WhoIAMChasing mules in Paraguay — my journey with fraud protection in the LatAm financial sectorWelcome, dear reader, to my thrilling journey in the world of cybersecurity! As someone originally from Paraguay, I thought I would be…Apr 28, 2023Apr 28, 2023
WhoIAMVerified ID Experience: Part 2If you’ve read the previous blog post or are already an expert, you know that the verifiable credentials spec is interesting enough to…Jan 19, 2023Jan 19, 2023
WhoIAMVerified ID Experience: Part 1When is the last time you said “wow” when you tried something new? Alright, the poke bowl you had yesterday sounds pretty great but I’m…Jan 19, 2023Jan 19, 2023
WhoIAMGetting Power Apps Portal to work with Custom Policies in Azure AD B2CBy Matt TakemotoJun 24, 2022Jun 24, 2022
WhoIAMSetting Up A Helpdesk Experience For Azure AD B2CWe frequently get enterprise customers who are deploying Azure AD B2C for their consumer identity needs and have to carefully consider how…Jun 23, 2022Jun 23, 2022
WhoIAMHow to Recognize and Prevent Credential Stuffing Attacks on Azure AD B2CToday, we are focusing on credential stuffing attacks; what they are, how they are achieved, and most importantly, how to mitigate and…Jun 23, 2022Jun 23, 2022
WhoIAMHashed Password Migration in Azure AD B2CIn this post, we’ll discuss how to deal with migrating hashed passwords from your current identity provider into Azure AD B2C. Password…Jun 23, 2022Jun 23, 2022
WhoIAMUsing social identity providers to log into other websites, a first-person narrativeIt’s around 12AM during a chilly Washington winter in 2019 — I was in bed and just about to fall asleep when I was jolted awake by a short…Jun 23, 2022Jun 23, 2022
WhoIAMImplementing Password History in Azure AD B2CHello and welcome to this month’s technical blog from WhoIAM. In this post, we will dig into how you might be able to implement password…Jun 23, 2022Jun 23, 2022