top of page
Search


Microsoft Entra Restricted Management Administrative Units: Delegating Control Without Sacrificing Security
Today, I’ll take a closer look at Microsoft Entra Administrative Units (AUs) and Restricted Management Administrative Units (RMAUs) Despite being incredibly useful, AUs and RMAUs are still underutilized in many environments. As organizations scale and responsibilities shift across teams, the need for scoped delegation becomes increasingly important. AUs let you define clear administrative boundaries, while RMAUs go a step further by blocking even high-privileged roles from m

Sebastian F. Markdanner
Jun 9, 20258 min read


Securing Microsoft Business Premium Part 05: Efficient Identity Management for External Users with Microsoft Entra
Managing external users is one of the most tedious—but also critical—challenges in a Microsoft Business Premium environment. With authentication , authorization , and password security covered in earlier posts, we're now prepared to dive into identity and access management (IAM) specifically for external and guest users. Collaboration beyond organizational boundaries presents unique security challenges, particularly in balancing streamlined access and robust security practic

Sebastian F. Markdanner
May 26, 20259 min read


Go With the Flow: Mastering Microsoft Entra User Flows—Self-Service Sign-Up in a Workforce tenant
Managing new guest accounts can be a daunting task—especially when you’re dealing with high turnover, distributed teams, or unknown user lists. Today, I’ll show you how Microsoft Entra User Flows , otherwise known as Self-Service Sign-Up , can help automate and streamline this process within a workforce tenant . Organizations such as retail chains, shipping companies, or accounting firms frequently collaborate with diverse groups of customers , vendors , and external partner

Sebastian F. Markdanner
Apr 28, 202510 min read


Securing Microsoft Business Premium Part 04: Passwords Unlocked – Mastering Self-Service Password Reset and Password Protection
With authentication & authorization covered in the previous posts of the series, it's now time to dive into strengthening our password policies, empowering end-users, and enhancing overall password security. As I've gone over previously , passwords aren't exactly bulletproof, but for many organizations, transitioning to a fully passwordless setup overnight isn't realistic. While we steadily work towards that passwordless dream, managing and securing passwords across the org

Sebastian F. Markdanner
Apr 3, 202515 min read
bottom of page
