#entraid โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #entraid, aggregated by home.social.
-
[ Blog ] How to #backup #Microsoft Entra ID with Veeam
With latest versions of Veeam Backup & Replication it is possible to backup Microsoft Entra ID to enhance the protection of cloud services used by your Organization.
Microsoft Entra ID (formerly #Azure Active Directory) is Microsoft's cloud-based identity and access management service. It helps organizations manage user http://rviv.ly/qDANYE #entraid
-
I've been building out M365 security tooling as a solo IT/Sec engineer and figured it's time to share it publicly
https://github.com/Bluewal/m365-intune-scripts
What's in there:
โข Audit-before-block scripts (legacy auth, device code flow, shared mailboxes, admin accounts)
โข Conditional Access policy templates (country blocking, device code flow block)
โข Defender XDR threat response (axios supply chain attack IOC scan)Everything is battle-tested in production on a real tenant. Feedback and PRs welcome.
-
๐ Blocking Device Code Flow in M365, full mini-toolkit now on GitHub:
1๏ธโฃ Audit script => verify zero legitimate usage before blocking (all 4 Entra sign-in log types)
2๏ธโฃ CA policy JSON => ready to import, just replace your break-glass group ID๐ https://github.com/Bluewal/m365-intune-scripts/tree/main/entra/device-code-flow
#infosec #Microsoft365 #EntraID #ConditionalAccess #BlueTeam #PowerShell
-
๐จ EvilTokens / AiTM attacks are actively abusing Device Code Flow to bypass MFA in M365 tenants.
Before blocking it via Conditional Access โ verify it's actually unused in your environment.
Script queries all 4 Entra sign-in log types via Microsoft Graph:
โ No results โ safe to block immediately
โ ๏ธ Results found โ review before deploying#infosec #Microsoft365 #EntraID #ConditionalAccess #BlueTeam #PowerShell
-
The Rumba Identity Platform got a small logo. I'm not a pro at this stuff but it's at least what I feel Rumba is about.
Work currently is focused on two areas:
- we are pushing Rumba through the Samba self-test which is a bit infamous
- we are doing virtualized client tests against Windows systems and Linux systems running #himmelblauA fun thing here: we do test against Windows starting with the Windows 2000 client because we can.
-
The pentest professionals at #usdHeroLab identified a vulnerability in #EntraID during a cloud #pentest that allows the circumvention of conditional access policies for privileged identities.
Two additional vulnerabilities were identified during a web application pentest of #Tenable Nessus Manager, which allow low-privileged users to read arbitrary files at the operating system level.
All #vulnerabilities were reported to the vendors as part of our Responsible Disclosure policy.
๐ You can find detailed information on the #SecurityAdvisories here: https://www.usd.de/en/security-advisories-entra-id-tenable-nessus-manager/
#SecurityResearch #SecurityAdvisory #moresecurity #NessusManager #Pentesting #Hacking #CVE_2026_3493 #AppSec #InfoSec #CyberSecurity
-
Blog Alert!
This time of getting the Data Api Builder MCP preview to connect to a Fabric Lakehouse SQL Endpoint using Entra ID.
#MCP
#DAB
#MicrosoftFabric
#Lakehouse
#SqlEndpoint
#EntraIdhttp://sqlreitse.com/2026/03/06/sql-mcp-local-to-fabric-lakehouse/
-
Question for the #Shibboleth IdP admins out there who are using SAML Proxy to AuthN against Entra ID...
What have you done, if anything, to allow Windows Hello logins (X509 cert auth) along side Password based logins?
-
Question for the #Shibboleth IdP admins out there who are using SAML Proxy to AuthN against Entra ID...
What have you done, if anything, to allow Windows Hello logins (X509 cert auth) along side Password based logins?
-
Question for the #Shibboleth IdP admins out there who are using SAML Proxy to AuthN against Entra ID...
What have you done, if anything, to allow Windows Hello logins (X509 cert auth) along side Password based logins?
