If playback doesn't begin shortly, try restarting your device.
•
You're signed out
Videos you watch may be added to the TV's watch history and influence TV recommendations. To avoid this, cancel and sign in to YouTube on your computer.
CancelConfirm
Share
An error occurred while retrieving sharing information. Please try again later.
15,695 views • Mar 6, 2024 • #azure #johnsavillstechnicaltraining #microsoft
Show less
Some authentication flows are more susceptible to phishing attacks and abuse like the device code flow. Now we can block them with conditional access.
🔎 Looking for content on a particular topic? Search the channel. If I have something it will be there!
▬▬▬▬▬▬ C H A P T E R S ⏰ ▬▬▬▬▬▬
00:00 - Introduction
00:30 - Device code flow
02:31 - Phishing the auth flow
03:47 - Authentication transfer
04:28 - Protecting with conditional access
05:16 - Where are authentication flows being used?
06:42 - Creating a CA policy
07:57 - Demo of block
10:18 - Summary
▬▬▬▬▬▬ Want to learn more? 🚀 ▬▬▬▬▬▬
📖 Recommended Learning Path for Azure
🔗 https://learn.onboardtoazure.com
🥇 Certification Content Repository
🔗 https://github.com/johnthebrit/Certif...
📅 Weekly Azure Update
🔗 • Azure Infrastructure Updates
☁ Azure Master Class
🔗 • Microsoft Azure Master Class v2 (bein...
⚙ DevOps Master Class
🔗 • DevOps Master Class
💻 PowerShell…...more
...more
How this content was made
Auto-dubbed
Audio tracks for some languages were automatically generated. Learn more