Picture of Adam Zucker

Adam Zucker

Adam Zucker specializes in enterprise mobility and identity management. He works with customers to develop strategic and long-term solutions, planning and implementing projects using Microsoft IAM and enterprise mobility tools. Adam’s well-rounded skill set allows him to recommend solutions that meet both big picture and day-to-day needs for businesses.

Since the introduction of passwords as the standard for computer authentication, there haven’t been many changes beyond enforcing password length and character complexity requirements and the introduction of two-factor authentication [...]

There are several ways to deploy applications to users or devices that are managed by Microsoft Intune. In addition to application types, you must also take into consideration the method [...]

In my previous blog [Win32 App Deployment with Intune Supersedence Rules] I explained how to update Win32 applications deployed within Microsoft Intune by using the supersedence feature. Although the process [...]

In this post learn how to implement claims-based application access control when Azure AD B2C is federated with another identity provider. [...]
In this blog, I’ll show you how to configure a service provider-initiated SAML application to integrate with Azure AD B2C. [...]
Planning for a Microsoft Information Protection deployment can seem complicated at first; however, the recommendations in this article can help guide you in the right direction. An efficient design will [...]
There are a few key terms that are critical when understanding and deploying Microsoft Information Protection (MIP). For example, sensitivity labels give you a way to classify and protect data [...]
Migrating your Active Directory Federation Services (AD FS) integrated SaaS applications to Azure Active Directory (Azure AD) provides many benefits. For example, Azure AD B2B lets you give your business [...]

We’re frequently asked how to enable compliance notifications for devices enrolled in Microsoft Intune. Although this task isn’t difficult, there are numerous ways to easily misconfigure it. The basic requirements [...]

Learn how to find out what security groups grant access to the MIM Synchronization Service [...]