u/Due-Awareness9392

Is a truly passwordless Enterprise Password Manager even possible in a Hybrid M365 shop?

We are currently running a trial of Bitwarden Enterprise, but I’ve hit a structural roadblock in our hybrid Microsoft 365 / Entra ID environment where Windows Hello for Business (WHFB) is fully rolled out, and our users are completely passwordless on the desktop layer—accessing their primary workstations and native M365 apps without typing a single credential. The problem is that while our workstation layer uses an advanced passwordless authentication software framework, every enterprise password manager we evaluate still demands a "Master Password" or secondary static credential to unlock the vault for daily use, completely breaking the seamless user experience we’ve spent months building.

If identity has already been securely established at the endpoint via hardware-backed biometrics or a PIN, it feels counterintuitive to force users back into legacy typing for their vaults, so I'm wondering if there is a modern passwordless authentication solution on the market that integrates natively with WHFB or Entra ID to unlock the vault without a master password fallback, and how other fully passwordless shops are handling credential storage for non-federated legacy apps without introducing password fatigue back into the mix.

reddit.com
u/Due-Awareness9392 — 1 day ago

We kept missing VPN MFA enforcement gaps, so we built a repeatable 10-check audit we run every quarter

We thought we had MFA covered on VPN. Dashboard said enabled, IT said deployed, auditors said compliant. Then a red team exercise got in within 2 hours not through a zero-day, through a RADIUS fallback path nobody had touched since 2021.

So we stopped doing ad hoc "MFA is on, we're good" checks and built a fixed audit that runs the same 10 categories every time:

  • Primary auth path MFA coverage
  • RADIUS / legacy fallback status
  • Service account VPN access audit
  • Break-glass account MFA exceptions
  • Push notification number matching enabled
  • Session token lifetime per user tier
  • MFA fatigue alerting threshold configured
  • Privileged account phishing-resistant MFA (FIDO2)
  • Conditional access policy for anomalous geolocation
  • VPN appliance CVE patch status (SonicWall / Fortinet / Ivanti)

What helped most wasn't adding more MFA factors it was running the same checks consistently:

  1. Same 10 categories every quarter, no improvising
  2. Flag only WARN / FAIL in the report PASS is invisible noise
  3. PASS / WARN / FAIL scoring so IT, security, and leadership triage from the same sheet

For teams managing VPN MFA across your org: what's your current enforcement gate?

  • Full block on any FAIL before next access review?
  • FAIL gets remediated, WARN gets a 30-day window?
  • No formal gate we fix things as incidents surface?
reddit.com
u/Due-Awareness9392 — 1 day ago
▲ 8 r/CyberSecurityAdvice+1 crossposts

Need Suggestions for the Privileged Access Management (PAM) Solution

We are a mid-sized organization in the banking and financial sector looking to implement a PAM solution for securing privileged access and meeting compliance requirements. Previously we have evaluated solutions including delinea, miniorange, manageengine, and jump cloud.

Looking for feedback from anyone who has used or is currently using these platforms - especially regarding security, reporting, integrations, support, and overall experience.

reddit.com
u/Due-Awareness9392 — 5 days ago
▲ 7 r/CyberIdentity_+1 crossposts

How to force MFA at Windows logon when using password?

Trying to understand something around Windows logon MFA.

We already use Windows Hello for Business and most cloud services are protected with MFA. Users can log in with biometrics/PIN just fine, but they still have the option to fall back to their password at Windows logon and that doesn’t trigger any additional verification.

From a security perspective, that feels like a gap. If someone gets the password (or a device is stolen/shared), the login still succeeds without another factor.

For those running Entra/Intune environments:

  • Are you disabling password sign-in entirely?
  • Enforcing passwordless/WHfB only?
  • Using smart cards, security keys, Duo, or another MFA for Windows logon approach?

Curious how others are handling MFA at the actual Windows login layer vs just protecting cloud apps/services.

reddit.com
u/Due-Awareness9392 — 7 days ago

Stop treating AI Agents like Service Accounts. It’s an Identity Crisis waiting to happen.

The era of the "Human-in-the-loop" is shrinking. We are moving toward a world of autonomous AI Agents that execute transactions, modify cloud infrastructure, and access sensitive databases on our behalf.

However, our current security models are lagging. We need a specialized approach to AI Agent Identity and Access Management (IAM). Standard IAM frameworks built for human usernames and passwords simply cannot handle autonomous entities that scale to 1,000 instances in seconds.

The Pillars of a Robust AI Agent IAM Strategy:

  • The Identity Shift: We must move beyond "bots" and "service accounts" toward a formal framework for non-human identity management (NHI). Every agent needs a verifiable identity that is decoupled from human credentials.
  • Proof of Origin: Implementing secure workload identity for AI agents is non-negotiable. We need attestation-based identities (like SPIFFE) where identity is issued based on the software’s provenance and environment.
  • Granular Control: To prevent data exfiltration via prompt injection, we must enforce least privilege AI agents. If an agent only needs one S3 bucket, it shouldn't have the keys to the kingdom.
  • Modern Handshakes: Move away from static API keys. AI agent authentication methods must evolve to include mTLS, short-lived ephemeral tokens, and hardware-backed attestation.
  • Total Governance: From automated provisioning to secure decommissioning, AI agent lifecycle management must be a core part of the security workflow. Orphaned agents are the new "Shadow IT."

