Keytos Security
Keytos Security
  • Видео 153
  • Просмотров 70 393
How To Install EAP-TLS Wifi Proflies for Apple Devices Using EZRADIUS
This video guides you through how to setup a wifi profile for certificate authentication (EAP-TLS) for your corporate or school network.
written version of the docs: www.keytos.io/docs/cloud-radius/distribute-wifi-profiles/how-to-install-eap-tls-wifi-profile-apple/
If you are looking at how to create the profiles and email them to your users look at this video instead ruclips.net/video/1T2OLgkEasQ/видео.html
Просмотров: 19

Видео

How To Create Wi-Fi Certificates Without Intune
Просмотров 7421 час назад
You are trying to move to Wi-Fi certificate authentication but not all your devices are Intune Joined? EZRADIUS allows you to distribute Wi-Fi profiles for Entra ID and certificate authentication without the need for Intune or an MDM. written docs: www.keytos.io/docs/cloud-radius/distribute-wifi-profiles/ Cloud RADIUS details: www.keytos.io/cloud-radius-as-a-service-for-azure-and-entra-id Cloud...
How smartcards work
Просмотров 84День назад
Curious about how Smartcards work? learn how this phishing resistant token has helped governments and organizations across the world go passwordless using certificate based authentication through PIV. If you are looking for the best passwordless and smart card onboarding tool check out EZCMS: www.keytos.io/passwordless-onboarding
FIDO2 + SmartCard (PIV) functionality is the best hardware token for Entra ID and Active Directory
Просмотров 14121 день назад
Are you looking for the best hardware token for Entra ID? You want something that has both FIDO2 and Smartcard functionality this allowes you to use Entra CBA as well as FIDO2 giving you passwordless access to everything.
What is FIDO2 Authentication
Просмотров 23728 дней назад
FIDO2 Is the most common passworldless authentication method, in this video we will go into explaining what is FIDO2 and how FIDO2 and Passkeys work.
What are Unphishable Credentials
Просмотров 47Месяц назад
We are hearing more and more about unphishable credentials, but what are unphishable credentials? How do Unphishable credentials stop phishing? Are all passwordless authentication methods phishing resistant? In this video we will answer those questions. Learn more: www.keytos.io/blog/passwordless/is-passwordless-authentication-unphishable.html
Why Should You Modernized Your PKI and Move your Certificate Authorities to the Cloud
Просмотров 67Месяц назад
Join Sir Tifficate as he explains why modern organizations must modernized their PKI and move to a cloud-based certificate authority. In this video we use a little bit of humor to expose internal conversations that we see organizations have about moving their PKI to the cloud. If you want to learn more about our cloud services visit our site: Cloud PKI: www.keytos.io/azure-pki Cloud RADIUS: www...
How To Troubleshoot RADIUS with EZRADIUS Cloud RADIUS
Просмотров 88Месяц назад
If you are trying to connect your device to RADIUS but you can't get it to work. In this video we will show you how to troubleshoot RADIUS Authentication with EZRADIUS the best cloud RADIUS solution. Learn more about EZRADIUS: www.keytos.io/cloud-radius-as-a-service-for-azure-and-entra-id Cloud RADIUS Documentation: www.keytos.io/docs/cloud-radius/
