IdefixBlog Block Device Code Introduction Device code phishing is a method employed by threat actors to exploit the device code authentication flow.... Julian RasmussenMar 4, 2025
IdefixBlog The Importance of Backing Up Your Conditional Access Policies In today’s rapidly evolving digital landscape, maintaining robust security measures is more critical than ever. Conditional Access (CA)... Julian RasmussenFeb 19, 2025Feb 19, 2025
IdefixBlog Entra configurations you MUST do! Security and efficiency are paramount for organizations of all sizes. Microsoft’s Entra ID is a versatile and robust... Julian RasmussenFeb 5, 2025Feb 6, 2025
IdefixBlog Secure your conditional access with Admin units In today’s ever-evolving digital landscape, maintaining security while managing access is paramount. Entra ID Administrative Units (AUs), a... Julian RasmussenJan 23, 2025
IdefixBlog Administrative Units Overview Administrative Units in Entra ID provide a flexible and efficient way to manage access and permissions within... Julian RasmussenJan 6, 2025
IdefixBlog Break the glass strategy Let’s talk about Break the glass strategy – the Last resort plan enacted in emergency situations! A break... Julian RasmussenSep 25, 2024
IdefixBlog Summer news ’24 My summer vacation is over for me, and slowly the rest of Norway starts waiking up and we... Julian RasmussenAug 1, 2024Aug 1, 2024
IdefixBlog Entra ID – Global secure access Global Secure Access is out of preview and general available – but what is this actually? Let me... Julian RasmussenJul 5, 2024
IdefixBlog Let’s talk about Passkeys So, let’s talk about Passkeys and what it is. A Passkey is a digital key that can be... Julian RasmussenApr 23, 2024