Blog Archives

Default checks when implementing Hybrid Identity, Part 1: Introduction and Microsoft tooling

This entry is part 1 of 4 in the series Default checks when implementing Hybrid Identity

Microsoft has introduced an impressive array of technologies and an awesome vision on Hybrid Identity: Their vision entails seamless access to corporate resources, services and applications for people, no matter where these resources, services and apps are located (either on-premises or in the cloud) while in the mean time allowing for strong authentication and granular […]

0  

Default checks when implementing Hybrid Identity, Part 2: Orphaned UPN Suffixes

This entry is part 2 of 4 in the series Default checks when implementing Hybrid Identity

Microsoft has introduced an impressive array of technologies and an awesome vision on Hybrid Identity: Their vision entails seamless access to corporate resources, services and applications for people, no matter where these resources, services and apps are located (either on-premises or in the cloud) while in the mean time allowing for strong authentication and granular […]

0  

Default checks when implementing Hybrid Identity, Part 3: Linked Mailboxes

This entry is part 3 of 4 in the series Default checks when implementing Hybrid Identity

Microsoft has introduced an impressive array of technologies and an awesome vision on Hybrid Identity: One of the parts of your organization’s journey in implementing Hybrid Identity, might be to migrate from DirSync to Azure AD Connect with Azure AD Sync. After you export and import the configuration,  you might expect to see the same […]

0  

Default checks to perform when implementing Hybrid Identity, Part 4: Groups with large memberships

This entry is part 4 of 4 in the series Default checks when implementing Hybrid Identity

Microsoft has introduced an impressive array of technologies and an awesome vision on Hybrid Identity: Their vision entails seamless access to corporate resources, services and applications for people, no matter where these resources, services and apps are located (either on-premises or in the cloud) while in the mean time allowing for strong authentication and granular […]

0