security compliance and identity
196 TopicsProvenance at Scale | The Trust Imprint Protocol for Persistent Agent Identity-Revocable Authority
Executive summary Autonomy without identity is a technical blind spot with real consequences. I published the Sovereign Agent Manifesto (V2026) and a Technical Announcement for the Trust Imprint Protocol, a protocol-level design that binds an agent’s authority, semantics, and evidentiary history to a persistent, revocable identity. The design is implemented, tested, and supported by a substantial Success Corpus that documents operational behavior and edge cases. Why this matters to Microsoft engineers and platform teams Modern orchestration and cloud AI services solve chaining, memory, and tool invocation. What they rarely solve is who the agent actually is when it acts across sessions, tenants, and cloud boundaries. Without identity primitives, long-running agents are ephemeral: they accumulate state but cannot prove continuity, inherit bounded authority from a human origin, or present auditable lineage for decisions. The Trust Imprint Protocol supplies practical primitives that can be integrated into Azure AI stacks, Copilot extensions, and serverless orchestration to make agentic systems accountable and verifiable. Technical highlights Handshake primitive — deterministic mechanism for an agent to inherit bounded authority from a human operator. SIK Secure Identity Key — a revocable, persistent identity token that survives restarts, migrations, and scaling events. Deterministic semantic scope — a constrained interpretation layer so an agent’s intent and meaning remain auditable. Evidence corpus — a 900+ item Success Corpus demonstrating operational behaviors, edge cases, and revocation scenarios. Practical integration ideas for Azure and Microsoft tooling Identity middleware that attaches SIK metadata to every action, designed to interoperate with Azure AD and managed identities. Provenance layer in orchestration engines such as Durable Functions and Logic Apps to record handshake events, revocation signals, and evidence pointers. Verification API for downstream services to validate an agent’s identity and recent behavioral record before accepting high-risk actions. Example scenarios: accountable multi-agent coordination, enterprise automation with revocable authority, and reproducible research experiments requiring verifiable agent identity. What I’m asking from this community I welcome practical feedback, integration ideas, and collaborators who care about agent accountability. Specific asks: Engineers to prototype middleware for SIK propagation in Azure SDKs. Researchers to help formalize identity continuity metrics and verification protocols. Platform maintainers to discuss API design for provenance, revocation, and verification. Links and next steps Read the Sovereign Agent Manifesto and Technical Announcement at www.husin.org. If you want a short technical walkthrough, a concise design doc, or sample code snippets for Azure integration, I can share them. Closing brief I share this as an engineer who prefers hard evidence over slogans. The Trust Imprint Protocol is not a thought experiment dressed in buzzwords — it is an implemented architecture backed by documented successes and a 900+ item corpus of operational evidence. If you value practical, auditable approaches to agent autonomy, this work offers a concrete path forward. I’m open to critique, collaboration, and pragmatic pilots — and yes, I enjoy a little dark humor about the future of autonomous systems, because if we don’t laugh at our own hubris, who will. — Ahmed Al.Hussain Engineer & Systems Architect3Views0likes0CommentsRequest to merge multiple Microsoft Learn certification IDs
Hello Microsoft Learn Support Team, I was advised by Pearson VUE and Microsoft Support to contact Microsoft Learn to request merging of my certification profiles. I have paid for the PL-900 exam, but the exam confirmation and status are not visible due to multiple Microsoft Learn IDs. The following Microsoft Learn IDs need to be merged: - ms1100781607 - ms1100998551 - ms1100999029 Kindly help merge these IDs and associate my PL-900 exam correctly. Thank you.33Views0likes2CommentsMicrosoft Security Operations Analyst Blueprint Survey Opportunity
Greetings! Microsoft is considering updating a credential for Microsoft Security Operations Analyst, and we need your input through our exam blueprinting survey. The blueprint determines how many questions each skill in the exam will be assigned. Please complete the online survey by January 6, 2026. Please also feel free to forward the survey to any colleagues you consider subject matter experts for this certification. If you have any questions, feel free to contact John Sowles at josowles@microsoft.com or Don Tanedo at dtanedo@microsoft.com. Microsoft Security Operations Analyst blueprint survey link: https://microsoftlearning.co1.qualtrics.com/jfe/form/SV_3eXv88iTMTckTVI Thank you!73Views1like0CommentsNeed for a Microsoft Security Certification for End-users
Hello Learning Community! I'm a Security Skilling Portfolio manager at Microsoft and looking for community feedback on an idea for a new certification. What if Microsoft offered a certification specifically for an organization's business users/end-users on cybersecurity best practices and how to be a security first/responsible business user. The cert could cover Cybersecurity basics, data security best practices, keeping your devices and data safe from malware, protect your info from phishing scams, defending against ransomware, and more. This certification would not be as exhaustive as our technical certifications, uniquely targeting the business/end-user audience. Would you or your organization benefit from this type of certification? All feedback welcome, thanks!556Views10likes10Commentsauthetification app
I changed my phone and I no longer have access to my authentication application so I can no longer connect to my email... I just have another email to receive a code in case I forget my password but when I use it it still asks me for a code from the authentication application.167Views1like3CommentsQ1 Recap: What’s new in Microsoft Security skilling
