I must admit, I fail to see a lot benefits of this while staying secure.
Is this just a minor enhancement? We already have per-role activation in
PIM which is more secure than activating all roles/access to
resources.We already have per-app conditional access policies for
sign-in.We already have MFA...
We started working on App proxy. To my surprise, cannot find enough
information after proxy settings.I tried to use "headers based sign on"
approach where by i set the parameters similarly described in your
article.However no one talked about what is the use of such headers
after setting it. Simply ...
Latest Comments