insights into the products.
My desire is to build a community of Identity Geeks.
I promise you great technical content explained in awesomely simple ways.
SUBSCRIBE and KEEP LEARNING
Join me for an intense 5-day masterclass on Azure AD Identity
learn.xtseminars.co.uk
Every effort has been made to make these videos as complete and accurate as possible, but no warranty or fitness is implied. The presenter, authors, publisher and distributor will not be liable for errors or omissions or for damages resulting from the use of the information presented and contained herein
Configuring Microsoft Entra Custom authentication extensions
Configuring Microsoft Entra Custom authentication extensions
In my first video on Microsoft Entra Custom Authentication Extensions, I showed you how external claims can be added to a Microsoft Entra Identity token.
Deep dive into configuring all the required components in this video.
You learn how to request a token, call out to a workflow before the token is issued, create an API and workflow using Pipedream and add the appropriate claims to the token.
I am showing you a lot of tips and tricks in this video.
You can find the code and other supporting files here:
github.com/xtseminars/CustomAuthenticationExtensions
Security considerations:
learn.microsoft.com/en-gb/entra/identity-platform/jwt-cla...
In my first video on Microsoft Entra Custom Authentication Extensions, I showed you how external claims can be added to a Microsoft Entra Identity token.
Deep dive into configuring all the required components in this video.
You learn how to request a token, call out to a workflow before the token is issued, create an API and workflow using Pipedream and add the appropriate claims to the token.
I am showing you a lot of tips and tricks in this video.
You can find the code and other supporting files here:
github.com/xtseminars/CustomAuthenticationExtensions
Security considerations:
learn.microsoft.com/en-gb/entra/identity-platform/jwt-cla...
Просмотров: 1 294
Видео
Introducing Microsoft Entra Custom Authentication Extensions
Просмотров 919Год назад
Originally in Entra ID or as it was then Azure Active Directory, the information contained in an Identity token was limited. Now you can add custom claims, with the claim values coming from the Entra directory. However, until now there has been no easy way to add claims with values from external sources. In this video I am going to introduce you to Microsoft Entra Custom Authentication Extensio...
Understanding Microsoft Entra Protected Actions
Просмотров 659Год назад
Understanding Microsoft Entra Protected Actions In this video I am going to introduce you to Microsoft Entra Protected Actions and show how they can be used to trigger the evaluation of Conditional Access policies when a particular task is performed within the directory This allows you to specify additional security measures when an administrator executes a specific task This video is demo orie...
Microsoft Entra Global Secure Access Q&A with Thomas Detzner August 2023
Просмотров 1,4 тыс.Год назад
Microsoft Entra Global Secure Access Q&A with Thomas Detzner August 2023 This recording I made with Thomas Detzner who is a Principal Product Manager with the Microsoft Identity and Network Access division. Thomas is involved in the development of Microsoft Entra Global Secure Access and has profound technical insights. See the timeline below for the topics we discussed. There are a number of p...
Techie introduction to Microsoft Entra Internet Access & Microsoft Entra Private Access
Просмотров 10 тыс.Год назад
Techie introduction to Microsoft Entra Internet Access & Microsoft Entra Private Access I have been actively involved in the Microsoft private preview of Microsoft Entra Internet Access and Microsoft Entra Private Access components of which were released into public preview on the 11th of July. The umbrella name is Global Secure Access which embodies Zero Trust Network Access to M365 services, ...
Understanding Azure AD Conditional Access Authentication Contexts
Просмотров 3,3 тыс.Год назад
Understanding Azure AD Conditional Access Authentication Contexts This session is all about Authentication Contexts. An application can use Authentication Contexts to trigger the evaluation of a Azure AD Conditional Access policy. This allows the policy to match the requirements for individual components of an app. For instance a website could require MFA or Terms of Use to be agreed when a par...
Understanding Azure AD Conditional User and Sign-in Risk
Просмотров 6 тыс.Год назад
Understanding Azure AD Conditional User and Sign-in Risk This session is all about managing user and sign-in risk with Azure AD Conditional Access policies. I explain how user and sign-in risk are evaluated through Identity Protect and the reasons for using conditional access policies to remediate risk rather than using the policies that are part of Identity Protection. In demos you will see ho...
Understanding Azure AD Conditional Access Workload Identities
Просмотров 1,3 тыс.Год назад
Understanding Azure AD Conditional Access Workload Identities This Session is all about Azure AD Conditional Access and Workload identities. I explain exactly what workload identities are how they can authenticate to Azure AD using a shared secret or signed assertion. We then go on to look at how workloads can be secured through Conditional Access. If you want an introduction to setting up Cond...