-
๐๐จ๐ฐ ๐๐จ๐ง๐๐ข๐ญ๐ข๐จ๐ง๐๐ฅ ๐๐๐๐๐ฌ๐ฌ ๐๐จ๐ฅ๐ข๐๐ข๐๐ฌ ๐๐ซ๐ ๐๐ฏ๐๐ฅ๐ฎ๐๐ญ๐๐ ๐ข๐ง ๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ ๐๐ง๐ญ๐ซ๐ ๐๐
Understanding how Conditional Access policies are evaluated in Microsoft Entra ID is absolutely essential if you are involved in their creation or management.
I often encounter fundamental misunderstandings regarding how the evaluation of Conditional Access policies takes place. Many administrators are accustomed to systems like firewalls, where there is an order or priority for evaluating created rules. However, it does not work this way with Conditional Access policies in Microsoft Entra ID. Applying the same principle to Conditional Access policies will very likely lead to significant security risks.
Read my blog post bellow ๐ ๐
https://www.cswrld.com/2026/02/how-conditional-access-policies-are-evaluated-in-microsoft-entra-id/ -
๐๐จ๐ฐ ๐ญ๐จ ๐ฎ๐ฌ๐ ๐๐๐๐๐ฌ๐ฌ ๐ฉ๐๐๐ค๐๐ ๐๐ฌ ๐ญ๐จ ๐ฆ๐๐ง๐๐ ๐ ๐ ๐ซ๐จ๐ฎ๐ฉ ๐ฆ๐๐ฆ๐๐๐ซ๐ฌ๐ก๐ข๐ฉ๐ฌ
Access packages allow you to dynamically manage group, Teams, application, and SharePoint site membership based on user requests.
It works by creating an access package and then publishing it to users โ either all users or a select group of users. Users can then activate the package from the My Access portal after meeting defined conditions.
https://www.cswrld.com/2026/02/how-to-use-access-packages-to-manage-group-memberships/
#cswrld #entraid #entitlementmanagement #identitygovernance #accesspackage
-
Good article by Colin Turner ๐
"Customising Django Microsoft Entra ID Authentication"
https://www.piglets.org/blog/2025/12/24/customising-django-entra-id-authentication/
#oss #foss #python #django #entra #entraid #programming #devops #programmer #developer
-
๐ช Ready to simplify DNS access for your organization? Managing DNS access across multiple domains and teams can get messy. This video shows how to use Microsoft Entra SSO with DNSimple so your team sign in once & gets the right level of access.
๐ Watch https://youtu.be/hpBNoXc2reU#MicrosoftEntra #EntraID #EntraSSO #SingleSignOn #SSO #Security #DNS
-
Day 12 of #ITAdvent. Short low effort self-plug as I'm a bit under the weather: I'll be speaking (in English) at the excellent in-person event Exchange Summit 2026 in Wรผrzburg, Germany on 24/25 February 2026.
-
Day 11 of #ITAdvent. Starting January 7, 2026 #Microsoft will switch root #certificate in their #EntraID services. If you use certificate pinning, you should update this configuration. See more on #Azure and certificates here: https://learn.microsoft.com/en-us/azure/security/fundamentals/azure-ca-details?wt.mc_id=M365-MVP-5000976 and more on #MC1193408 here https://mc.merill.net/message/MC1193408
-
RE: https://infosec.exchange/@franklesniak/115572191076370399
#ActiveDirectory #EntraID #IdentityManagement #AccessManagement #IdentitySecurity #ZeroTrust #GroupPolicy #ConditionalAccess #PrivilegedIdentity #PrivilegedIdentityManagement #PrivilegedAccessManagement #MicrosoftSecurity #PingCastle #PurpleKnight #Maester #DigitalIdentity
-
Excited to be putting the finishing screenshots in my #bsidesatl presentation about some new security controls that #AzureEntraID has made available around App Consent and Workload Identity protection. #entraid #Microsoft365 #cloudsecurity @bsidesatl
