{"id":39805,"date":"2021-03-02T14:00:25","date_gmt":"2021-03-02T14:00:25","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92888"},"modified":"2021-03-02T14:00:25","modified_gmt":"2021-03-02T14:00:25","slug":"identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/","title":{"rendered":"Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work"},"content":{"rendered":"<p>We\u2019re now a year into our new reality, and two trends stand out. First, people need even more flexibility as we work, learn, and collaborate in a world without perimeters. And second, bad actors are getting even more sophisticated. They\u2019re adding new attack vectors and combining them in new creative ways, as we just saw with <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/02\/18\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/\" target=\"_blank\" rel=\"noopener noreferrer\">Solorigate<\/a>.<\/p>\n<p>In January, I shared <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/01\/28\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/\" target=\"_blank\" rel=\"noopener noreferrer\">our top five identity priorities for 2021<\/a> to help you strengthen security and accelerate your transition to the new hybrid work era. More than ever, organizations need to strengthen their defenses to give employees, partners, and customers the flexibility to work from anywhere using apps that live inside and outside the traditional corporate network perimeter. That\u2019s why <a href=\"https:\/\/docs.microsoft.com\/security\/zero-trust\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust<\/a>, a security strategy that combines maximum flexibility with maximum security, is so crucial.<\/p>\n<p>For IT pros and security professionals, the implementation of Zero Trust should be simple and straightforward. For users, it should never get in the way, and it should fit into familiar workflows and habits. This week, on the virtual Microsoft Ignite stage, I\u2019m announcing several Azure Active Directory (Azure AD) innovations that will help make life easier for you and your employees now\u2014and help you stay prepared for whatever comes next.<\/p>\n<h2>Give your employees a secure and seamless user experience<\/h2>\n<p>As part of our commitment to making security as seamless as possible, <strong><a href=\"https:\/\/aka.ms\/passwordlessGA\" target=\"_blank\" rel=\"noopener noreferrer\">passwordless authentication<\/a><\/strong> is now generally available for organizations to deploy at scale. Your IT admins, employees, and partners can benefit from <a href=\"https:\/\/aka.ms\/passwordless10\" target=\"_blank\" rel=\"noopener noreferrer\">increased security and simplicity<\/a>. We\u2019ve made it easy to roll out passwordless at scale with expanded policies that define which authentication methods specific users or groups can use. New reporting capabilities allow you to see the usage and adoption of passwordless authentication methods across your organization. To help you simplify and secure remote access, we\u2019ve also released the preview of <strong><a href=\"https:\/\/aka.ms\/TAPpreview\" target=\"_blank\" rel=\"noopener noreferrer\">Temporary Access Pass<\/a><\/strong>, a time-limited code used to set up and recover a passwordless credential.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92968 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/GIF-TAP-Surface-Book-2-cropped.gif\" alt=\"Azure AD Temporary Access Pass\" width=\"650\" height=\"450\"><\/p>\n<p>Microsoft already has more than 200 million passwordless users across our consumer and enterprise services. We\u2019re excited to see even more customers adopting passwordless each day. Axiata Group is the first company in Southeast Asia to eliminate passwords for their employees. They went passwordless using Windows Hello for Business and the Microsoft Authenticator app. Abid Adam, group chief risk and compliance officer at Axiata Group said, \u201cRather than make their lives miserable with long passwords that create risk for the organization, we turned to biometrics. Now with Windows Hello, security is baked into our ecosystem, and we have better access to information with greater barriers to bad actors. It\u2019s a win-win for our security team, our employees, and the company.\u201d Similarly, in Europe, Ume\u00e5 municipality wanted to strengthen security and eliminate the use of passwords. With help from Onevinn and Yubico partners, they were able to roll out their first passwordless deployment in less than 10 days. Watch <a href=\"https:\/\/youtu.be\/GfKeiKA8aEo\" target=\"_blank\" rel=\"noopener noreferrer\">my interview on Microsoft Mechanics<\/a> to see passwordless in action.<\/p>\n<p>Going passwordless not only simplifies the user experience but also strengthens your security posture. And thanks to <a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/conditional-access\/overview\" target=\"_blank\" rel=\"noopener noreferrer\">Azure AD Conditional Access<\/a>, you no longer need to request multifactor authentication every time someone accesses an app that touches sensitive data. Instead, you can step up authentication based on what the user is trying to do within the app\u2014for example, downloading a highly confidential document. With <strong>Azure AD Conditional Access authentication context<\/strong>, now in preview, you can move away from one-size-fits-all security and adopt more granular policies that protect resources with the right level of controls based on user actions or the data they are trying to access.