Understanding Azure AD Conditional Access configuration
Просмотров 1,9 тыс.Год назад
Understanding Azure AD Conditional Access configuration In this session I explain how Conditional Access policies are configured. I started putting together this video with detail description of all the settings, but it got way too long. To provide the best possible learning experience, this video covers the core configuration of Conditional Access and subsequent videos will go into more detail...
When is Azure AD Conditional Access evaluated? - Deep-dive
Просмотров 2,1 тыс.Год назад
When is Azure AD Conditional Access evaluated? - Deep-dive Join me for this video and learn about the triggers that cause Azure AD conditional access to be evaluated. The triggers originate when a user signs-in, session tokens (cookies) are used to prove authentication to Azure AD, or a refresh token is used to obtain a new access token. Azure AD Continuous Access Evaluation (CAE) further enhan...
Azure AD Custom Security Attributes and Conditional Access
Просмотров 2,7 тыс.Год назад
Azure AD Custom Security Attributes and Conditional Access You may have seen the mention of Custom Security Attributes in Conditional Access. In this session, you will learn all about these new attributes. You will discover how to create attribute sets, add attributes and assign attribute sets and values to users and service principals. Using the security attributes and associated values, you w...
Azure AD Mastery with AI, Supercharge your Cloud Skills!
Просмотров 432Год назад
Azure AD Mastery with AI, Supercharge your Cloud Skills! There is so much hype around AI at the moment that I decided to look at how ChatGPT could help in the administration of Azure AD. I discovered a new AI buddy that could help me learn and resolve problems. It's an ideal buddy situation, providing a sounding board to exchange ideas and mature a solution. Just like a human buddy, sometimes t...
Azure AD Certificated Based Authentication Deep-Dive
Просмотров 6 тыс.Год назад
Azure AD Certificated Based Authentication Deep-Dive This session will teach you how to set up certificate-based authentication in your Azure AD tenant. You will learn the following: 00:37 How CBA works and why it is phishing resistant 09:15 How to create and store certificates 24:45 How to enable Azure AD to trust our certificates 27:40 How to configure the certificate user mapping and authent...
The path towards Zero Trust Network Access with Azure AD / M365
Просмотров 713Год назад
The path towards Zero Trust Network Access with Azure AD / M365 Once upon a time, in a land far, far away, we built castles with solid walls and a single entrance to protect our assets. We originally built IT systems like this, and for on-premises Active Directory, we created walls through a combination of our building, network and domain/forest boundaries. As with the castle, once inside the p...
Azure AD, Fido2, Temporary Access Pass and Phishing
Просмотров 1,7 тыс.Год назад
Azure AD, Fido2, Temporary Access Pass and Phishing In this session, you will learn how FIDO2 keys work. We'll then go on to provision the FIDO2 Keys in Azure AD. Strong Authentication is required for a user to register a key. You will see how an administrator can create a Temporary Access Pass (TAP) and how the user uses the TAP to add their keys. You will also discover how FIDO2 keys are phis...
Understanding and using Microsoft Entra Verified ID
Просмотров 1,2 тыс.Год назад
Understanding and using Microsoft Entra Verified ID
Introducing John Craddock - Deep-dives on Azure AD Identity
Просмотров 1,7 тыс.Год назад
Introducing John Craddock - Deep-dives on Azure AD Identity
Azure AD Authentication Methods and Policies
Просмотров 8 тыс.Год назад
Azure AD Authentication Methods and Policies
A comprehensive Introduction to Computer Network Security
Просмотров 462Год назад
A comprehensive Introduction to Computer Network Security
Nice Explanation....
Where is nonce? Looks like incomplete explanation very high level, details missing.
Need more videos John on identity.
Great explanation!
Thank you, love your content, such high quality ! For the Session - Sign-in frequency does it have to be set to Every time for the user risk policy to work ?
Thanks John. What a brilliantly put together video.
Thank you for the video
Thanks! This helped me a lot!
enjoying this video for today learning, thanks a lot! .
Any idea why the Session section in my external tenant is disabled?
Thank you John. I grasped the fundamentals and details so clearly only through this video. Your power to teach is fantastic.
This is a fantastic video - great to see a detailed how-to like this - anyone could follow this and get the same results. Thanks John!
Easy to understand.... Thank you John.
nice video sir
Excellent!
Hi can you please explain the workflow for the identity protection..how the detection work,how investigation work and how remediation work and how the policies are framed..what is the use of conditional access policies and device compliance... please explain in detail
Hi John, great introduction. One comment to bypassing protected actions - admins could just delete protected Action to circumvent it and nothing prevents it.
