SlideShare a Scribd company logo
1
TOPIC
The User's Identities
Who I am
@giulianolatini
giulianolatini
giulianolatini
GIULIANO LATINI
About me
• ITPro > 30 year
• Istruttore Informatico at Comune di Chiaravalle (AN)
• Senior Software Developer at INNOTEAM s.r.l.
• CTS Senior Member at Federation IDEM AAI
• ICT Administrator at Università Politecnica delle Marche
• Member of WindowServer.it community
• Member of DevMarche community
• Member of GetLatestVersion community
• Linux Foundation Member
Users Identities: what’s the needs
• Self-manage basic operation as change&recovery;
• Strong security and MultiFactorAuthentications;
• Manage external figures as collaborators, clients, contractors;
• User Exprerience (UX) simple and brended;
• Simple integration with other identities providers;
• SingleSignOn for on-premises and cloud software products;
• Measurement of acceptable security level;
We start from:
/etc/passwd
Security Account Manager (SAM) database
LDAP Active Directory™
Active Directory™ Federation Services
Azure Active Directory Features
Azure Active Directory Features
Why trust in Azure Active Directory?
Break Office Perimeter with monitoring
Passwordless Authentications with AAD
With FIDO2 security keys
With Microsoft Authenticator App
With Windows Hello for Business
Azure AD self-service password reset
Personalization and Brending of Login Page
User login @ Danske Statsbaner
Identity Secure Score in AAD
How does it work?
Every 48 hours, Azure looks at
your security configuration
and compares your settings
with the recommended best
practices.
• Objectively measure your identity
security posture;
• Plan identity security improvements;
• Review the success of your
improvements.
How does it help me?
How be a Service Provider of SPID
SPID authentication workflow
Create AAD App with SSO mode
Set SAML configuration of AAD App
Azure Active Directory: the solutions gived
It is a growing product with staff, ALM, procedures, docs,
support, and monitoring health.
It grows user’s self-manage and responsibility. The users can
or are obligated to use complex passwords and the MFA,
FIDO2 technologies from tenant's administrations.
It gives tools to monitor security levels of tenant
dynamically.
It could be joined to other Identity providers for giving SSO
on SaaS and Web applications.
Bibliograpy
• Documentazione Azure Active Directory
• Azure Active Directory: Microsoft’s cloud based identity and
access management service
• Azure Active Directory Authentication Overview:
Authentication Fundamentals: The Basics
• Deep Dive into Azure Active Directory (Azure AD): Learn
Microsoft Azure Active Directory from Basic to Advanced
concepts with real time walkthroughs
Bibliograpy
• Modern Authentication with Azure Active Directory for Web
Applications (Developer Reference)
• [VIDEO] Managing Identities in Microsoft Azure Active
Directory
• Azure AD Introduction For Red Teamers
• Azure AD/Office 365 Single Sign-On with Shibboleth 2
• MyWorkDrive Azure AD SAML Overview
Bibliograpy
• SPID Sistema Pubblico di Identità Digitale
• SPID - Regole Tecniche
• SPID SAML Check
• Identity Provider di test per SPID (docker: italia/spid-testenv2)
• SAML-to-SAML Proxy: Satosa-Saml2Spid
Thanks
Questions?
giulianolatini @giulianolatini giulianolatini
“ Quote

More Related Content

PPTX
CSA Presentation - Software Defined Perimeter
PDF
Shifting security left simplifying security for k8s open shift environments
PPTX
AppGate: Achieving Compliance in the Cloud
PPTX
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
PDF
Zero trust server management - lightning
PDF
CSA SV Threat detection and prediction
PPTX
TechWiseTV Workshop: Cisco CloudCenter (CliQr)
PDF
Recipe for good secrets management
CSA Presentation - Software Defined Perimeter
Shifting security left simplifying security for k8s open shift environments
AppGate: Achieving Compliance in the Cloud
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
Zero trust server management - lightning
CSA SV Threat detection and prediction
TechWiseTV Workshop: Cisco CloudCenter (CliQr)
Recipe for good secrets management

What's hot (20)