https://pretalx.com/bsidesatl-2025/talk/review/DMYAZJ83ZMUH8XWWPTTSBTKUYGDUHBJL
-
Centreon : comment configurer la connexion SSO avec Microsoft Entra ID et OpenID Connect ? https://www.it-connect.fr/centreon-sso-entra-id-et-openid-connect/ #Supervision #Centreon #EntraID
-
One Token to rule them all โ obtaining Global Admin in every Entra ID tenant
https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/
#HackerNews #OneTokenToRuleThemAll #EntraID #GlobalAdmin #Security #Cybersecurity #IAM
-
One Token to rule them all โ obtaining Global Admin in every Entra ID tenant
https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/
#HackerNews #OneTokenToRuleThemAll #EntraID #GlobalAdmin #Security #Cybersecurity #IAM
-
One Token to rule them all โ obtaining Global Admin in every Entra ID tenant
https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/
#HackerNews #OneTokenToRuleThemAll #EntraID #GlobalAdmin #Security #Cybersecurity #IAM
-
One Token to rule them all โ obtaining Global Admin in every Entra ID tenant
https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/
#HackerNews #OneTokenToRuleThemAll #EntraID #GlobalAdmin #Security #Cybersecurity #IAM
-
One Token to rule them all โ obtaining Global Admin in every Entra ID tenant
https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/
#HackerNews #OneTokenToRuleThemAll #EntraID #GlobalAdmin #Security #Cybersecurity #IAM
-
EntraใญใฐใSIEM(Sentinel)ใง็ฃ่ฆใใฆใฟใ Part2: Sentinelใซใใใญใฐใใใฎใคใณใทใใณใๆค็ฅใพใง
https://qiita.com/kaiinaba/items/a931b7f6890e0f0336cd?utm_campaign=popular_items&utm_medium=feed&utm_source=popular_items -
EntraใญใฐใSIEM(Sentinel)ใง็ฃ่ฆใใฆใฟใ Part2: Sentinelใซใใใญใฐใใใฎใคใณใทใใณใๆค็ฅใพใง
https://qiita.com/kaiinaba/items/a931b7f6890e0f0336cd?utm_campaign=popular_items&utm_medium=feed&utm_source=popular_items -
... just in case you wonder: I'm currently busy in #64bit land (god I hate #EntraID) but three weeks off next monday.
no plans for the time off, but certainly something #retrocomputing or #forth related.
-
๐๐ผ๐ ๐๐ผ ๐ฑ๐ถ๐๐ฎ๐ฏ๐น๐ฒ ๐ฆ๐ฒ๐น๐ณ-๐ฆ๐ฒ๐ฟ๐๐ถ๐ฐ๐ฒ ๐ฃ๐ฎ๐๐๐๐ผ๐ฟ๐ฑ ๐ฅ๐ฒ๐๐ฒ๐ ๐ณ๐ผ๐ฟ ๐ฎ๐ฑ๐บ๐ถ๐ป๐ถ๐๐๐ฟ๐ฎ๐๐ผ๐ฟ๐ ๐ถ๐ป ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ป๐๐ฟ๐ฎ ๐๐
Self-service password reset can be a useful feature that allows users to access their account in case they forget their password.
On the other hand, it is potentially risky, as a potential attacker may target the self-service password reset feature to gain access to the account. Especially for privileged accounts, this is very risky and therefore I would generally recommend disabling self-service password resets for privileged accounts.
๐บ Watch my YouTube video bellow ๐ ๐
https://youtu.be/KIlRPx_9XRA#cswrld #videotutorial #sspr #passwordreset #entraid #administrators
-
๐๐ผ๐ ๐๐ผ ๐ฏ๐น๐ผ๐ฐ๐ธ ๐๐ป๐ธ๐ป๐ผ๐๐ป ๐ฝ๐น๐ฎ๐๐ณ๐ผ๐ฟ๐บ๐ ๐ถ๐ป ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ป๐๐ฟ๐ฎ ๐๐
Under conditional access policies, it is possible to block individual device platforms. In general, it is a good idea to eliminate all ways that a potential threat actor could use to compromise the environment. In other words, block everything that is not needed.
