Zero-touch provisioning – Onboarding without manual IT intervention
How quickly can new employees become productive in your organisation? In practice, the onboarding process often does not run as...
How quickly can new employees become productive in your organisation? In practice, the onboarding process often does not run as...
If you’ve ever tried to master group management in Entra ID, you know that there’s a whole universe between security...
Companies can use authorization groups to assign permissions for resources. In most cases, a group grants access to a resource,...
Microsoft 365 (M365) groups make collaboration and permissions management in modern organizations easier and more efficient. They help to centrally...
Migrating to Microsoft Graph API from outdated PowerShell modules such as Azure AD and MSOnline is a crucial task, especially...
A passkey is an authentication method based on the FIDO2 standard specification. Unlike traditional passwords, a passkey securely stores cryptographic...
The new release of the IDM-Portal 5.1 takes a big step towards the cloud and M365 integration. It is now...
How can we check password rules? Do they meet the complexity requirements? This article explains various methods for checking compliance...
In larger companies with various subsidiaries, departments, networks or logical structures, a multi-client-capable Identity and Access Management (IAM) system plays...
Sharing calendar permissions with colleagues enhance collaboration among employees in companies. It simplifies the process of scheduling meetings for larger...
© 2026 · FirstAttribute AG.