Certificate-Based Authentication (CBA) isn't just another passwordless option. It's the heavy hitter. The one that binds identity and device trust into a single proof of authenticity. The one where phishing attacks hit a wall instead of a user. And yes, the one that makes your compliance team nod approvingly. In this session, we're going beyond the passwordless basics and diving deep into CBA across Windows, macOS, iOS, and Android. No vendor fluff, no death-by-PowerPoint. Just practical implementation guidance from someone who's deployed this in the real world
“My name is Oktay Sari and I live in Hoofddorp, the Netherlands. I am happily married with 2 children and our dog Lucy. I like to read a good book, have a nice BBQ and enjoy a delicious craft beer with friends and family. The little things in life matter the most to me” Oktay has been working as an IT specialist since 1997 and has fulfilled various roles over the years.. For the past 9+ years, he has honed his skills in Endpoint management, Microsoft Intune and all things Security. In 2022 he received the Microsoft Most Valuable Professional (MVP) award in the Security (Intune) category for his community contributions and thought leadership. With the growing prevalence of macOS in corporate settings, his current focus is on leveraging Microsoft Intune's capabilities to ensure robust and efficient management of macOS devices.