Let’s Discuss:

  1. Are you seeing "Service Account bloat" from new AI tools in your environment?
  2. How are you handling the implementation of permissions for agents with non-deterministic behavior?
  3. What’s the biggest hurdle you face when trying to troubleshoot a failed authentication for a headless agent?

The "Service Account" band-aid isn't going to hold much longer. Let’s hear how you’re securing the next generation of autonomous workflows.

Deep Dive Resources:

reddit.com
u/Due-Awareness9392 — 9 days ago

Most AI governance frameworks were written for a human making one decision at a time. But an autonomous agent running inside a browser under a user's authenticated session looks like normal activity to your EDR, CASB, and proxy because to the network, it is.

The real governance gap isn't policy. It's attribution. You can see something happened in that session. You can't tell if it was the user or the agent.

And the people running these agents? They think they automated a workflow not the same as "using an AI tool" in their heads. Your AI governance policy never accounted for that distinction.

So the real question: how do you build AI governance that covers autonomous action not just tool usage without pulling tools from teams that depend on them?

reddit.com
u/Due-Awareness9392 — 15 days ago

Been job hunting lately and noticed a few help desk roles asking for Google Workspace admin experience. Most of my background is Windows/M365, never really worked with Workspace or Macs.

Is it actually worth learning, or is Microsoft still the safer bet?

reddit.com
u/Due-Awareness9392 — 17 days ago
▲ 14 r/nagpur

Nagpur me sachme development ho raha hai ya bas development hone ka dikhava?

Jo ache raste hai vo tod kr cement ke raste bana diye thik hai, bridges, bana diye thik hai connectivity achi hogayi thik hai, cafes open ho rahe hai thik hai, accident badh rahe hai thik hai, murder badh rahe hai thik hai...

Jobs q badh nahi rahe hai? Q 8year experience person ko 10k ki salary offer ho rahi hai? Q nagpur se bahar gaye logoko bapas ane ki icha hote hue bhi nahi arahe hai?

Gadkari sachme nagpur ke hi hai na? Fadnavis sachme nagpur ke hi hai na? Vo sachme Maharashtra ke hi CM hai na? Agar ha to Nagpur me Industries q nahi vadh rahe hai high paying jobs q nahi badh rahe hai?

Why?

reddit.com
u/Due-Awareness9392 — 18 days ago

We had one of those “VPN is secure enough” conversations recently.

You know the logic encrypted tunnel ✔️
managed devices ✔️
restricted access ✔️

So… we’re good, right?

Then we started seeing login attempts from locations our users definitely weren’t in. Nothing got through, but it raised a bigger question if someone did have valid credentials, what’s actually stopping them?

Because that’s the part that feels overlooked.

VPN doesn’t really care who you are it cares if your credentials are valid. If those get compromised (phishing, reuse, leaks), you’re basically giving attackers a direct path inside your network.

And the “managed device” argument? Also feels weaker the more you think about it. If the session is authenticated, the VPN isn’t really re-checking intent or behavior.

I went down a bit of a rabbit hole and found a solid breakdown on why VPN security fails without MFA it basically explains how VPN protects the connection, not the identity.

That kind of flipped the way I look at it.

Feels like we’ve been treating VPN as a security control, when it’s really just a transport layer. The real question is what’s verifying the user behind it?

reddit.com
u/Due-Awareness9392 — 25 days ago

Hey all,

I’m trying to wrap my head around modern authentication (modern auth) and how it actually works in a real environment.

Right now we’re in a mixed setup some users on MFA, some still using older clients with app passwords, and it’s honestly a bit messy. App passwords in particular are painful (delays, weird client behavior, etc.), which is what got me looking into modern auth in the first place.

From what I understand so far, modern authentication replaces basic auth with a token-based system (OAuth/ADAL), which allows things like MFA, conditional access, and SSO to work properly. Instead of apps constantly asking for username/password, users authenticate once and then a token is used behind the scenes.

But where I’m still confused is the actual user experience:

  • When a user signs into Outlook or another client, what exactly changes?
  • Is it just username > password > MFA prompt (if enabled)?
  • And if MFA isn’t enabled, is it basically the same as before but just more secure in the background?

Also trying to understand how this impacts legacy setups like older Office versions or apps that don’t support modern auth. From what I’ve read, they either fall back to basic auth or require app passwords, which kind of defeats the purpose.

Curious how others rolled this out:

  • Did modern auth actually simplify things for users?
  • Any issues with older clients or unexpected breakages?
  • And is it safe to assume that enabling modern auth is step one before fully killing legacy auth?

Would appreciate any real-world input trying to understand this beyond Microsoft docs 😅

reddit.com
u/Due-Awareness9392 — 25 days ago

We’re looking at Duo MFA, but the bigger question is how well it integrates with a broader security stack like SSO, VPNs, PAM, SIEM, and endpoint tools. On paper it looks flexible, but I’m curious whether real-world integrations are smooth or if policy gaps, logging issues, or vendor compatibility become a problem. Anyone run into challenges with this?

reddit.com
u/Due-Awareness9392 — 1 month ago