PDF
Using Cisco pxGrid for Security Platform Integration: a deep dive
PPT
Bio IT World 2015 - DevOps Security and Transparency
PPTX
Azure security basics
PDF
Azure Penetration Testing
PDF
Building A Self-Documenting Application: A Study in Chef and Compliance
PDF
Patterns of evolution from monolith to microservices
PPTX
Operational Complexity: The Biggest Security Threat to Your AWS Environment
PPT
AlertSite Slideshow for the Booth at Web 2.0 Expo 2009
PDF
Azure Penetration Testing
PPTX
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
PDF
FIWARE Global Summit - Leveraging Kubernetes for FIWARE Components Automations
PDF
Identity Server on Azure: A Reference Architecture
PDF
Moving Data Efficiently with Real-Time Streaming
PPTX
DEVNET-1010 Using Cisco pxGrid for Security Platform Integration
PDF
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
PPTX
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
PPTX
Bevywise IoT Platform
PDF
Using Kubernetes to make cellular data plans cheaper for 50M users
PDF
TechWiseTV Workshop: Cisco Stealthwatch and ISE
PDF
F5 Cloud Solutions
Using Cisco pxGrid for Security Platform Integration: a deep dive
Bio IT World 2015 - DevOps Security and Transparency
Azure security basics
Azure Penetration Testing
Building A Self-Documenting Application: A Study in Chef and Compliance
Patterns of evolution from monolith to microservices
Operational Complexity: The Biggest Security Threat to Your AWS Environment
AlertSite Slideshow for the Booth at Web 2.0 Expo 2009
Azure Penetration Testing
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
FIWARE Global Summit - Leveraging Kubernetes for FIWARE Components Automations
Identity Server on Azure: A Reference Architecture
Moving Data Efficiently with Real-Time Streaming
DEVNET-1010 Using Cisco pxGrid for Security Platform Integration
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
Bevywise IoT Platform
Using Kubernetes to make cellular data plans cheaper for 50M users
TechWiseTV Workshop: Cisco Stealthwatch and ISE
F5 Cloud Solutions
Ad

Similar to The user s identities (20)

PDF
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
PDF
SailPoint VS CyberArk.pdf
PDF
Blibli Web Application Security Policy Enforcement Point
PDF
Proven Practices for Office 365 Deployment, Security and Management
PPTX
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
PPTX
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
PPTX
2018 November - AZUGDK - Azure AD
PDF
Symplified datasheet
PPTX
Embracing secure, scalable BYOD with Sencha and Centrify
PDF
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
PDF
Sailpoint vs Okta.pdf
PDF
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
PDF
Build Your Career With Sailpoint Training.pdf
PDF
Microsoft Authenticator on Mac MicrosofMicrosoft
PDF
Active Directory Proposal
PPTX
FortiAuthenticator vs Ping Identity Guide
PDF
Premier Webcast - Identity Management with Windows Azure AD
PPTX
AbedElilahElmahmoumP1.pptx
PDF
TOP SAILPOINT INTERVIEW QUESTION
PPTX
What is Microsoft Enterprise Mobility Suite and how to deploy it
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
SailPoint VS CyberArk.pdf
Blibli Web Application Security Policy Enforcement Point
Proven Practices for Office 365 Deployment, Security and Management
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
2018 November - AZUGDK - Azure AD
Symplified datasheet
Embracing secure, scalable BYOD with Sencha and Centrify
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Sailpoint vs Okta.pdf
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Build Your Career With Sailpoint Training.pdf
Microsoft Authenticator on Mac MicrosofMicrosoft
Active Directory Proposal
FortiAuthenticator vs Ping Identity Guide
Premier Webcast - Identity Management with Windows Azure AD
AbedElilahElmahmoumP1.pptx
TOP SAILPOINT INTERVIEW QUESTION
What is Microsoft Enterprise Mobility Suite and how to deploy it
Ad

More from Giuliano Latini (20)

PPTX
Microsoft Graph Powershell, gestire vecchi problemi con una mentalità nuova....
PDF
Dai comlet all'IT e la giornata l'ha sfangata^J dagli Graph Powershell e gest...
PPTX
Docker_vs_Rancher_chi_dominerà_i_Desktop_dei_developers.pptx
PPTX
Nat come esporre servizi https senza esporre l'applicazione
PPTX
Nat come esporre servizi https senza esporre l'applicazione
PPTX
Monitoring Applications in AKS
PPTX
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
PDF
La potenza è nulla senza controllo
PPTX
La potenza è nulla senza controllo
PPTX
DOCKER FROM ZERO TO HERO
PPTX
Kubernetes e bello, sicuro è meglio!
PPTX
Kubernetes as HA time series server, a proposal
PPTX
Glv on air 08-10_2019
PPTX
Funziona! allora non toccarlo, ovvero l'analisi d'infrastruttura in esercizio.
PDF
Docker vs Virtualizzazioni
PPTX
Linux@Azure, l'altra metà del cielo.
PPTX
I containers in azure, light vm o un vero cambio di paradigma?
PPTX
Swarm - 50 sfumature di docker
PDF
Mobile Camp @Univpm - Introduzione all'evento
PPTX
Google cloud: Big Data + docker = kubernetes
Microsoft Graph Powershell, gestire vecchi problemi con una mentalità nuova....
Dai comlet all'IT e la giornata l'ha sfangata^J dagli Graph Powershell e gest...
Docker_vs_Rancher_chi_dominerà_i_Desktop_dei_developers.pptx
Nat come esporre servizi https senza esporre l'applicazione
Nat come esporre servizi https senza esporre l'applicazione
Monitoring Applications in AKS
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
La potenza è nulla senza controllo
La potenza è nulla senza controllo
DOCKER FROM ZERO TO HERO
Kubernetes e bello, sicuro è meglio!
Kubernetes as HA time series server, a proposal
Glv on air 08-10_2019
Funziona! allora non toccarlo, ovvero l'analisi d'infrastruttura in esercizio.
Docker vs Virtualizzazioni
Linux@Azure, l'altra metà del cielo.
I containers in azure, light vm o un vero cambio di paradigma?
Swarm - 50 sfumature di docker
Mobile Camp @Univpm - Introduzione all'evento
Google cloud: Big Data + docker = kubernetes