This also applies to device platforms within Microsoft Entra ID. For example, if your organization only uses Windows, iOS, and Android, it's a good idea to disable all other platforms. If you also use macOS, you need to add macOS as well, of course.
What I would definitely recommend blocking is Windows Phone and other unknown platforms. Unrecognized / unknown platforms are usually spoofed User Agents, which is mainly used by threat actors.
๐บ Watch my YouTube video bellow ๐ ๐
https://youtu.be/vFhQgwXmqTo#cswrld #videotutorial #entraid #conditionalaccess #platforms #blocking
-
๐๐ผ๐ ๐๐ผ ๐ฟ๐ฒ๐พ๐๐ถ๐ฟ๐ฒ ๐ฐ๐ผ๐บ๐ฝ๐น๐ถ๐ฎ๐ป๐ ๐ฑ๐ฒ๐๐ถ๐ฐ๐ฒ ๐ณ๐ผ๐ฟ ๐ฎ๐ฝ๐ฝ๐น๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐ฎ๐ฐ๐ฐ๐ฒ๐๐ ๐ถ๐ป ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ป๐๐ฟ๐ฎ ๐๐
Requiring a managed device to access Microsoft 365 services (or generally any apps/services integrated with Microsoft Entra ID) is a very effective method of phishing protection.
This is because in such a case it is not enough for a threat actor to obtain, for example, login credentials through phishing. It is not even enough to somehow obtain or bypass MFA. In such a case, the threat actor would also have to have a managed device from the organizationโs tenant. Which should be unrealistic to obtain.
Thus, requiring access from a managed device is a very effective and powerful method of protecting corporate identity. And yet it shouldnโt be too complicated to deploy, since corporate devices should be managed anyway.
๐บ Watch my YouTube video on how to require compliant devices via conditional access policies in Microsoft Entra ID ๐ ๐
https://youtu.be/mH-8x29xdW0#cswrld #videotutorial #entraid #devicecompliance #applications
-
๐๐ก๐จ๐ฎ๐ฅ๐ ๐ ๐ญ๐ซ๐ฎ๐ฌ๐ญ ๐๐ฑ๐ญ๐๐ซ๐ง๐๐ฅ ๐๐ ๐ ๐จ๐ซ ๐ง๐จ๐ญ ๐๐ง ๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ ๐๐ง๐ญ๐ซ๐ ๐๐?
Trust or do not trust external MFA in Microsoft Entra ID? There are different opinions, and I will talk about the pros and cons in this video.
๐บ Watch my YouTube video bellow ๐ ๐
https://youtu.be/xjmUay482Mk -
๐๐ฅ๐จ๐๐ค๐ข๐ง๐ ๐ฎ๐ฌ๐๐ซ ๐๐จ๐ง๐ฌ๐๐ง๐ญ ๐ญ๐จ ๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ ๐๐ง๐ญ๐ซ๐ ๐๐ ๐๐ง๐ญ๐๐ซ๐ฉ๐ซ๐ข๐ฌ๐ ๐๐ฉ๐ฉ๐ฌ
Microsoft Entra ID is primarily an identity system for Microsoft applications and services. However, you can also integrate other applications and services with Microsoft Entra ID. And itโs even highly recommended, because you get single sign-on using corporate identity, you donโt have to maintain another separate user account system, you have the ability to apply conditional access policies to these external applications and services, etc.
But the problem is that by default, even a regular user can give consent to an external application to access Microsoft Entra ID and other services tied to it. This is very risky as it can lead to leakage of sensitive internal information as such applications can have arbitrary permissions that the user gives the application access to.
๐บ Watch my YouTube video bellow on how to block user consent to Enterprise Apps in Microsoft Entra ID ๐ ๐
https://youtu.be/Ht-zcZt9nzM -
๐๐๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐๐๐ ๐๐
Smart Lockouts in Microsoft Entra ID help protect Microsoft Entra ID accounts from password attacks. And smart lockouts are also called smart lockouts because they are smart in the meaning of that they should not negatively impact regular users.
