Christopher Ortiz Aldanacortizaldana.hashnode.dev·Oct 21, 2024Project Stellar AccessOverview Of Project Stellar Access Project Stellar Access involves setting up DHCP, DNS, and Identity Management servers. First, I’ll install and configure DHCP. Next, I’ll install and configure BIND9. Lastly, I’ll install FreeIPA and create 3 group...DiscussOpen Source
Shruti RajeshforZySec AIblog.zysec.ai·Oct 15, 2024AI-Powered Identity Verification and the Battle Against Deepfakes: A Digital ShowdownImagine waking up, grabbing your favorite mug, and finding out that deepfake technology has decided to impersonate you so convincingly it even fooled your coffee machine. Welcome to October 2024, where the digital wild west is at it again, and AI is ...Discussnews
Olívio Mouracoisasdatreta.hashnode.dev·Oct 3, 2024Powershell - Add users from groups to assign group with group exceptions# Ensure the Microsoft.Graph module is imported # Import-Module Microsoft.Graph # Authenticate using the managed identity Connect-MgGraph -Identity -NoWelcome #Connect-MgGraph -Scopes "User.Read.All", "Group.ReadWrite.All" -NoWelcome # Control vari...DiscussPowershell
SUJIT KUMAR SAHOOsujittulu.hashnode.dev·Sep 28, 2024What and Why Active Directory?Active Directory (AD) is a Microsoft directory service that helps organize and manage users, devices, and network resources in Windows domain networks. Why we should user Active Directory? Authentication and authorization AD checks users' credent...DiscussActive Directory
Tanishka Marrottcloud-design-diaries.hashnode.dev·Sep 26, 2024Why AWS Organization-Wide Backup Policies Are Essential for Your Cloud StrategyWhen it comes to managing backups in a dynamic, cloud-based enterprise, AWS Organization-wide Backup Policies offer a scalable and cost-effective solution to ensure data redundancy, business continuity, and compliance. As enterprises grow and diversi...Discuss·1 likeData Science
Vamsi Krishna Sethuvamsi344.hashnode.dev·Sep 25, 2024Integrating Keystone and Keycloak: A Guide to OpenStack FederationIdentity federation is the ability to share identity information across multiple identity management systems. In keystone, this is implemented as an authentication method that allows users to authenticate directly with another identity source and the...Discussmellon
Quang Phanquangphan.hashnode.dev·Sep 9, 2024Secure .NET Core API with KeyCloak.In my previous blogs which I talked about setup .NET Aspire, we set up a solution consisting of a UI project and a back-end API project. However, the endpoints in the API project did not have any authorization or authentication mechanisms, which is n...Discuss·249 readskeycloak
Adeniyi Adedotun (nisun-dot)adeniyiadedotun.hashnode.dev·Sep 8, 2024SCIM User Provisioning: Streamlining Identity Management with PythonSCIM User Provisioning: Simplify Identity Management with Python Meta Description: Learn how to implement SCIM user provisioning using Python. Streamline your identity management across Azure AD, Okta, and Google Cloud with step-by-step examples and ...Discuss·1 likeUser Provisioning
Azhar Hussainblog.azharhussain.net·Aug 9, 2024Cloud Security Fundamentals-Protecting Your Data in the CloudAs organizations increasingly migrate their applications and data to the cloud, cloud security has become a top priority. Ensuring that your cloud environment is secure is essential to protecting sensitive information, maintaining compliance, and pre...Discuss·4 likes·698 readsCloud Computing 101cloud security fundamentals
Umesh Panditumeshpandit.hashnode.dev·Aug 4, 2024How to Get Started with Azure Active Directory B2C: A Step-by-Step GuideAs I dive into the world of cloud I’ve come to realize the importance of managing identities and access in a secure and efficient way. Azure Active Directory B2C (Azure AD B2C) helps me do that. In this post, I’ll explain how it works and walk you th...Discuss·1 like·41 readsAzure AD B2C