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
Teaching material agriculture food technology
PDF
Modernizing your data center with Dell and AMD
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Cloud computing and distributed systems.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
A Presentation on Artificial Intelligence
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
“AI and Expert System Decision Support & Business Intelligence Systems”
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
Teaching material agriculture food technology
Modernizing your data center with Dell and AMD
Dropbox Q2 2025 Financial Results & Investor Presentation
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Unlocking AI with Model Context Protocol (MCP)
Advanced methodologies resolving dimensionality complications for autism neur...
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Cloud computing and distributed systems.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The AUB Centre for AI in Media Proposal.docx
A Presentation on Artificial Intelligence
Mobile App Security Testing_ A Comprehensive Guide.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

The user s identities

  • 3. About me • ITPro > 30 year • Istruttore Informatico at Comune di Chiaravalle (AN) • Senior Software Developer at INNOTEAM s.r.l. • CTS Senior Member at Federation IDEM AAI • ICT Administrator at Università Politecnica delle Marche • Member of WindowServer.it community • Member of DevMarche community • Member of GetLatestVersion community • Linux Foundation Member
  • 4. Users Identities: what’s the needs • Self-manage basic operation as change&recovery; • Strong security and MultiFactorAuthentications; • Manage external figures as collaborators, clients, contractors; • User Exprerience (UX) simple and brended; • Simple integration with other identities providers; • SingleSignOn for on-premises and cloud software products; • Measurement of acceptable security level;
  • 5. We start from: /etc/passwd Security Account Manager (SAM) database LDAP Active Directory™ Active Directory™ Federation Services
  • 8. Why trust in Azure Active Directory?
  • 9. Break Office Perimeter with monitoring
  • 10. Passwordless Authentications with AAD With FIDO2 security keys With Microsoft Authenticator App With Windows Hello for Business
  • 11. Azure AD self-service password reset
  • 12. Personalization and Brending of Login Page User login @ Danske Statsbaner
  • 13. Identity Secure Score in AAD How does it work? Every 48 hours, Azure looks at your security configuration and compares your settings with the recommended best practices. • Objectively measure your identity security posture; • Plan identity security improvements; • Review the success of your improvements. How does it help me?
  • 14. How be a Service Provider of SPID
  • 16. Create AAD App with SSO mode
  • 18. Azure Active Directory: the solutions gived It is a growing product with staff, ALM, procedures, docs, support, and monitoring health. It grows user’s self-manage and responsibility. The users can or are obligated to use complex passwords and the MFA, FIDO2 technologies from tenant's administrations. It gives tools to monitor security levels of tenant dynamically. It could be joined to other Identity providers for giving SSO on SaaS and Web applications.
  • 19. Bibliograpy • Documentazione Azure Active Directory • Azure Active Directory: Microsoft’s cloud based identity and access management service • Azure Active Directory Authentication Overview: Authentication Fundamentals: The Basics • Deep Dive into Azure Active Directory (Azure AD): Learn Microsoft Azure Active Directory from Basic to Advanced concepts with real time walkthroughs
  • 20. Bibliograpy • Modern Authentication with Azure Active Directory for Web Applications (Developer Reference) • [VIDEO] Managing Identities in Microsoft Azure Active Directory • Azure AD Introduction For Red Teamers • Azure AD/Office 365 Single Sign-On with Shibboleth 2 • MyWorkDrive Azure AD SAML Overview
  • 21. Bibliograpy • SPID Sistema Pubblico di Identità Digitale • SPID - Regole Tecniche • SPID SAML Check • Identity Provider di test per SPID (docker: italia/spid-testenv2) • SAML-to-SAML Proxy: Satosa-Saml2Spid