๐บ Do you want to learn more about Smart Lockouts in Microsoft Entra ID? Watch my YouTube video bellow ๐ ๐
https://youtu.be/7V7BJcqb5CM#cswrld #smartlockouts #entraid #cybersecurity #videotutorial
-
๐๐๐ ๐ ๐๐๐๐๐๐ ๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐๐๐๐ ๐๐๐๐ ๐๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐๐๐ ๐๐
In Microsoft Entra ID, there are Enterprise Apps and App Registrations. Many administrators donโt know the difference between the two and confuse the two important concepts. But there is a major difference between them, and it is good to know it.
๐บ Watch my YouTube video bellow ๐ ๐
https://youtu.be/4ljbruQOOiI#cswrld #videotutorial #entraid #enterpriseapps #appregistrations
-
๐๐๐ฌ๐ฌ๐ค๐๐ฒ๐ฌ ๐ข๐ง ๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ ๐๐ฎ๐ญ๐ก๐๐ง๐ญ๐ข๐๐๐ญ๐จ๐ซ ๐๐ซ๐ ๐ง๐จ๐ฐ ๐ ๐๐ง๐๐ซ๐๐ฅ๐ฅ๐ฒ ๐๐ฏ๐๐ข๐ฅ๐๐๐ฅ๐!
What does it mean? Users can now enroll passkeys in Microsoft Authenticator for their Microsoft Entra ID accounts in the default authentication methods setting. No need for key restrictions anymore!
-
๐๐๐ ๐ ๐๐๐๐๐๐ ๐๐๐๐๐๐๐ ๐๐ ๐ ๐๐๐ ๐๐๐๐๐๐๐๐-๐๐๐๐๐๐๐๐๐ ๐๐ ๐
Phishing is a very popular technique of attackers. They trick the user into entering their credentials on some fraudulent site pretending to be a corporate login page, for example to log into Microsoft Entra ID. The user enters their login credentials there and sends them to the attacker.
๐บ Watch my YouTube video where I show the difference between MFA and phishing-resistant MFA ๐ ๐
https://youtu.be/NGx6tRKtEFI#cswrld #video #mfa #phishing #authentication #phishingresistant #entraid
-
๐๐๐ ๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐๐ ๐๐๐๐๐๐ ๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐๐๐ ๐๐
When an organization uses passwordless authentication, they need to figure out how to onboard users. In other words, you need to solve the chicken/egg problem. If a user has not registered any passwordless authentication method, how can they authenticate to register a passwordless authentication method?
Temporary Access Pass (TAP) solves this problem.
๐บ Watch my YouTube video bellow on how to use Temporary Access Pass in Microsoft Entra ID ๐ ๐
https://youtu.be/AqqvMqNcXRU#cswrld #entraid #temporaryaccesspass #authentication #tap #videotutorial
-
๐๐๐ ๐๐ ๐๐๐๐๐๐ ๐๐๐๐๐-๐๐๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐๐๐ ๐๐
When you start tightening the requirements for access to your corporate cloud, it can be easy to accidentally lock yourself out and cut yourself off from access to the admin interface.
Alternatively, some part of Microsoft Entra ID may fail. For example, there have been a couple of times in the past where multi-factor authentication in Microsoft Entra ID has had a failure and you couldnโt authenticate.
That is why you need break-glass accounts.
๐บ Watch my YouTube video bellow on how to manage break-glass accounts ๐ ๐
https://youtu.be/Q2vicBapspg -
Protecting OAuth is important and it's been flying under many admins radar for far too long. Follow this article and you will have now prevented misleadingly named apps, potentially malicious apps, apps with misleading publisher names, apps performing unusual amounts of file downloads, the addition of credentials to OAuth, and apps with a strange ISP for an OAuth.
#M365 #entraID #defenderforcloudapps #MSP #ITSP
https://bit.ly/48tEYQH -
๐ฃJust Blogged: ๐Authenticate ASP.NET MVC with #Azure AD ๐ https://tinyurl.com/MVCEntraID
.
.
.
.
.
