
Sign up to save your podcasts
Or


The podcat discussion provides a comprehensive security audit of Microsoft's identity services, comparing the architecture, protocols, and vulnerabilities of three distinct platforms: Active Directory Domain Services (AD DS), the legacy on-premises solution; Active Directory Federation Services (ADFS), the traditional federation server; and Entra ID (formerly Azure AD), the cloud-native identity platform. The text details the logical and physical structures of AD DS, focusing on Kerberos and NTLM vulnerabilities like the Golden Ticket attack, before examining ADFS's role in hybrid environments and its security burden. The analysis concludes by highlighting the Zero Trust capabilities of Entra ID, such as Conditional Access and Privileged Identity Management (PIM), and provides detailed forensic reviews of five major security incidents to illustrate key architectural weaknesses and emphasize the need for migration to phishing-resistant MFA and cloud-managed services.
 By HelloInfoSec
By HelloInfoSecThe podcat discussion provides a comprehensive security audit of Microsoft's identity services, comparing the architecture, protocols, and vulnerabilities of three distinct platforms: Active Directory Domain Services (AD DS), the legacy on-premises solution; Active Directory Federation Services (ADFS), the traditional federation server; and Entra ID (formerly Azure AD), the cloud-native identity platform. The text details the logical and physical structures of AD DS, focusing on Kerberos and NTLM vulnerabilities like the Golden Ticket attack, before examining ADFS's role in hybrid environments and its security burden. The analysis concludes by highlighting the Zero Trust capabilities of Entra ID, such as Conditional Access and Privileged Identity Management (PIM), and provides detailed forensic reviews of five major security incidents to illustrate key architectural weaknesses and emphasize the need for migration to phishing-resistant MFA and cloud-managed services.