Microsoft organizes Microsoft Build 2022 as a free digital event between Monday May 24th 5 PM CEST and Thursday May 26th 11 AM CEST.
Microsoft Build is Microsoft’s annual conference event, aimed at software engineers and web developers using Windows, Microsoft Azure and other Microsoft technologies. First held in 2011, it serves as a successor for Microsoft's previous developer events, the Professional Developers Conference (PDC) and MIX.
During Build 2022, you can enjoy the following general and Identity-related sessions:
On demand sessions
Your security operations center ingests lots of data, but how can you pinpoint the most important identity-based attacks? Using Azure AD Identity Protection's API collections, you can identify risky users and workload identities, view details on risk detections, and even dismiss risk or confirm compromised accounts. In this session you will learn how easy it is to use our API collections to manage identity risk directly from the tool of your choice.
Speaker: Kyle Marsh
Continuous Access Evaluation, CAE, allows access to an API, resource, protected by Azure AD to be revoked in near real time. Instead of a fixed time-based access, CAE access can be based on security events like the user's password changing, MFA being applied, or even the user changing their location. In this session we will demonstrate building a client app with CAE support. We also discuss the evolution of CAE going forward.
Speakers: Saeed Akhter and Nick Gomez
Date: Wednesday, May 25 6PM – 6:35PM CEST
A key to creating secure apps is managing the identities in those apps. Users must feel confident that the apps they use, manage identities for authentication and authorization securely. That’s where the Microsoft identity platform can help, and it is designed to make managing identities easier with standards compliant authentication, open-source libraries, and application management tools. Attend this session to discover how to add authentication to your app, learn about delegated permissions, and understand application permissions.
Secrets are like radioactive materials. They must be handled with extreme care. No one should be managing them. In this session, we will discuss how we’re on a mission to make secrets invisible to the developers with technologies like Managed Identities on Azure resources, Azure Key vault and workload identity federation.
PRT 153 Improvements to the Azure Active Directory application model and API
Speakers: Suresh Jayabalan and Philippe Signoret
Date: Wednesday, May 25 6PM – 7PM CEST
We are looking to improve the Azure AD application model. If you're a ISV/developer experienced with registering applications or an admin managing application instances (i.e. service principals) in your tenant, and you want to provide feedback on the next generation application model, we'd love to work with you and learn your pain points to shape up the v.Next of the application model and API.An Azure AD application is defined by its application object, which resides in the Azure AD tenant where the application was registered. As a developer, you've used the Azure App registrations portal or the Microsoft Graph application API to register and configure application objects. You may have encountered specific issues such as the inability to group programs or the addition of non-identity configurations. In every tenant where the application is used, a service principle is created. As an administrator, you manage apps in your tenant by configuring service principals in your tenant, such as assigning users to the apps.If this resonates with you, we would love to talk to you!!We are in the very early stage of evolving the application model and we would love to talk to the developer audience at //build to get your thoughts.