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92978 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/GIF-CA-Surface-Book-2-cropped-1.gif\" alt=\"Azure AD Conditional Access authentication context\" width=\"650\" height=\"450\"><\/p>\n<blockquote>\n<p><strong>Announcements<\/strong>:<\/p>\n<ul>\n<li>General availability of passwordless authentication.<\/li>\n<li>Preview of Temporary Access Pass.<\/li>\n<li>Preview of Azure AD Conditional Access authentication context.<\/li>\n<\/ul>\n<\/blockquote>\n<h2>Secure access to all apps<\/h2>\n<p>Most of you&nbsp;manage multi-cloud environments. Your developers are building apps that are distributed&nbsp;across&nbsp;Microsoft Azure, Amazon Web Services (AWS),&nbsp;and Google Cloud Platform.&nbsp;They need to sign&nbsp;in to each cloud with only one set of credentials. So that you can quickly configure single-sign-on (SSO) and user provisioning, we\u2019re constantly expanding the Azure AD app gallery with as many pre-integrations as possible\u2014even with our competitors.<\/p>\n<p><strong><a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/saas-apps\/amazon-web-service-tutorial\" target=\"_blank\" rel=\"noopener noreferrer\">AWS Single Sign-On<\/a> app is now pre-integrated<\/strong> with Azure AD and available in the app gallery. This integration lets you connect Azure AD to AWS SSO, a cloud-based service that simplifies SSO access across multiple AWS accounts and resources. You can centralize management of user access to AWS, while your employees can gain access using their Azure AD credentials.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92970 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/GIF-AWS-Surface-Book-2-cropped.gif\" alt=\"AWS SSO pre-integrated with Azure AD\" width=\"650\" height=\"450\"><\/p>\n<p>During the past year, many organizations have relied on our <a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/manage-apps\/what-is-application-proxy\" target=\"_blank\" rel=\"noopener noreferrer\">Azure AD App Proxy<\/a> service to help employees secure remote access to on-premises apps. Usage grew more than 100 percent last year, helping organizations move away from VPN solutions. Today, we\u2019re adding two new features to help you get the most out of App Proxy. First, <strong><a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/manage-apps\/application-proxy-configure-single-sign-on-with-headers\" target=\"_blank\" rel=\"noopener noreferrer\">native support for header-based authentication with App Proxy<\/a><\/strong> is now generally available. Second, <strong>traffic optimization by region for App Proxy<\/strong> is now in preview. This new feature lets you designate which region your App Proxy service connector group should use and select the same region as your apps. This new feature helps reduce latency and improve performance.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92974\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/AP-GIF-1.gif\" alt=\"Azure AD App Proxy support for header-based authentication apps\" width=\"650\" height=\"454\"><\/p>\n<p>To protect your legacy, on-premises applications, we\u2019re expanding the list of our <strong>secure hybrid access partnerships<\/strong> to include Datawiza, Perimeter 81, Silverfort, and Strata. In addition to connecting your on-premises apps, partners like Datawiza, Strata, and Silverfort can help you discover and prioritize apps and resources to migrate to Azure AD. \u201cSilverfort is thrilled to be able to collaborate with Azure AD to enable unified secure access to legacy, on-premises apps, and resources,\u201d said Ron Rasin, vice president of product and strategic alliances at Silverfort. \u201cIdentity has become the primary security control plane making it critical that organizations can discover, prioritize, and migrate the apps and resources to a central identity solution like Azure AD.\u201d<\/p>\n<p>Solorigate taught us that in many cases, cloud environments are more secure than on-premises. To strengthen your defenses, it\u2019s critical to minimize your on-premises footprint and manage all your apps from the cloud. The process of discovering applications across different environments and prioritizing them for cloud modernization can be daunting, however. To make it easier, we\u2019re announcing the general availability of <strong><a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/manage-apps\/migrate-adfs-application-activity\" target=\"_blank\" rel=\"noopener noreferrer\">Active Directory Federation Services (AD FS) activity and insights report<\/a><\/strong>. This report assesses all AD FS applications for compatibility with Azure AD, checks for any issues, and provides guidance on preparing individual applications for migration to Azure AD.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92972 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/GIF-ADFS-Surface-Book-2-cropped.gif\" alt=\"AD FS activity and insights report\" width=\"650\" height=\"450\"><\/p>\n<blockquote>\n<p><strong>Announcements<\/strong>:<\/p>\n<ul>\n<li>AWS Single Sign-On now available in Azure AD app gallery.