top of page
Search


The Hidden Steps Microsoft Forgot to Document: Securing Azure App Service Authentication Behind Front Door with Private Link
Today I want to walk through how to configure Azure App Service Authentication when your App Service sits behind Azure Front Door and is accessed through a Private Link. On a dreadful day in october 2025, I received something that most IT people fear - a request from a client! The request included information from the client, that they were struggling with authentication on a Web App deployed behind Azure Front Door using Private Link. What looked like a straightforward setup

Sebastian F. Markdanner
4 days ago7 min read
Â
Â
Â


Mastering Microsoft Entra Authentication Contexts - Part 4: Monitoring and Reporting with KQL & M365IdentityPosture
We’ve covered what Authentication Contexts are, why they matter, and how they help us strengthen access and data security in Microsoft 365. Now it’s time to answer the next question - how do we monitor and report on their usage? Unfortunately, there’s no built-in way to gain that visibility today. Neither Entra ID nor Microsoft 365 provides a simple method to inventory or audit Authentication Contexts across our estate including Conditional Access, PIM and Sensitivity labels

Sebastian F. Markdanner
Nov 38 min read
Â
Â
Â


Mastering Microsoft Entra Authentication Contexts - Part 3: Advanced Data Protection
With identities and access strengthened in part 2 , it’s time to turn our focus to real-world data protection  with Authentication Contexts. One of the more underused capabilities of Authentication Contexts is their power to secure data across the environment, whether through direct enforcement using Sensitivity Labels or by protecting user sessions via Microsoft Defender for Cloud Apps. In this post, we’ll explore exactly that: how to secure organizational data using Authent

Sebastian F. Markdanner
Oct 2010 min read
Â
Â
Â


Securing Microsoft Business Premium Part 04: Passwords Unlocked – Mastering Self-Service Password Reset and Password Protection
With authentication & authorization covered in the previous posts of the series, it's now time to dive into strengthening our password...

Sebastian F. Markdanner
Apr 315 min read
Â
Â
Â


Securing Microsoft Business Premium Part 03: Authorization Best Practices from Zero Trust to Complete Access Control
In Part 02 , we explored authentication , the process of verifying user identities—ensuring users are who they claim to be. Today we’ll...

Sebastian F. Markdanner
Mar 1910 min read
Â
Â
Â
bottom of page
