AI SecurityCyber SecurityMicrosoft Entra ID

Step-by-Step guide to Microsoft Entra Agent ID – Part 02 - Create Agent identity blueprints and Agent Identities

In my previous post, I explained the core components and authentication flows of Microsoft Entra Agent ID. If you haven’t read it yet, I recommend doing so before continuing with Part 02, as those fundamentals provide the foundation for what follows. You can access it using https://www.rebeladmin.com/microsoft-entra-agent-id-part1/ In this blog post, I am going to talk about planning…
Read more

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows

Agentic AI Security – Part 2: Threat Modeling

AI SecurityCyber SecurityMicrosoft Entra ID

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows

Many of you have probably seen Mission: Impossible Ghost Protocol. In the film, Ethan Hunt and his team operate with no official backing, no support, and no traceable authority. If they fail, the government denies their existence meaning there’s no audit trail and no accountability. That’s how AI agents operated before Microsoft Entra Agent ID. They often relied on shared service…
Read more

Step-by-Step guide to Microsoft Entra Agent ID – Part 02 - Create Agent identity blueprints and Agent Identities

Agentic AI Security – Part 2: Threat Modeling

AI SecurityCyber Security

Agentic AI Security – Part 2: Threat Modeling

In my previous article, I discussed common threats linked to Agentic AI systems. If you haven’t read it yet, I recommend doing so first, as it provides important context for this post. https://www.rebeladmin.com/securing-agentic-ai-part1-threat-overview/ In this blog post, I’ll be discussing threat modeling for Agentic AI. As I mentioned in my previous post, many of the threats relevant to…
Read more

Step-by-Step guide to Microsoft Entra Agent ID – Part 02 - Create Agent identity blueprints and Agent Identities

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows

AI Security

Agentic AI Security – Part 1: Uncovering Hidden Threats

As we all know, AI is evolving at an incredible pace — sometimes it feels like we barely have time to catch our breath. The old ’10-year tech evolution cycle’ no longer applies; groundbreaking innovations are emerging faster than ever. One of the latest is Agentic AI. In fact, interest in the term ‘Agentic AI’ has skyrocketed, reaching its peak on Google search trends within just three…
Read more

Step-by-Step guide to Microsoft Entra Agent ID – Part 02 - Create Agent identity blueprints and Agent Identities

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows