8 Steps for Using Azure AD Service Principal Certificate Authentication with Azure Automation PowerShell Workflow Runbooks

Lately, I’ve been working with several customers that are getting started with Azure Automation runbooks to help operationalize their Microsoft Azure subscriptions. As part of this process, runbooks need to securely authenticate to Azure with a minimum of administration overhead.  Typically, the authentication solution lands on using certificates to authenticate an Azure AD Service Principal…

6

TechNet Radio: Build Your Hybrid Cloud – Delegating Management in the Azure Cloud with Role-Based Access Control (RBAC) – Part 26

Continuing their  "Build Your Hybrid Cloud" series, Keith Mayer and Andy Syrewicze  show us how to delegate administration to infrastructure admins, application admins, and help desk roles in the Cloud with Azure Role-Based Access Control (RBAC). [1:20] How do we control access to Azure Resource Manager using Role Based Access Control? [13:17] DEMO: How RBAC…


TechNet Radio: (Part 23) Building Your Hybrid Cloud – Azure Key Vault

Continuing their data protection through encryption episodes in their "Build Your Cloud" series, Keith Mayer and Andy Syrewicze explore Azure Key Vault,  a new feature found in Azure that increases security and control over keys and passwords used in cloud apps and services. [1:20] Let’s chat about Azure Key Vault and some of the recently…

1

Quick Script: List Role-Based Access Control (RBAC) Assignments for Azure Resources via PowerShell

Role-Based Access Control (RBAC) is a great new feature of Azure Resource Manager and the Azure Preview Portal for delegating granular access to Azure resources.  Recently, I was asked for an easy way to enumerate the list of resources to which a particular user is assigned.  In this article, I’ll provide a brief code snippet…


Step-by-Step: Get Started with Windows Azure Active Directory (WAAD) and Multi-Factor Authentication

Managing user credentials and application access is becoming more-and-more difficult in today's "cloud era".  In addition to managing access to traditional on-premises applications, we're also faced with managing access to numerous 3rd party cloud-based applications – many of which default to managing identities on an app-by-app basis.  And … securing all of those discrete identities…

25

Guided Hands-on Lab: Extend Your Private Cloud with Windows Azure Virtual Networks and Windows Server 2012 [ 20 Key Scenarios with Windows Azure Infrastructure Services ]

This month, my fellow IT Pro Technical Evangelists and I are authoring a new articles series on 20 Key Scenarios with Windows Azure Infrastructure Services.  You can catch the full series at https://aka.ms/CloudTop20.  In today’s article in this series, we’ll discuss extending our On-premises Datacenter into a Hybrid Network Infrastructure with Windows Server 2012, Windows…

3

PowerShell Security and Delegation – PKI and PSRemoting

Yesterday, I had a great time with the CincyPowerShell user group discussing security and delegation in PowerShell with PKI, code-signing certificates, PowerShell Remoting and PowerShell Web Access ( new with Windows Server 2012! ). In this article, I’m posting links to the PowerShell snippets we walked through for each topic … PowerShell and PKI Lots…


Walkthrough: Creating Private Clouds with System Center 2012 SP1 Virtual Machine Manager – Build Your Private Cloud in a Month

So far in our Build Your Private Cloud in a Month series, we’ve prepared a scalable, resilient foundation and created our storage, network and compute fabric in System Center 2012 SP1 Virtual Machine Manager.  Now …. we’re ready to build some Private Clouds! In System Center 2012 SP1, we can build “Private Clouds” as pools…

3

Virtual Disk Security in Hyper-V and VMware #winserv #hyperv #itpro #vmware #vmworld

Another day, another great IT Pro virtualization event! 🙂 Last week, I was asked the following question by a concerned IT Pro at a hosting partner organization … Q: I read an article where an attacker could potentially upload a malicious or compromised VMware VMDK, change the disk paths to access alternative files on the host…

2