Security | Microsoft
Blogs

Microsoft

Perspectives on Microsoft Technologies for the Enterprise

Posts Tagged ‘security’

SharePoint Online – Security and Privacy of Data

For many of my clients security and privacy of data in the cloud is the top most priority.  Balancing the fine line of making your data secure but yet still allowing end users to get their jobs done efficiently and effectively is the key to success for a cloud implementation.   You cannot have security without usability because […]

Read more

How to add custom claims to Azure Mobile App authentication

Azure Mobile Apps (formerly known as Azure Mobile Services) provide a great cloud based framework for rapid development of mobile applications (which also could be used to develop web applications, when needed). Azure Mobile Apps empower developer with a tools set (both client-side and server-side) helping to tackle on common mobile application development tasks, like: […]

Read more

TLS 1.2 and .NET Support: How to Avoid Connection Errors

I recently ran into an interesting issue when developing a connector for a third-party API. When trying to connect to the API endpoint, I received the following error message: “An error occurred while making the HTTP request to https://<API endpoint>. This could be due to the fact that the server certificate is not configured properly […]

Read more

Azure Active Directory Reporting APIs Now Available

One of the most common things we hear from our clients is their need to automatically access security related reports from Azure AD. With last week’s announcement from Microsoft about AAD Reporting APIs Public Preview, we now have that capability. Azure AD already has a robust set of activity, security and audit reports, with some […]

Read more

Azure: Did You Know? No Integrated Authentication in SQL Azure

Microsoft Azure SQL Database is very similar to on-premises SQL Server, but there are a few key differences. One of these difference is that SQL Azure doesn’t support integrated authentication (i.e. when caller is identified by its domain account). I assume this is a technical limitation which could be explained by the lack of domain […]

Read more

New features for Office 365 SSO and RMS – Ignite 2015

Some very exciting new capabilities were announced here (Ignite conference) as part of the Office 365 suite powered by Azure AD and rights management service. I will share two of these here • Cloud App Discovery • Document Tracking Cloud App Discovery With 365 you’re already setup for SSO but if you require some advanced […]

Read more

Threat Resistance in Windows 10 – Ignite 2015

Enterprise and Personal Security Model revolves around: Identity protection Info protection Threat resistance Windows 10 addresses the threat resistance in the following three ways: 1. Windows Hello (will use fingerprints, facial recognition and biometrics.) Unlocks your device with biometrics and gives access to your MS passport 2. EDP (Enterprise data protection) Enrollments –> Data Ingress (everything […]

Read more

Next-Gen Information Protection Announcements – Ignite 2015

The following are my notes from the Next-Gen Information Protection announcements at Microsoft Ignite 2015. Microsoft thinks about security in three ways: Being pervasive Transparent People-centric Pervasive – policy applied to data level (when its created inside the ecosystem) so it goes with data across devices. Unified compliance – running data through compliance center across email, […]

Read more

BUILD & IGNITE Know It. Prove It. Tech Challenge Tour

I recently blogged about my personal experiences with the first “Know it. Prove it.” challenge that ran through the month of February 2015. The “Know it. Prove it.” challenge is back! This time it’s bigger and better than ever. The new challenge is a companion to both the Build and Ignite Conferences with 11 amazing […]

Read more

Creating Microsoft FIM Management Agent: lessons learned

Microsoft FIM (Frontend Identity Manager) is a popular enterprise product which is allowing to automate user creation, provisioning and de-provisioning in Microsoft Active Directory. FIM has many out-of-the-box extension connectors which allows for connecting FIM to external systems (like external user catalogs), including a set of web services. When out-of-the-box connectors are not sufficient, it’s […]

Read more

Perficient Microsoft Blog

Insights, best practices and technical perspectives to help you leverage your investment in Microsoft technology solutions to power your business growth

Archives