AI SecurityCyber SecurityMicrosoft Entra ID

Step-by-Step guide to Microsoft Entra Agent ID – Part 02 - Create Agent identity blueprints and Agent Identities

In my previous post, I explained the core components and authentication flows of Microsoft Entra Agent ID. If you haven’t read it yet, I recommend doing so before continuing with Part 02, as those fundamentals provide the foundation for what follows. You can access it using https://www.rebeladmin.com/microsoft-entra-agent-id-part1/ In this blog post, I am going to talk about planning…
Read more

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows

Agentic AI Security – Part 2: Threat Modeling

AI SecurityCyber SecurityMicrosoft Entra ID

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows

Many of you have probably seen Mission: Impossible Ghost Protocol. In the film, Ethan Hunt and his team operate with no official backing, no support, and no traceable authority. If they fail, the government denies their existence meaning there’s no audit trail and no accountability. That’s how AI agents operated before Microsoft Entra Agent ID. They often relied on shared service…
Read more

Step-by-Step guide to Microsoft Entra Agent ID – Part 02 - Create Agent identity blueprints and Agent Identities

Agentic AI Security – Part 2: Threat Modeling

Cyber SecurityMicrosoft Entra IDMicrosoft Technologies

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Entra ID Entitlement Management access packages enable administrators to offer a self-service experience for users, granting access to groups, applications, and sites. With access packages, we can automate the processes of access assignment, reviews, and expiration for the aforementioned resources. Previously, I have written detailed blog posts explaining how to set up access packages. You can…
Read more

Step-by-Step guide to Microsoft Entra Agent ID – Part 02 - Create Agent identity blueprints and Agent Identities

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows

Cyber SecurityMicrosoft Entra ID

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

In my previous blog post, I explained how to use Entra ID lifecycle workflow to trigger actions based on user attribute changes. You can find the step-by-step guide here: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes. In that post, I used an attribute assigned to a set of users to define the workflow scope. Now, we can also use Custom Security Attributes…
Read more

Step-by-Step guide to Microsoft Entra Agent ID – Part 02 - Create Agent identity blueprints and Agent Identities

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows