Our 4th edition of the Cloud Identity Summit 2023 is over and it was a blast to meet all this great speaker and the Identity Community this year virtual and in-person in Koblenz.
This year we were kindly provided with the location by the Debeka Innovation Center (DICE) which is located near the University of Koblenz and close to the Moselle. The location is a designed as a open space to enable new thinking and new technologies which is a perfect match for our Cloud Identity Summit.
The 4th edition offered 10 sessions in two parall tracks, divided into Identity Security and Identity Management and it was really a pleasure to see this big identity experience in the different Identity topics on this day live at our conference. The speakers who made the extra journey to the event can certainly be called who as who of the identity scene. Therefore, at this point I would like to thank you explicitly, because without you this event would not have been possible:
Sefallah Tagrerout and Jean-Francois (Jeff) Aprea – Securing your Azure Ad with our Zero Trust Approach!
Jan Vidar Elven – Monitoring and Reporting on Activities and Security in Microsoft Entra Azure AD
Fabian Bader – From (tier) zero to cloud hero: How to pwn Azure AD from on-prem
Kenneth van Sarksum – Implementing and building advanced Microsoft Entra Id Conditional Access scenarios
Christopher Brumm – Walk the walk – explore ways to ensure strong authentication in real life scenarios
Sfefan van der Wiele – Walk the walk – explore ways to ensure strong authentication in real life scenarios
Daniel Krzyczkowski – The future of customer identity with Microsoft Entra
Nicki Borell – Azure AD Identity Governance – What do your users do with their access
Sander Berkouwer and Raymond Comvalius – Just apply the basics in your Azure AD tenant!
Anton Staykov – Seamless cross-tenant application access with Entra Azure AD Cross-Tenant sync
Koblenz is the hometown of Thomas Naunheim therefore we had also recommendations for sightseeing tips, city walks and Restaurants and start to meet the speaker on Wednesday in a Restaurant close to the Rhine and the Deutsche Eck (German Corner). After our great dinner, we made a short city walk to the Deutsche Eck and after this to a final beer for a good preperation for our conference on Thursday.
We started our hybrid conference a little late with a strong focus on the in-person experience and also broadcast the Sessions live to the world via teams.
In my estimation it was a complete success due to four factors:
Which is thanks to the great speakers who share their knowledge with great pleasure
The on-site participants who brought a lot of fun and made the sessions interactive, through their numerous questions
The great help of our team which made sure that the speakers and participants felt comfortable
We hope that the conference meet the expectations from our attendees and will plan for 2024 and we really want your Feedback for good and not so good thinks. The really goal of this conference it´s a conference from the community for the community. So gave us your feedback for a better Cloud Identity Summit in 2024!
Many of my customers move to the cloud in the last recent years. This means for existing environments a start of a journey away from on-prem system going forward to cloud environments. We all know a journey starts with preperation and needs different steps and is always not a good idea to work on all systems together. But on the other hand, same system still exists in there old way and use sometimes old, unsecure protocols for communication and authentication.
To adress this issues Microsoft announce Septemper 2019 in a blog article “Improving security” the disabling of support for Basic authentication for the protocols like EWS, POP, IMAP and Remote Powershell. After the plan the corona crisis came up and Microsote decided to postpone the disabling of the noted protocols.
In September 2021 Microsoft released new information about this in the article “Basic authentication and Exchange Online” including some updated information. Microsoft will disable basic authentication beginning 1st of October 2022 for all protocols except SMTP auth. This means the following protocols will be disabled:
The full event month of September is slowly coming to an end and what better way to end it than with a great Azure conference? I´m really happy to announce that I will speak at the Experts Live Netherlands. The Experts Live Netherlands is one of the biggest Experts Live conferences next to Experts Live Europe and celebrates its 10th anniversary this year.
After 8 Months of planning the Cloud Identity Summit 2022 is over and I can say it was really a pleasure to help to organize this great Community event from my perspective. Four years ago Thomas Naunheim come up with the Idea to create a event focus on Identity for the Community. We discuss this in our Azure Bonn Orga Team and finally the Cloud Identity Summit was born. At the end of 2019 we plan the first edition for 2020 as a in-person event, but things changed and we changed the format to an virtual event and this also for 2021.
Back in february we start planning for the 3rd edition 2022 and we decided to go back to our original idea to hold it as a in-person event, but with the experience of two virtual events we move it to an hybrid event. Yesterday was our 1st Cloud Identity Summit 2022 as hybrid edition and I can say, I was really exited about it. Why?
I’m excited to announce that we’re kicking off another Azure AMA on Azure Virtual Desktop Best Practices session – English Edition. The last session was delivered in German and we get a lots of Feedback to repat this in English. I’m really happy to announce that your wish comes true and Marcel and Patrick was also available for a 2nd session 🙂
Marcel and Patrick are two Azure MVPs and do a lot of work in the AVD community. Marcel is known as the brains behind the WVDAdmin and Project Hydra products, which are services to automate all things Azure Virtual Desktop. Patrick has also been active in the AVD community for many years with great sessions and insights about AVD and is the organizer of AVD TechFest together with Simon Binder.
Added some details about v. 126.96.36.199 which fixes a security issue.
Microsoft released a major update of Azure AD Connect. This major release brings a lots of new features and requirements for the local infrastructure. In this article I will cover the latest information and how you can upgrade to the new release.
The new version 2 of Azure AD Connect was released on 20/07/2021 and bring the product to the version 188.8.131.52 the lastet release of version 1 was 184.108.40.206 220.127.116.11. Microsoft found a security issue in 18.104.22.168 and 22.214.171.124 and updated the Azure AD Connect v2 to 126.96.36.199.
Microsoft released also an update for AAD Connect v1 and brings it to 188.8.131.52. This is for customers who running an older version of Windows Server who can not upgrade to WS 2016 and fixes an security issue in 184.108.40.206.
Microsoft released the new v. 220.127.116.11 this fixed a bug in the previous release 18.104.22.168, because after upgrade to that release, the Azure AD Connect Health feature was not registered correctly and did not work. When you installed 22.214.171.124 please do a upgrade to the new 126.96.36.199 release.
Microsoft has released a new Version of Azure AD Connect. The new release going a big step forward from 188.8.131.52 to 184.108.40.206 and brings a lots of improvements and changes.
This release changes the sync process to the new Azure AD V2 endpoint and is not supported for the German national cloud, the Chinese national cloud and the US government cloud. Please be aware of this notes and only use this version in Global Cloud Tenants or switch back to V1 endpoint, when you install this version in National Cloud environments.
I install the new relase on the weekend for a customer, because of changing the Azure AD Connect server. The new relase allows to import settings from a previous version. The new relase brings a lot of new features:
This release defaults the AADConnect server to the new V2 end point
This release require a full sync after installation
This version changes the synchronization to the new Azure AD V2 endpoint
Due do the covid pandamy, many organizations in Germany are in a challenging phase as many employees need to be given the opportunity to work from home. Many companies have not yet made this option available to their employees, or only to a few. Microsoft has created a new option with Windows Virtual Desktop to give employees the ability to work from anywhere and the clients are always hosted in Azure and accessible via an app or browser.
I am very happy to have received an invitation to the WVD Tech Fest. The first conference only focusing on WVD with three parallel tracks around everything you need to know about Windows Virtual Desktop. The agenda is pretty complete and the organizers Simon Binder and Patrick Köhler are doing a great job. The conference will take place on 25/02/21 and is free. So take a look at the Website, plan your Agenda and grab your Ticket.
Azure Files is one of my favorite topics and due to many WVD projects in the past, I will address the question is Azure Files the optimal WVD profile store solution. And I can say: it depends – but you will learn more in my session on Thursday between 10:50 – 11:20 AM 🙂
Take this oppurtunity to learn more about Windows Virtual Desktop and hopefully this can be a solution for your organization to enable more people to work from anywhere and get everyone safely through these challenging time. I hope to see many of you there 🙂
In the past Thomas Naunheim and I do a lot of architecture and designing prinicple for integrating Azure in company environments. We have the idea to create a Azure Governance Best Practices session in the last couple of months to give the community our insights and best practices for Starting/Integrating Azure environments. The goal is to give you insights, where you can find the best documentations to start with a Cloud journey and which technical Azure features help to bring and hold your environment in an compliant and secure state.
The session contains the following topics:
Cloud Adoption Framework
Insights about Azure Policies and Azure Security Center
Azure Enterprise Scale architecture
Identity and Access Management
We are exited to hold the session at the GermanyClouds Meetup on november 26. Did you interested in this topics or you are in the beginning or implementig phase, join us. We will happy to see you there and get your questions.
In the last few days I have created some Azure Landingzones. To secure access to Azure resources within the landing zone with different users, customers use a P2S connection through the Azure VPN Gateway using Azure AD for authentication.
Sometimes I see some mistakes in the Azure VPN Point-to-site configuration blade that results in the Error: “Server did not respond properly to vpn control packets” when trying to connect to the VPN Gateway over the Azure VPN Client.
These error messages are often due to incorrect settings in the basic settings. To resolve this issue it is really important to configure the three points: Tenant & Audience & Issuer correctly.
Please pay close attention to the following settings:
The Tenant field must be specified in the following notation “https://login.microsoftonline.com/your-Azuread-Tenant-ID-here/” at the end do not miss the backforwardslash /
Audience field must be only contains the Enterprise Application ID of the Azure VPN client (this is the same for all Tenants) “41b23e61-6c1e-4545-b367-cd054e0ed4b4” without any other characters or spaces
The Issuer field must be specified in the following notation “https://sts.windows.net/your-Azuread-Tenant-ID-here/” at the end do not miss the backslash /
Please be aware of the difference between the Tenant- (begins with https://login….) and Issuer field (begins with https://sts.win…).
Please contact me if you have any questions or if you find further errors and solutions 🙂