Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Tag: azure

  • Should I Bind Non-Windows Devices to Active Directory?

    Digital certificates are starting to take over as the preferred method of network authentication because of their proven superiority to passwords in security and user experience. Many organizations are wanting to migrate to the cloud to start implementing certificate-based solutions, ...

    Read More
  • Tying IP Addresses to Azure Active Directory Users

    Effectively tracking and managing identity context is one of the most important aspects of a secure Azure-based network. Without accurate identity context, it’s near impossible to determine if someone is an unauthorized user.

    Read More
  • I Have Active Directory, How do I Move to the Cloud?

    It’s no secret that organizations are making the transition to cloud-based network environments. This is especially true considering the dramatic increase in remote work due to the global pandemic. Network administrators that use Active Directory (AD) want to be able ...

    Read More
  • The NPS Extension for Cloud Authentication

    Authentication security is an incredibly diverse field with countless options for organizations to choose from. How to authenticate your users to a secure network is a difficult decision to make as authentication is one of the primary lines of defense ...

    Read More
  • How to Renew Certificates from a Microsoft Certificate Authority

    One of the best ways for a company to keep their security robust is taking advantage of certificates for their network environment. Certificates utilize public-private key encryption to encrypt information sent securely over-the-air . While certificates offer numerous advantages, improper ...

    Read More
  • How to Configure Azure AD Attributes on Certificates

    Attribute mapping in Azure AD (Microsoft Entra ID) is easier than you might think. With a simple SAML application, you can use customizable Azure attributes to enforce dynamic policy options on your 802.1X network. What are Azure AD (Microsoft Entra ...

    Read More
  • Can I Use Group Policy Objects with Azure?

    As technology continues to migrate to cloud-based networking, many organizations have sought to take advantage of efficient cloud solutions. As a result, Microsoft-based organizations have been transitioning to Azure for their directory services because Active Directory does not work natively ...

    Read More
  • How To Use Azure AD Conditional Access for a Zero Trust 802.1x Network

    The standard method of thinking about network security is long overdue for an update. The usual “perimeter protection” approach consists of defining, and then controlling, a virtual boundary to make it airtight against the outside. This introduces a fallacy; the ...

    Read More
  • Microsoft PKI Best Practices

    A Public Key Infrastructure (PKI) is an 802.1x network security solution that uses public-private key cryptography to authenticate users for online resources. PKIs can be configured to authenticate for Wi-Fi, web applications, VPN, desktop logon, and much more. However, setting ...

    Read More
  • TLS/SSL Encryption with Azure

    Improving cyber security is crucial for organizations as one cyber attack could trigger the downfall and bankruptcy of an entire business. That’s why end-to-end encryption has become a network security standard because it involves encrypting an online connection between two ...

    Read More