dimaggio Profile Banner
Angelo Di Maggio Profile
Angelo Di Maggio

@dimaggio

Followers
342
Following
964
Statuses
816

Identity Management Architect. Passionate about identity, federation, zero trust security, and passwordless. Dad. Reader. Learner.

New York City
Joined April 2008
Don't wanna be here? Send us removal request.
@dimaggio
Angelo Di Maggio
3 months
@merill Thanks for sharing. Happy to hear MFA enforcement being extended to other admin portals. For customers looking to enforce MFA prior to MS enforcement is CA policy using custom security attribute feasible here or is the most granular option to target Microsoft admin portals?
1
0
0
@dimaggio
Angelo Di Maggio
8 months
@merill @merill Love the update & graphics! If orgs wanted to get in front of this & implement a CA policy that mimics what MS will enforce, what app would we look to target for phase 1 and then for phase 2? Microsoft admin portals or Windows Azure Service Mgt provide feature parity?
1
0
0
@dimaggio
Angelo Di Maggio
8 months
@JefTek Thanks for sharing, Jeff. That’s a delightful UX. Bar has been set for the Authenticator app upgrade to passkey.
0
0
0
@dimaggio
Angelo Di Maggio
9 months
Boom. Love it. I’d offer that the details are light given the timelines though.
@merill
Merill Fernando
9 months
Folks, there is an update with additional details on the Microsoft will require MFA for all Azure users post. Here's a quick summary. ✅ Scope → Azure Portal → CLI → PowerShell → Terraform to administer Azure resources 👥 Impact on end users The following will be impacted only if they are signing into administer. Apps/sites hosted on Azure are not impacted. → Students → Guest users → other end-users 🚫 Exclusions Token-based accounts used for automation are excluded, including → Service principals → Managed identities → Workload identities 📆 Timeline Beginning July 2024, a gradual rollout of the portal will commence. Once completed a similar gradual rollout will start for → CLI → PowerShell → Terraform 📲 MFA Methods All Entra ID MFA methods will be available. ⛔ Exceptions There will be no opt-out. An exception process will be provided for cases where no workaround is available. 💌 Communication Microsoft will send detailed information and timelines through official emails. This blog post was to raise awareness. Read the full post and comments at ✅ Rolling out MFA to your users If there is one takeaway that I can share. It is to start enrolling your Azure users for MFA if you haven't already. Here's a quick guide. Using MFA Registration Policy If you have E5 (Entra ID P2) it's as simple as configuring this MFA registration policy which will ensure your users have at least one form of MFA set up If you don't have E5 see below on how you can report on users without MFA and send targeted comms. Conditional Access policy for MFA Alternatively if you have P1 you can create a conditional access policy requiring MFA. This will force users to register for MFA if they haven't set one up for their account. NOTE: If you don't have a conditional access policy for MFA I strongly recommend you create one using the template at Monitoring MFA Registration You can monitor who has registered for MFA using the authentication methods registration report. See This can also be used by those who don't have P2 to monitor and send targeted comms to users that don't have MFA. Here's a PowerShell script I've shared previously to quickly get a report of the MFA state of all your users. MFA email templates We also provide email templates that you can use to inform your users about MFA and why you are rolling it out. Download them from Found this useful? Please bookmark, like and repost to raise awareness. It's 2024. Let's get secure and keep the baddies out.
Tweet media one
0
0
2
@dimaggio
Angelo Di Maggio
10 months
@tuna_gezer @NathanMcNulty @Thomas_Live @fabian_bader @samilaiho @samilamppu @DrAzureAD @merill @ericonidentity Any of these products recover clientIds / ObjectIds for hard deleted app registrations or enterprise apps, including multi-tenant apps? If not, what are the implications ?
0
0
1
@dimaggio
Angelo Di Maggio
10 months
@Robert_A_Berger Just keep buying
0
0
2
@dimaggio
Angelo Di Maggio
10 months
@JefTek @eXDeeNZ @NathanMcNulty @janbakker_ Curious - Would it not default to ‘system preferred’ and prefer passkeys over PSI?
1
0
1
@dimaggio
Angelo Di Maggio
1 year
Really happy to see Microsoft Entra conditional access policies providing broader support (OIDC & SAML apps) for the every time flag. Full appreciate the potential friction, MFA fatigue but feels like this can be powerful capability if used appropriately.
0
0
3
@dimaggio
Angelo Di Maggio
1 year
@dickiebush Review
0
0
0
@dimaggio
Angelo Di Maggio
1 year
RT @RachelTobac: One of the easiest ways for me to hack is simply: 1. Look up who works at a org on LinkedIn 2. Call Help Desk (spoof phone…
0
516
0
@dimaggio
Angelo Di Maggio
2 years
@SwiftOnSecurity Love this. The key item for me here is the ‘same corporate device’ so the notion of very infrequent prompts really needs endpoint compliance verification; and risk and fraud signals must be continuously evaluated
0
0
3
@dimaggio
Angelo Di Maggio
2 years
Love the simplicity of this feature when compared to adding the Windows accounts browser extension to Chrome browsers. Seamless SSO + Device Compliance Support
0
0
1
@dimaggio
Angelo Di Maggio
2 years
@JefTek Love the simplicity of this feature! Now that this is available, what would your thoughts on the value of the Windows accounts browser extension?
0
0
0
@dimaggio
Angelo Di Maggio
2 years
@KerrPoints We enjoyed Lava Lava Beach Club, Duke’s and Kalaheo Cafe & Coffee
0
0
1
@dimaggio
Angelo Di Maggio
3 years
@Alex_T_Weinert Love the capability. The license guidance for a feature in public preview makes it difficult to plan. Does this mean customers may need AAD P3? Lol. Seriously though, any clarity on licensing requirements would be helpful.
Tweet media one
0
0
2
@dimaggio
Angelo Di Maggio
3 years
Lots of interest in phishing resistant Authenticators to protect critical infrastructure and services. Adaptive, risk-based policy engine coupled with strong forms of authentication is always expensive / excessive until it’s not enough.
@proofpoint
Proofpoint
3 years
Phishing kits are software developed to aid threat actors in harvesting #credentials and quickly capitalizing on them. Most of these kits have been around for years so why the renewed interest? #credentialtheft #phishkit @threatinsight
0
0
1
@dimaggio
Angelo Di Maggio
3 years
This is a big security (and operational resiliency) improvement and will be interesting to see how quickly this gets expanded to more services and clients.
0
0
0