<\/li>\n<li>General availability of AD FS activity and insights report.<\/li>\n<li>New secure hybrid access partnerships with Datawiza, Perimeter 81, Silverfort, and Strata.<\/li>\n<li>General availability of Azure AD App Proxy support for header-based authentication apps.<\/li>\n<li>Preview of Azure AD App Proxy support for traffic optimization by region.<\/li>\n<\/ul>\n<\/blockquote>\n<h2>Secure your customers and partners<\/h2>\n<p>A strong Zero Trust approach requires that we treat access requests from customers, partners, and vendors just like requests from employees: verify every request, allow users to access the data they need only when they need it, and don\u2019t let guests overstay their welcome. With Azure AD, you can apply consistent access policies to all types of external users.<\/p>\n<p>Generally available starting this month, <strong><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/evolving-azure-ad-for-every-user-and-any-identity-with-external\/ba-p\/1257361\" target=\"_blank\" rel=\"noopener noreferrer\">Azure AD External Identities<\/a><\/strong> is a set of capabilities for securing and managing identity and access for customers and partners. Self-service sign-up user flows in Azure AD apps make it easy to create, manage, and customize onboarding experiences for external users, with little to no application code. You can integrate support for sign-in using Google and Facebook IDs and extend the flow with powerful API connectors. Using Azure AD Identity Protection, you can protect your business-to-business (B2B) and <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/azure-active-directory-external-identities-goes-premium-with\/ba-p\/1604572\" target=\"_blank\" rel=\"noopener noreferrer\">business-to-consumer (B2C) apps<\/a> and users with adaptive, machine learning\u2013driven security.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92952 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Picture4.png\" alt=\"Azure AD External Identities admin portal and user experience\" width=\"1359\" height=\"883\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Picture4.png 1359w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Picture4-300x195.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Picture4-1024x665.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Picture4-768x499.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Picture4-200x130.png 200w\" sizes=\"auto, (max-width: 1359px) 100vw, 1359px\"><\/p>\n<p>With automated <strong><a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/governance\/manage-guest-access-with-access-reviews\" target=\"_blank\" rel=\"noopener noreferrer\">guest access reviews for Microsoft Teams and Microsoft 365 groups<\/a><\/strong>, now generally available, Azure AD will prompt you to review and update access permissions for all guests added to new or existing Teams or groups on a regular schedule. The process of cleaning up access to sensitive resources that your guest users no longer need will become less manual\u2014and less neglected.<\/p>\n<blockquote>\n<p><strong>Announcements<\/strong>:<\/p>\n<ul>\n<li>General availability of Azure AD External Identities.<\/li>\n<li>General availability of Azure AD access reviews for all guests in Teams and Microsoft 365 groups.<\/li>\n<\/ul>\n<\/blockquote>\n<h2>The future of identity is bright<\/h2>\n<p>While 2020 was a challenging year, we have much to look forward to in 2021, with innovations that will deliver more security, transparency, and privacy for users. Last Microsoft Ignite, I talked about verifiable credentials and our commitment to empowering every person to own their own identity thanks to decentralized identifiers. I\u2019m happy to share that <strong><a href=\"https:\/\/didproject.azurewebsites.net\/docs\/overview.html\" target=\"_blank\" rel=\"noopener noreferrer\">Azure AD verifiable credentials<\/a><\/strong> is entering preview in just a few weeks. Developers will get an SDK, with quick-start guides, for building apps that request and verify credentials, just like they do with usernames and passwords. I\u2019m also excited to announce that we are partnering with some of the leading ID verification partners\u2014Acuant, Au10tix, Idemia, Jumio, Socure, Onfido, Vu Security\u2014to improve verifiability and secure information exchange.<\/p>\n<p>Verifiable credentials let organizations confirm information about someone\u2014like their education and professional certifications\u2014without collecting and storing their personal data. This will revolutionize the way we grant permissions to access our information. Organizations will be able to issue digital versions of a variety of credentials such as physical badges, loyalty cards, and government-issued paper documents based on open standards. Because the digital information is verified by a known party, it\u2019s more trustworthy, and verification will only take minutes instead of days or weeks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92973 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/GIF-VC-Surface-Book-2-cropped.gif\" alt=\"Azure AD verifiable credentials\" width=\"650\" height=\"450\"><\/p>\n<p>Individuals get more control over what information they share with whom, and they can restrict access to that shared information at any time. They only have to verify a credential once to use it everywhere. To manage their credentials, they can use the Microsoft Authenticator app and other wallet apps that support open standards, such as the pilot application built by Keio University for their students.