security compliance and identity
197 TopicsCybersecurity for Business Professional Blueprint Survey Opportunity
Greetings! Microsoft is considering a credential for Cybersecurity for Business Professional, and we need your input through our exam blueprinting survey. The blueprint determines how many questions each skill in the exam will be assigned. Please complete the online survey by January 29, 2026. Please also feel free to forward the survey to any colleagues you consider subject matter experts for this certification. You may send this to people external to Microsoft as well. If you have any questions, feel free to contact John Sowles at josowles@microsoft.com or Don Tanedo at dtanedo@microsoft.com. Cybersecurity for Business Professional blueprint survey link: https://microsoftlearning.co1.qualtrics.com/jfe/form/SV_cvwduCJLaOlIHtQ8Views0likes0CommentsProvenance at Scale | The Trust Imprint Protocol for Persistent Agent Identity-Revocable Authority
Executive summary Autonomy without identity is a technical blind spot with real consequences. I published the Sovereign Agent Manifesto (V2026) and a Technical Announcement for the Trust Imprint Protocol, a protocol-level design that binds an agent’s authority, semantics, and evidentiary history to a persistent, revocable identity. The design is implemented, tested, and supported by a substantial Success Corpus that documents operational behavior and edge cases. Why this matters to Microsoft engineers and platform teams Modern orchestration and cloud AI services solve chaining, memory, and tool invocation. What they rarely solve is who the agent actually is when it acts across sessions, tenants, and cloud boundaries. Without identity primitives, long-running agents are ephemeral: they accumulate state but cannot prove continuity, inherit bounded authority from a human origin, or present auditable lineage for decisions. The Trust Imprint Protocol supplies practical primitives that can be integrated into Azure AI stacks, Copilot extensions, and serverless orchestration to make agentic systems accountable and verifiable. Technical highlights Handshake primitive — deterministic mechanism for an agent to inherit bounded authority from a human operator. SIK Secure Identity Key — a revocable, persistent identity token that survives restarts, migrations, and scaling events. Deterministic semantic scope — a constrained interpretation layer so an agent’s intent and meaning remain auditable. Evidence corpus — a 900+ item Success Corpus demonstrating operational behaviors, edge cases, and revocation scenarios. Practical integration ideas for Azure and Microsoft tooling Identity middleware that attaches SIK metadata to every action, designed to interoperate with Azure AD and managed identities. Provenance layer in orchestration engines such as Durable Functions and Logic Apps to record handshake events, revocation signals, and evidence pointers. Verification API for downstream services to validate an agent’s identity and recent behavioral record before accepting high-risk actions. Example scenarios: accountable multi-agent coordination, enterprise automation with revocable authority, and reproducible research experiments requiring verifiable agent identity. What I’m asking from this community I welcome practical feedback, integration ideas, and collaborators who care about agent accountability. Specific asks: Engineers to prototype middleware for SIK propagation in Azure SDKs. Researchers to help formalize identity continuity metrics and verification protocols. Platform maintainers to discuss API design for provenance, revocation, and verification. Links and next steps Read the Sovereign Agent Manifesto and Technical Announcement at www.husin.org. If you want a short technical walkthrough, a concise design doc, or sample code snippets for Azure integration, I can share them. Closing brief I share this as an engineer who prefers hard evidence over slogans. The Trust Imprint Protocol is not a thought experiment dressed in buzzwords — it is an implemented architecture backed by documented successes and a 900+ item corpus of operational evidence. If you value practical, auditable approaches to agent autonomy, this work offers a concrete path forward. I’m open to critique, collaboration, and pragmatic pilots — and yes, I enjoy a little dark humor about the future of autonomous systems, because if we don’t laugh at our own hubris, who will. — Ahmed Al.Hussain Engineer & Systems Architect31Views0likes0CommentsRequest to merge multiple Microsoft Learn certification IDs
Hello Microsoft Learn Support Team, I was advised by Pearson VUE and Microsoft Support to contact Microsoft Learn to request merging of my certification profiles. I have paid for the PL-900 exam, but the exam confirmation and status are not visible due to multiple Microsoft Learn IDs. The following Microsoft Learn IDs need to be merged: - ms1100781607 - ms1100998551 - ms1100999029 Kindly help merge these IDs and associate my PL-900 exam correctly. Thank you.85Views0likes2CommentsMicrosoft Security Operations Analyst Blueprint Survey Opportunity
Greetings! Microsoft is considering updating a credential for Microsoft Security Operations Analyst, and we need your input through our exam blueprinting survey. The blueprint determines how many questions each skill in the exam will be assigned. Please complete the online survey by January 6, 2026. Please also feel free to forward the survey to any colleagues you consider subject matter experts for this certification. If you have any questions, feel free to contact John Sowles at josowles@microsoft.com or Don Tanedo at dtanedo@microsoft.com. Microsoft Security Operations Analyst blueprint survey link: https://microsoftlearning.co1.qualtrics.com/jfe/form/SV_3eXv88iTMTckTVI Thank you!85Views1like0CommentsNeed for a Microsoft Security Certification for End-users
Hello Learning Community! I'm a Security Skilling Portfolio manager at Microsoft and looking for community feedback on an idea for a new certification. What if Microsoft offered a certification specifically for an organization's business users/end-users on cybersecurity best practices and how to be a security first/responsible business user. The cert could cover Cybersecurity basics, data security best practices, keeping your devices and data safe from malware, protect your info from phishing scams, defending against ransomware, and more. This certification would not be as exhaustive as our technical certifications, uniquely targeting the business/end-user audience. Would you or your organization benefit from this type of certification? All feedback welcome, thanks!589Views10likes10Commentsauthetification app
I changed my phone and I no longer have access to my authentication application so I can no longer connect to my email... I just have another email to receive a code in case I forget my password but when I use it it still asks me for a code from the authentication application.178Views1like3Comments