#SitecoreMVP #LearnSitecore #SitecoreLearning #Avanade #AvanadeDoWhatMatters #Accenture #Microsoft #OpenAI #MVP #MVPBuzz #SitecoreSYM #SUGCON #DotNet #hashnode #EntraId @hashnode -
Authentication Strengths in Microsoft Entra ID allows you to granularly define authentication requirements for different situations.
Before authentication strengths were available, authentication requirements were defined globally for the entire tenant, and then conditional access policies could just say that multi-factor authentication was required, for example. But it was not possible to define what type of multifactor authentication was required. So anything that was available globally could be used by all users in all situations.
Which was not optimal. There are situations where a less secure authentication method like SMS or TOTP might be enough. But there are situations where we only want to use very secure authentication methods like FIDO2 when someone is logging into a global admin account for example.
Such granularity was not possible before. If SMS authentication was enabled for a given tenant, even the global admin could use SMS for authentication.
Watch my YouTube video bellow for more details ๐ ๐
https://youtu.be/8sIX19pbdho#cswrld #cybersecurity #entraid #authentication #authenticationstrength #conditionalaccess
-
RECOMMENDED CONDITIONAL ACCESS POLICIES IN MICROSOFT ENTRA ID
Conditional access policies in Microsoft Entra ID allow for very granular security management. The problem is that organizations usually do not have conditional access policies properly defined. There tend to be blind spots, policies donโt cover all applications, all users, and all scenarios.
Many organizations have conditional access policies defined but do not think about them properly. This is because they often target only specific applications or specific users. And when I ask them why the MFA policy only targets Office 365 for example, they tell me they donโt use anything else. Or when I ask why they only target one group of users, they tell me that other users donโt use cloud services.
But thatโs just the wrong approach. You are not primarily protecting the services from your users, but from attackers. And just because you donโt use anything other than Office 365 doesnโt mean an attacker will not use it. Or just because some users donโt use cloud services doesnโt mean those accounts canโt be exploited by an attacker. If those apps or accounts exist in the cloud, they need to be protected whether regular users use them or not. Attackers are looking for the most insecure places, the weakest links.
๐บ Watch my YouTube video bellow where I talk about the conditional access policies that I recommend implementing ๐ ๐
https://youtu.be/LtIgFBDJzXs#cswrld #videotutorial #entraid #conditionalaccess #recommendation
-
Protecting OAuth is important and it's been flying under many admins radar for far too long. Follow this article and you will have now prevented misleadingly named apps, potentially malicious apps, apps with misleading publisher names, apps performing unusual amounts of file downloads, the addition of credentials to OAuth, and apps with a strange ISP for an OAuth.
#M365 #entraID #defenderforcloudapps #MSP #ITSP
https://bit.ly/48tEYQH -
Conditional Access is hard - gaps can exist and you wonโt even know.
Never mind trying to keep on top of all the different policies and apps you have in place due to changing requirements over the years.
Thatโs why, aligning your policies to user personas is a great way to simplify your setup.
https://learn.microsoft.com/en-us/azure/architecture/guide/security/conditional-access-architecture
-
Protecting OAuth is important and it's been flying under many admins radar for far too long. Follow this article and you will have now prevented misleadingly named apps, potentially malicious apps, apps with misleading publisher names, apps performing unusual amounts of file downloads, the addition of credentials to OAuth, and apps with a strange ISP for an OAuth.
#M365 #entraID #defenderforcloudapps #MSP #ITSP
https://bit.ly/48tEYQH -
Looking for this magic crowd knowledge! I seem to recall news somewhere (here, LinkedIn, newsletter, maybe?), that #EntraID would support #Passkeys during the MFA registration prompt when signing in. Like the experience to enroll your Authenticator app. Sadly, I can't rediscover this :sad_panda: Would anybody have an idea or pointer? Maybe @merill
Any pointers, boosts, etc welcome! Thaks!
Edit: OF COURSE one finds what one searchs less than an hour after asking other people. Well, thanks for reading anyways!
https://mc.merill.net/message/MC718260(Caveat is, I'm not sure if this is really what I thought it meant originally).