<\/p>\n<blockquote>\n<p><strong>Announcement<\/strong>:<\/p>\n<ul>\n<li>Preview of Azure AD verifiable credentials.<\/li>\n<\/ul>\n<\/blockquote>\n<p>And finally, I\u2019m happy to share that we\u2019re releasing a new <strong>Microsoft Identity and Access Administrator Certification<\/strong>, which you can find at the <a href=\"https:\/\/aka.ms\/MicrosoftSecurityTechnicalContentLibrary\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Security Resources portal<\/a>. This training helps admins design, implement, and operate Azure AD as the organization\u2019s security control plane.<\/p>\n<blockquote>\n<p><strong>Announcement<\/strong>:<\/p>\n<ul>\n<li>Release of the Microsoft Identity and Access Administrator Certification.<\/li>\n<\/ul>\n<\/blockquote>\n<p>The new features announced at Microsoft Ignite will make it easier to provide seamless user experiences in the hybrid workplace and to strengthen your defenses against attacks that are increasingly sophisticated. As you try these new tools, please&nbsp;<a href=\"http:\/\/twitter.com\/azuread\" target=\"_blank\" rel=\"noopener noreferrer\">send us your feedback<\/a> so we can continue to build advancements that help you keep your employees secure, connected, and productive.<\/p>\n<p>Let\u2019s make 2021 the Year of Passwordless!<\/p>\n<p>To see these features in action when I take the Microsoft Ignite stage tomorrow, register for free at&nbsp;<a href=\"https:\/\/myignite.microsoft.com\/home\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Ignite<\/a> and watch <a href=\"https:\/\/aka.ms\/IgniteJoyC2021\" target=\"_blank\" rel=\"noopener noreferrer\">my session<\/a> starting at 5 PM Pacific Time. Follow Microsoft Identity at <a href=\"https:\/\/twitter.com\/azuread\" target=\"_blank\" rel=\"noopener noreferrer\">@AzureAD<\/a>&nbsp;on Twitter&nbsp;for more news and best practices.<\/p>\n<p>To learn more about Microsoft Security solutions, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutionshttps:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security Blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn more about the latest Azure Active Directory innovations that will allow you deliver a secure and seamless experience to your users and help you stay prepared for whatever comes next.<br \/>\nThe post Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39806,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[1264,347,6696,9060,3677],"class_list":["post-39805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-azure-active-directory","tag-cybersecurity","tag-identity-and-access-management","tag-identity-and-access-management-series","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-02T14:00:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work\",\"datePublished\":\"2021-03-02T14:00:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\\\/\"},\"wordCount\":1908,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work.gif\",\"keywords\":[\"Azure Active Directory\",\"Cybersecurity\",\"Identity and access management\",\"Identity and access management series\",\"Zero Trust\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\\\/\",\"name\":\"Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work.gif\",\"datePublished\":\"2021-03-02T14:00:25+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work.gif\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work.gif\",\"width\":650,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Active Directory\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/azure-active-directory\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/","og_locale":"en_US","og_type":"article","og_title":"Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-03-02T14:00:25+00:00","og_image":[{"width":650,"height":450,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work.gif","type":"image\/gif"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work","datePublished":"2021-03-02T14:00:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/"},"wordCount":1908,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work.gif","keywords":["Azure Active Directory","Cybersecurity","Identity and access management","Identity and access management series","Zero Trust"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/","url":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/","name":"Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work.gif","datePublished":"2021-03-02T14:00:25+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work.gif","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work.gif","width":650,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-strengthening-zero-trust-defenses-in-the-era-of-hybrid-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure Active Directory","item":"https:\/\/www.threatshub.org\/blog\/tag\/azure-active-directory\/"},{"@type":"ListItem","position":3,"name":"Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39805"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39805\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39806"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}