Jonas MarkströmEnrolling security keys on-behalf-of users with Microsoft Entra IDMicrosoft’s Graph API now supports lifecycle management for FIDO2 security keys, such as YubiKeys. In this article, we’ll explore the tools…Dec 2
Jonas MarkströmThe complete guide to RDP with Security Keys (PC)Tired of constantly typing in passwords or using clunky two-factor authentication like OTP to access your Remote Desktop? With the…Jan 8, 20237
Jonas MarkströmObtaining AAGUID and Certification Status with the MDS Checker appLeveraging AAGUIDs to whitelist approved FIDO / passkey authenticators is crucial for avoiding a laissez-faire implementation of your MFA…Oct 11Oct 11
Jonas MarkströmThe complete guide to RDP with Security Keys (Mac)Are you struggling to secure remote desktop connections for Mac users in a mixed environment? Look no further. In this article, we explore…Aug 252Aug 252
Kevin FinnertyYubiKeys: The Gold Standard for Securing Devices and Software AccessIn today’s digital age, securing your online presence is more important than ever. One of the most effective ways to protect your accounts…Oct 51Oct 51
Jonas MarkströmEnrolling security keys on-behalf-of users with Microsoft Entra IDMicrosoft’s Graph API now supports lifecycle management for FIDO2 security keys, such as YubiKeys. In this article, we’ll explore the tools…Dec 2
Jonas MarkströmThe complete guide to RDP with Security Keys (PC)Tired of constantly typing in passwords or using clunky two-factor authentication like OTP to access your Remote Desktop? With the…Jan 8, 20237
Jonas MarkströmObtaining AAGUID and Certification Status with the MDS Checker appLeveraging AAGUIDs to whitelist approved FIDO / passkey authenticators is crucial for avoiding a laissez-faire implementation of your MFA…Oct 11
Jonas MarkströmThe complete guide to RDP with Security Keys (Mac)Are you struggling to secure remote desktop connections for Mac users in a mixed environment? Look no further. In this article, we explore…Aug 252
Kevin FinnertyYubiKeys: The Gold Standard for Securing Devices and Software AccessIn today’s digital age, securing your online presence is more important than ever. One of the most effective ways to protect your accounts…Oct 51
Jonas MarkströmPublishing Certificate Revocation Lists (CRLs) Using Microsoft IIS: A Step-by-Step GuideEnsuring the security of your organization’s Public Key Infrastructure (PKI) requires proper management of certificate revocation. This…Aug 17
corbadoUser Presence & Verification for Passkeys: A Comprehensive GuideGet explanations and detailed insights how WebAuthn User Verification and WebAuthn User Presence for Passkeys works.Sep 11
Jonas MarkströmForcing PIN change on first use with FIDO2 security keysThe ability to expire a security key PIN upon initial use is poised to become one of the more impactful features of FIDO (CTAP) 2.1…May 10