Tags: Security

Microsoft Authenticator App

Security Cyber Benjamin Perkins

If you are still using UID and Password as the only means for authentication, you might consider implementing Multi Factor Authentication (MFA).  One way to do this is by using the Microsoft Authenticator App which you can read all about it here.  I am writing this mostly to help me remember how I configured it […]

Read More →

Azure Management Certificates (German Cloud, Azure Deutschland)

Azure Benjamin Perkins

This article has to do mostly with the German Cloud, #GermanCloud #AzureGermany because it is most probable that there will not be anything similar to manage.windowsazure.com deployed to this solution. Why is that important? It is important because this is historically how many people configured thier PowerShell or other clients to make deployments/configurations onto Azure. […]

Read More →

Make a self-signed SHA256 SSL certificate

IIS Benjamin Perkins

I wrote an article about making an SSL certificate using MAKECERT here, but that example used the default SHA1 signature hash algorithm which is deprecating. Therefore, instead of the command shown in Figure 6 on the referenced article, I recommend using this command, that includes the SHA256 attribute, similar to that shown in Figure 1: […]

Read More →

Configure Application Request Routing with Windows Authentication, Kerberos

IIS Benjamin Perkins

If you have not already read this article, please do which is a prequel to this one that explains the basic installation and configuration of ARR using anonymous authentication. The steps for configuring Application Request Routing (ARR) to use Windows Authentication -> Kerberos, are: Set authentication protocol on IIS (Server Farm) servers to Windows Authentication […]

Read More →

Using TLS 1.2 with WCF

Security Cyber Benjamin Perkins

NOTE: Security is a very serious topic and you should always engage an IT security expert before deploying an application that needs to be secure. This article is intended to share my experience versus being an article to use as a guideline. With all the news about the different vulnerabilities like heartbleed and poodle, developers […]

Read More →