Really nice video! Greetings from Brazil!
You ROCK! Your guide is better than the doc. Thanks a lot!
Very well done! I can't wait to up my CA skills with your other videos in the series!
Thank you for this useful video, but when will this feature be released out of preview mode ?
I learnt ADFS watching your videos many years ago :) (I can tell by your voice that you was the instructor behind the slides). Thank you very much for another great video.
One of my Favorite channels. Thanks so Much!!
subscribed! great stuff, thank you so much for not just reading the settings like some other youtube trainers but providing context and behind the scenes info, hugely appreciated!
Hi John, Thank you for this crystal clear insight into Authentication methods. My question is this: How to migrate legacy MFA/authentication methods to the new Entra/Azure AD Authentication method policies for multiple tenants at once? Thanks for your insights in advance!
With the SKI the smartcards could be anonymous and even pre-issued, that’s quite neat in addition to the high affinity. Is there an drawback if you don’t have attributes (for this specific Entra ID Login case)
When using windows Keystore, it should use the cryptong rsa provider, as it uses credential isolation. And potential even tpm, but I am not sure how to enforce this.
Even better than the last one. Thank you! Curious as to why you opted to use Pipedream instead of an Azure Function, especially since you did not validate the token in Pipedream.
Phenomenal. Thank you very much!
Nice video.
Thanks Reginaldo, it's great to get your feedback
hi, after 5 months seems that UDP and private dns feature for private access is still not present. Do you have any idea of when will be ready ?
Hello, they are in private preview at the moment and will be released into public preview in the coming months
please do this for .net web core api with entity framework
Short of pausing the access client, is there any way to keep traffic from routing through the proxies when the PC is actually on the on-prem network?
I assume you are just referring to Private Access where the resource you want to access is on the on-prem network. All I can say is keep your eyes open and you will see something rather smart in the future.
I love the way you explained this in a way that is easily understandable. Subscribed.
Thanks for the feedback!
These videos are great! Very clear concise explanations. I am learning alot from your vids. Thank so much!
That's great to hear! Thanks for the feedback
Great content again, John! Thanks.
Hi Eric, Thanks for the feedback. Always appreciated
Thanks John. It's a shame the protected actions list is a little small right now but it's a good start. I would love to see adding a federated domain isn't included as a protected action.
Joshua, thanks for leaving the comment. I am hoping more permissions will come into scope.
Happy Christmas 🎄 and Happy December to you and your family Sir , Best wishes for everyone from Kolkata, West Bengal, India 🇮🇳
Happy holidays!
Awesome video - Thank you very much for sharing and explaining!
Your welcome Robert, thanks for taking the time to comment
Great video John 👌
Thanks Andy!
Thanks John, As per your commitment in one of the videos to make one video per week but I didn't see many uploaded recently. Can you please clarify when you gonna upload videos on other Authentication and Authorization methods. Thank you 😊
Hi Abdul, That was an ambitious commitment and now I'm embarrassed! Unfortunately I got completely committed to a customer project. However, I am now trying to get back on-track with the videos. I already have a video on authentication methods ruclips.net/video/lajeFoCr2KM/видео.html. What content are you looking for?
Thanks John for replying on my message. I want to have some series on Application Registration and Enterprise Application.
@@abdulmananclasses.7793 It's on my list, Hopefully in the next couple of months!
Your videos are amazing because you explain what you are doing.
Glad you like them! Thanks for leaving a comment.
Thank you for the video!
Glad it was helpful! Thanks for taking the time to leave a comment.
So informative. Thank you.
I'm glad it was helpful! Thanks for leaving a comment.
What a great video! I struggled with my understanding of modern authentication on some points. This helped me a lot.
Hi, thanks for the feedback - it is great to hear that it helped.
Wow, Thanks for making it .
Hi, thanks for leaving a comment. I am pleased you found it useful
This was just ... well ... fantastic! Thanks a lot, I learnt a lot from this.
Thank for letting me know - I am glad you found it useful
This content was so very helpful, your lab setup to see and test the token information is phenomenal. I wish I could duplicate this, to get a much better understanding of the authorization myself! Thanks John
Thanks for your feedback, I am pleased you found it useful
Nice Work
Thanks for the feedback!
What if you have users in an Azure Only environment without any server?
You will require a PKI to issue your certificates
@@john_craddock does Microsoft intune not provide a way to issue Cert from my own ROOT certificate?
@@john_craddock does Microsoft offer a private pki for intune ?