As we wrap up an exciting first quarter, we’re thrilled to share some of the latest updates, resources, and learning opportunities in the world of Microsoft Security. Whether you’re a developer, IT admin, or security professional, there is something here for everyone looking to level up their skills and stay ahead in our ever-evolving landscape. Microsoft Sentinel data lake is now live! Sentinel data lake is a centralized repository that allows you to store all your structured and unstructured data at any scale. This means better risk detection, faster investigations, and more powerful analytics for your security operations. To learn how to incorporate data lake into your security operations, visit our new collection of Sentinel data lake resources. Major updates to Microsoft learning paths and modules We’ve rolled out several new and updated modules to help you build expertise in the latest security technologies: Secure AI Interactions and Environments with Microsoft Purview Overview: Learn how to secure developer environments by discovering AI apps, assessing data access, and applying protection. Key skills: Detect generative AI usage, assign user risk levels, and enforce policies dynamically based on behavior and data sensitivity. Who should take it Developers and security pros working with AI in enterprise settings. Global Secure Access Overview: Global secure access provides secure, identity-based access to resources like SharePoint, Exchange, and OneDrive. Key skills: Learn how GSA verifies identity and device before granting access, and how to onboard and use GSA for secure resource access. Who should take it? IT admins and users transitioning to global secure access Plan, Implement, and Administer Conditional Access Overview: Optimize conditional access policies and leverage Microsoft Security Copilot for advanced simulations in Microsoft Entra. Key Skills: Set up and simulate conditional access scenarios, automate and enhance security operations. Who Should Take It: Security engineers and admins managing identity and access. Automate Identity Lifecycle Using Lifecycle Workflows in Microsoft Entra Overview: Configure and deploy lifecycle workflows for onboarding, role changes, and offboarding. Key skills: Customize workflows, monitor, and troubleshoot. Who should take It? Identity and access administrators. New Applied Skill: Microsoft Entra We’re excited to announce a new applied skill: Get started with identities and access using Microsoft Entra. This new Microsoft Applied Skill credential is designed for identity and access professionals who want to prove their hands-on abilities with Microsoft Entra. It’s not just about theory—this is your chance to demonstrate real-world skills that matter in today’s security landscape. What’s covered? You’ll be assessed on practical tasks like: Creating, configuring, and managing identities Assigning roles and licenses Managing groups and memberships Implementing password protection and self-service password reset (SSPR) Enabling and managing multifactor authentication (MFA) Managing application access and permissions Enhancing security with identity protection and governance features Why pursue this? Identity is at the core of Zero Trust. By earning this credential, you show you can confidently manage user access, protect sensitive data, and respond to evolving threats. The learning path is concise—typically under four hours—and includes hands-on labs and scenario-based exercises to ensure you’re ready for real-world challenges. Who should pursue it? Anyone responsible for identity and access management, from IT admins to security engineers, will benefit. It’s also a great way to prepare for more advanced certifications or to upskill quickly for new projects. How to get started? Complete the “Perform basic identity and access tasks” learning path, then take the assessment lab to earn your credential and showcase your expertise to your team and the broader community. New Microsoft Virtual Training Day: Strengthen Cloud Security with Microsoft Defender for Cloud This hands-on, instructor-led event is designed to help security professionals, cloud admins, and IT teams master the essentials of protecting cloud workloads with Microsoft Defender for Cloud. What’s included? Configuring Defender for Cloud: Enable enhanced security features for servers, set up virtual networks, and deploy monitoring agents. Centralized Monitoring: Create and configure Log Analytics workspaces to centralize compliance and security data. Just-in-Time VM Access: Implement just-in-time to reduce exposure to remote access attacks. Cloud security posture management: Explore dashboards for security posture, regulatory compliance, workload protections, and inventory. Hands-on Labs: Each module includes guided walkthroughs and labs, so you can practice what you learn in a real Azure environment. Governance and Automation: Assign governance rules, automate threat detection, and use Secure Score to track and improve your security posture. Who should attend? This virtual training day is perfect for Security Engineers, Cloud Administrators, Security Operations Teams, and anyone responsible for securing Azure resources and ensuring regulatory compliance. The content is accessible for those with a basic understanding of Azure services and security principles, but it’s also deep enough for seasoned professionals to gain new insights. What’s the experience like? Expect a mix of instructor presentations, live demos, and hands-on labs. You’ll get access to a sandbox environment to try out everything from enabling Defender for Cloud to running advanced security analytics. 🤖 New Security for AI Skilling Paper We’re also promoting our new paper on security for AI skilling, which explores best practices and strategies for securing AI environments. Please read this paper to prepare for the AI era. 🛡️ Security Hub Reminder And finally, don’t forget to visit the Security Hub for the latest resources, updates, and community discussions.1.3KViews1like1Comment