The problem with SSH keys. Are SSH Keys Secure?
Просмотров 373Месяц назад
The problem with SSH keys. Are SSH Keys Secure?
What Certificate Authority To Use for Azure IoT
Просмотров 502 месяца назад
What Certificate Authority To Use for Azure IoT
What is an HSM?
Просмотров 1412 месяца назад
What is an HSM?
Setup Meraki VPN to User RADIUS with Entra ID
Просмотров 1682 месяца назад
Setup Meraki VPN to User RADIUS with Entra ID
How to Enable Certificate Based Authentication in Meraki Networks with EZRADIUS Cloud RADIUS
Просмотров 5932 месяца назад
How to Enable Certificate Based Authentication in Meraki Networks with EZRADIUS Cloud RADIUS
What are the Multi-Factor Authentication Best practices for enterprises
Просмотров 602 месяца назад
What are the Multi-Factor Authentication Best practices for enterprises
How to Enable Entra ID Authentication in Meraki Wi-Fi with EZRADIUS Cloud RADIUS for Azure
Просмотров 1,1 тыс.2 месяца назад
How to Enable Entra ID Authentication in Meraki Wi-Fi with EZRADIUS Cloud RADIUS for Azure
What Are Certificate Transparency Logs and How to Monitor CT Logs
Просмотров 962 месяца назад
What Are Certificate Transparency Logs and How to Monitor CT Logs
Enable Entra ID Password Authentication Unifi Ubiquiti RADIUS
Просмотров 1,5 тыс.3 месяца назад
Enable Entra ID Password Authentication Unifi Ubiquiti RADIUS
How to Go Passwordless in Entra ID - Ex Microsoft Security Engineer Explains How
Просмотров 1623 месяца назад
How to Go Passwordless in Entra ID - Ex Microsoft Security Engineer Explains How
How To Setup Wi-Fi Certificate Authentication in Intune
Просмотров 1,3 тыс.3 месяца назад
How To Setup Wi-Fi Certificate Authentication in Intune
EZRADIUS Pricing Explained - Cloud RADIUS Cost that Makes Sense
Просмотров 2483 месяца назад
EZRADIUS Pricing Explained - Cloud RADIUS Cost that Makes Sense
How To Setup Intune PKI with EZCA
Просмотров 2533 месяца назад
How To Setup Intune PKI with EZCA
Is phone authentication safe?
Просмотров 743 месяца назад
Is phone authentication safe?
How to Setup Wifi Certificate Authentication with RADIUS in TP Link Omada
Просмотров 1,3 тыс.3 месяца назад
How to Setup Wifi Certificate Authentication with RADIUS in TP Link Omada
How to Monitor SSL Certificates with Certificate Transparency Logs
Просмотров 1083 месяца назад
How to Monitor SSL Certificates with Certificate Transparency Logs
How To View EZCA Certificates in your Cloud PKI
Просмотров 473 месяца назад
How To View EZCA Certificates in your Cloud PKI
What Happens When You Lose Your YubiKey
Просмотров 1,9 тыс.4 месяца назад
What Happens When You Lose Your YubiKey
How to Setup Cloud RADIUS for SCEPMan
Просмотров 1664 месяца назад
How to Setup Cloud RADIUS for SCEPMan
Setup Certificate Authentication using IoT Security Best Practices for Azure IoT Hub
Просмотров 644 месяца назад
Setup Certificate Authentication using IoT Security Best Practices for Azure IoT Hub
How To Setup EAP TLS RADIUS in UniFi Ubiquity Routers
Просмотров 1,1 тыс.4 месяца назад
How To Setup EAP TLS RADIUS in UniFi Ubiquity Routers
How Does Passwordless Authentication Work?
Просмотров 4094 месяца назад
How Does Passwordless Authentication Work?

