AI SecurityCyber SecurityMicrosoft Entra ID

Step-by-Step guide to Microsoft Entra Agent ID – Part 02 - Create Agent identity blueprints and Agent Identities

In my previous post, I explained the core components and authentication flows of Microsoft Entra Agent ID. If you haven’t read it yet, I recommend doing so before continuing with Part 02, as those fundamentals provide the foundation for what follows. You can access it using https://www.rebeladmin.com/microsoft-entra-agent-id-part1/ In this blog post, I am going to talk about planning…
Read more

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows

Agentic AI Security – Part 2: Threat Modeling

AI SecurityCyber SecurityMicrosoft Entra ID

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows

Many of you have probably seen Mission: Impossible Ghost Protocol. In the film, Ethan Hunt and his team operate with no official backing, no support, and no traceable authority. If they fail, the government denies their existence meaning there’s no audit trail and no accountability. That’s how AI agents operated before Microsoft Entra Agent ID. They often relied on shared service…
Read more

Step-by-Step guide to Microsoft Entra Agent ID – Part 02 - Create Agent identity blueprints and Agent Identities

Agentic AI Security – Part 2: Threat Modeling

Step-by-Step guide to Microsoft Entra Agent ID – Part 02 - Create Agent identity blueprints and Agent Identities

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows

Active DirectoryMicrosoft Technologies

How Active Directory Authentication Works?

AD DS security is key for any environment as it is foundation of identity protection. Before look in to improvements of AD DS security in an environment, it is important to understand how Active Directory authentication works with Kerberos. In this post I am going to explain how AD authentication works behind the scene. In infrastructure, there are different types of authentication protocols been…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes