Lessons and takeaways from Workplace Ninjas UK 2025

Apologies for the delays in blogging. I’ve been working hard on PowerSyncPro and other fun projects that have kept me away from GeekWolf. I had the pleasure of attending Workplace Ninjas UK 2025, it delivered deep technical insights, candid conversations with experts, and some much-needed reality checks around modern identity, security, and endpoint management. Here are some of the standout takeaways and lessons I brought back:


🔐 Identity & security insights

Entra External ID limitations

Entra External ID doesn’t support multi-tenant application registrations. If you’re thinking about managing identities across environments, use a dedicated workforce tenant. Just one tenant is sufficient for the dev, test, staging, prod environments - but separate authentication from collaboration and infrastructure responsibilities for better governance and clarity.

Bypassing app registrations with access tokens

You can use -AccessToken with Read-Host in PowerShell to authenticate to Microsoft Graph without app registrations. Just pull the bearer token from your browser (like in Azure Portal) using developer tools. It’s incredibly fast—and also an enormous attack surface. Eye-opening in terms of how quickly access can be gained. Adding Conditional Access and requiring Session Control for token protection helps mitigate risk here.

Why locking down admin portals matters

This simple misuse of access tokens reinforces why locking down who can access administrative portals is crucial. If someone can impersonate a privileged user via token, they’ve got free rein.

The danger of application ownership

Be careful with assigning owners to app registrations and enterprise apps. Owners can create secrets or certificates, effectively assuming the app’s full permissions. Think of it as letting someone become the app. If you’re not explicitly giving them that power — don’t make them an owner.

Enterprise app secret injection

Even though the UI doesn’t expose it, secrets can be added to enterprise applications — including those based on multi-tenant app registrations. To lock this down, use the App Instance Property Lock on every app registration.


🧩 RBAC, guests & management

PIM groups + permanent roles = loophole

Don’t mix PIM groups with permanent roles and eligible members. This creates a security gap where users aren’t “elevated”, allowing lower-privilege roles (like User Admin) to change their password or reset MFA. That’s a big risk.

Use restricted management units (RMUs)

Want to protect sensitive accounts and groups? Use Restricted Management Units to cordon off access. Only explicitly authorised users should be able to make changes to anything inside these units.

Lock down guest access

Always block guests from accessing the Azure portal, and assign them the most restrictive roles. Without this, any guest account can be used for reconnaissance on your tenant—and you’d be surprised how much they can see.

Decode access tokens with jwt.ms

Need to inspect an access token? Use jwt.ms to instantly parse and decode it. Great tool for debugging and understanding token claims.


💻 Endpoint security & hardening

A lot of great discussion around securing Windows 11 environments, especially for enterprise. Here’s what to enable:


👋 Conversations that stood out

During a panel discussion, I raised my hand when Autopilot was presented as the only supported method for moving from hybrid join to Entra. I challenged that, and Microsoft came back on stage to clarify: while Autopilot is recommended, there are legitimate cases—like M&A scenarios—where it’s not practical.

I also got the chance to speak with Adam from Microsoft, who authored an internal device migration script (minus user profiles). He was already aware of what we’re building with PSP, and was genuinely impressed with our work. Always encouraging to see your efforts resonating within Microsoft itself.


Final thoughts

Workplace Ninjas UK never fails to deliver that unique blend of deep dives, real-world war stories, and community wisdom. This year was no different—plenty of new ideas, some strong warnings, and a lot to take back and implement.

Looking forward to putting these insights into practice—and already excited for the next event.

Comments

Add a comment
Loading...
Follow
Follow