Комментарии

  • @jonesm501
    @jonesm501 24 дня назад

    Hi there, Will this work for Entra ID accounts that have MFA?

    • @keytos
      @keytos 21 день назад

      Unfortunately not, this is for username and password authentication. For a more secure authentication we recommend using certificates issued by your MDM ruclips.net/video/LV6gN15QWLI/видео.html

  • @LaithCpE
    @LaithCpE Месяц назад

    We have tested this feature, it is working fine on windows, android devices, however, it is not working on iPhones, it seems the iPhones doesn't support EAP-TTLS/PAP by default, any workaround for this?

    • @keytos
      @keytos Месяц назад

      Hi, yes there is, you must create a profile for the iPhone, www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/in-device/#how-to-configure-eap-ttlspap-on-macos-for-radius-authentication-with-entra-id-passwords

  • @jl6693
    @jl6693 Месяц назад

    nice graphics but the amount of content does not match the title.

    • @keytos
      @keytos Месяц назад

      Thanks for the feedback, we have updated the title to match the content

  • @sariyanzero5817
    @sariyanzero5817 2 месяца назад

    hay i cannot login to keytos with my Gmail am i supposed to have a work email for this to work?

    • @keytos
      @keytos 2 месяца назад

      yes, this is only for Microsoft 365 work accounts

  • @sukhera89
    @sukhera89 2 месяца назад

    wooooowwwwwwwww

  • @Raja-ct9xq
    @Raja-ct9xq 3 месяца назад

    Can we try Ezca demo edition for free ?? Also, Ezca is based on Ejbca or Mspki in the backend ?

    • @keytos
      @keytos 3 месяца назад

      Yes, you can try it for free no credit card required www.keytos.io/docs/azure-pki/getting-started/registering-a-new-tenant/selecting-a-plan/select_plan_in_ezca/ We use our own in house built Certificate Authority as our backend this was built to be cloud native allowing us to scale faster while being more affordable.

  • @Dtr146
    @Dtr146 3 месяца назад

    Good I got here before a lot of people see this. This only affects you if you're on a public Wi-Fi and it is configured to where you can see other users on the network. If you use public Wi-Fi is a lot. Then yes you definitely need this update. If you're just at home on your Wi-Fi. As long as somebody doesn't get access to your internet. You are fine. They need to physically be on your network. They can't just drop a packet from outside the network without authentication. Yes it is a severe vulnerability and it affects all versions of Windows. But it only affects people who are on the same Wi-Fi as the attacker. This needs to be clarified.

    • @ernestoarmandoestradaperez3101
      @ernestoarmandoestradaperez3101 Месяц назад

      you saved me from tons of hours of investigation, pretty appreciated. cheers man

    • @igorkottm40
      @igorkottm40 15 дней назад

      As i said on the other channel of this guy (for whatever reason he has 2 of them). Attacker needs to be in range of your wifi card. The malicious packet is sent to the device itself. If you are not connect anywhere you are still vulnereable

    • @Dtr146
      @Dtr146 15 дней назад

      ​@@igorkottm40 Okay, first off, you have to be using your laptop per se if you're out in public. Not connected to a Wi-Fi. If you put your laptop to sleep, it's not sending or receiving packets anymore. Unless you are connected to a Wi-Fi. The only way that somebody could be in proximity to you without you being connected to a wireless network is if you are using your machine, out in public, willy-nilly without an internet connection, and who does that?

  • @JetSoftProHQ
    @JetSoftProHQ 3 месяца назад

    Thanks for the interesting and exemplary information. At JetSoftPro, a software development service, we see these trends in cybersecurity continuing today. The trend is also constant verification of protection, such as a penetration test or a simulation of a phishing attack

  • @haislrekajsolre7876
    @haislrekajsolre7876 3 месяца назад

    nice info

  • @info781
    @info781 4 месяца назад

    They sound different to me.

    • @keytos
      @keytos 4 месяца назад

      You are correct, they are different, but the underlying technology is the same for both

  • @HikaruAkitsuki
    @HikaruAkitsuki 4 месяца назад

    Is that Cloudflare doing that thing with their lava lamps?

    • @keytos
      @keytos 4 месяца назад

      They do use lava lamps for some of their random generators, but for most encryption they use the regular random generators that are approved by the industry www.cloudflare.com/learning/ssl/lava-lamp-encryption/

  • @marcusbk7317
    @marcusbk7317 4 месяца назад

    From this video, i dont see how OSCP is better than a CRL.

    • @keytos
      @keytos 4 месяца назад

      It is not better, they are both great tools for checking revocation, one offloads the search to the server and the other to the device. Most devices use CRL but for devices or networks that cannot handle large CRLs, OCSP is a great option.

  • @keytos
    @keytos 4 месяца назад

    www.keytos.io/blog/passwordless/what-are-ssh-certificates.html

  • @shongwethulisile2861
    @shongwethulisile2861 4 месяца назад

    Informative. Thank you

    • @keytos
      @keytos 4 месяца назад

      Glad it was helpful!

  • @leac3
    @leac3 5 месяцев назад

    I could not listen to you. Please, volume down.

    • @keytos
      @keytos 5 месяцев назад

      thanks for the feedback we will make sure to change it in our next videos

  • @pcread
    @pcread 5 месяцев назад

    music is too loud

    • @keytos
      @keytos 5 месяцев назад

      thanks for the feedback we will make sure to change it in our next videos

  • @ishwaryanarayan1010
    @ishwaryanarayan1010 6 месяцев назад

    Do you have any job opportunities for cyber security professional?

    • @keytos
      @keytos 4 месяца назад

      you can always check our www.keytos.io/careers page for the latest job postings

  • @adamcodes716
    @adamcodes716 7 месяцев назад

    I can't create a subscription without entering a credit card number. Is this really free, or is it only free for a month?

    • @keytos
      @keytos 7 месяцев назад

      you should be able to create a test subscription by clicking skip for now. It is only free for a month, after the first month it is $200 per CA per month and can be charged either to your credit card or to your Azure account.

  • @lindacohen9169
    @lindacohen9169 8 месяцев назад

    Great explanation! The spokesman makes the issue clear and interesting.

  • @komidawi
    @komidawi 8 месяцев назад

    I have to admit it was a very concise video - both short and helpful :)

  • @sheikhfaizal2851
    @sheikhfaizal2851 8 месяцев назад

    Thanks for sharing, but your face blocks the content. Can't see some stuff :(((

    • @keytos
      @keytos 8 месяцев назад

      Sorry about that, here is the presentation with all the information marketing.keytos.io/hubfs/Presentations/Cybersecurity%20Trends%20for%202024.pdf

  • @LivingInCloud1
    @LivingInCloud1 9 месяцев назад

    Very interesting!

  • @bubbanc
    @bubbanc 10 месяцев назад

    I notice there is no password or other authorization information other than the SCEP URL being unique and difficult to guess. If someone has your SCEP URL could they enroll into your service without having any passphrase and obtain a certificate for your infrastructure? If the SCEP URL is the only thing authorizing enrollment creation, then it might be good to note that in the UI (please keep this URL private). I also assume that that URL is not embedded into the certs issued?

    • @keytos
      @keytos 10 месяцев назад

      Hi thanks for your comment - while the experience seems simple, what happens in the backend is more complex; we talk about it at 4:30, but the gist is that each request has an encrypted password that is set by the MDM and EZCA (Intune sets their own, some MDM solutions only support a static password that is encrypted with the CA public key meaning that the CA is the only one that can access it, and some support dynamic challenge requests meaning that each specific request has it's own password set by the CA (this one is also encrypted), if you are interested, we have a full deep dive on how SCEP works in this video ruclips.net/video/da6LrQJcSgs/видео.html please let us know if you have other questions

  • @zomgoose
    @zomgoose 11 месяцев назад

    Awesome! Thanks!

  • @mr-teal
    @mr-teal 11 месяцев назад

    Great video! i am studying for my enterprise network administration exam for university and this was great for providing clarity on the difference between private and public CA's

    • @keytos
      @keytos 11 месяцев назад

      Glad we could help:)

  • @NikTown-m1s
    @NikTown-m1s Год назад

    Is it possible to place pages on a captured subdomain?

    • @keytos
      @keytos Год назад

      yes, anyone with an Azure account can create those resources and create pages. This is why we recommend all organizations to verify that they do not have any dangling DNS that can be exploited.

  • @igalfs
    @igalfs Год назад

    TIL

  • @thefauxpod3668
    @thefauxpod3668 Год назад

    That loop was CLEAN

  • @thefauxpod3668
    @thefauxpod3668 Год назад

    Sir Tificate rules!!

  • @stefandekooter
    @stefandekooter Год назад

    Hi, does Keytos have a OCSP endpoint in their offerings? Specifically in EZCA?

    • @keytos
      @keytos Год назад

      Hi Currently, EZCA only supports CRL. OCSP support is coming by end of Q3 2023

    • @keytos
      @keytos 11 месяцев назад

      We are happy to announce that now you can setup your EZCA ca with OCSP docs.keytos.io/azure-pki/creating-your-first-ca/first_subordinate_ca/#ocsp-online-certificate-status-protocol-settings