<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Keytos Documentation on Keytos Docs</title>
    <link>https://www.keytos.io/docs/</link>
    <description>Recent content in Keytos Documentation on Keytos Docs</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <copyright>ALL RIGHTS RESERVED. © 2026 Keytos</copyright>
    <lastBuildDate>Wed, 08 Apr 2026 07:30:00 -0700</lastBuildDate>
    <atom:link href="https://www.keytos.io/docs/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>How-To: Issue SCEP Certificates to Windows Devices with Intune</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/create-windows-intune-scep-profiles/</link>
      <pubDate>Wed, 01 Apr 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/create-windows-intune-scep-profiles/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---how-to-issue-scep-certificates-to-windows-devices-with-intune&#34;&gt;Introduction - How to Issue SCEP Certificates to Windows Devices with Intune&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-issue-scep-certificates-to-windows-devices-with-intune&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;This guide shows how to issue X509 certificates to Windows devices with Microsoft Intune and SCEP. You will create:&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;A &lt;strong&gt;Trusted Certificate&lt;/strong&gt; profile to establish trust with your CA chain.&lt;/li&gt;&#xA;&lt;li&gt;A &lt;strong&gt;SCEP Certificate&lt;/strong&gt; profile to request and install certificates for users or devices.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;By the end, your Windows devices will be able to enroll and receive certificates from your EZCA SCEP CA.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Add EZSSH Access to Endpoints With Cloud Init</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/adding-ezssh-access-to-endpoints/adding_ezssh_using_cloud_init/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/adding-ezssh-access-to-endpoints/adding_ezssh_using_cloud_init/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/creating-your-first-policy/&#34;&gt;Have at least one policy with endpoints&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZSSH uses SSH Certificates to authenticate to endpoints. Since this is a OpenSSH supported protocol, no custom code has to run on your endpoints for authentication to work. By &lt;a href=&#34;https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/deployment_guide/sec-distributing_and_trusting_ssh_ca_public_keys&#34;&gt;adding your EZSSH Certificate to your TrustedUserCAKeys&lt;/a&gt; your endpoint will start working with EZSSH.&lt;/p&gt;&#xA;&lt;p&gt;In this page we will go through how to do this using &lt;a href=&#34;https://cloudinit.readthedocs.io/en/latest/&#34;&gt;cloud init&lt;/a&gt;. You might also be interested in:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create a Subordinate ADCS CA in EZCA</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/how-to-create-an-adcs-ca/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/how-to-create-an-adcs-ca/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;Selecting a Plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-root-ca-in-azure/&#34;&gt;Create First Root CA&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;overview---how-to-create-an-external-issuingsubordinate-ca&#34;&gt;Overview - How To Create an External Issuing/Subordinate CA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---how-to-create-an-external-issuingsubordinate-ca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;As you start to modernize your PKI, you might want to &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-root-ca-in-azure/&#34;&gt;move your Root CA to EZCA&lt;/a&gt;. However, your migration plan might still have some on-premises CAs for certain workloads. In this page we will go through how you can sign your external CA (for example ADCS (Active Directory Certificate Services) CA) with your EZCA Root.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create Cloud RADIUS Network Policies for Certificate Authentication</title>
      <link>https://www.keytos.io/docs/cloud-radius/create-cloud-radius-network-policies/how-to-create-certificate-radius-policy/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/create-cloud-radius-network-policies/how-to-create-certificate-radius-policy/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra applications are registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/&#34;&gt;You have an active EZRADIUS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/managing-subscription/&#34;&gt;You are a Subscription Owner or Network Administrator on your EZRADIUS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&#xA;&#xA;&#xA;&lt;h2 id=&#34;how-to-create-cloud-radius-network-policies---video-tutorial&#34;&gt;How to Create Cloud RADIUS Network Policies - Video Tutorial&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-cloud-radius-network-policies---video-tutorial&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div class=&#34;video-medium&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/2kijpP0gpk8?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;introduction-to-managing-cloud-radius-network-policies-in-ezradius&#34;&gt;Introduction to Managing Cloud RADIUS Network Policies in EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction-to-managing-cloud-radius-network-policies-in-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The Policies page in EZRADIUS allows you to create and manage your Cloud RADIUS network policies. Each policy defines the conditions under which a user or device can connect to your network, including authentication methods, accepted certificate authorities, and access policies.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create EZRADIUS Cloud Radius as an Azure Resource</title>
      <link>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/how-to-create-radius-service-in-azure/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/how-to-create-radius-service-in-azure/</guid>
      <description>&lt;div class=&#34;alert alert-warning&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Free Trials&lt;/div&gt;&#xA;&lt;p&gt;Due to Azure Marketplace limitations, we are unable to offer a free trial plan when creating EZRADIUS through the Azure Portal. To take advantage of our free trial, please create your EZRADIUS instance directly through our &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/select-radius-plan-in-ezradius/&#34;&gt;EZRADIUS Portal&lt;/a&gt;. After your trial period, you can &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/managing-subscription/migrate-cloud-radius-azure-subscription/&#34;&gt;migrate your policies&lt;/a&gt; to an Azure-based subscription.&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra applications are registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;how-to-create-cloud-radius---video-tutorial&#34;&gt;How to Create Cloud RADIUS - Video Tutorial&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-cloud-radius---video-tutorial&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div class=&#34;video-medium&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/ZOOa0x5iPBw?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;how-to-create-ezradius-as-an-azure-resource&#34;&gt;How To Create EZRADIUS as an Azure Resource&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-ezradius-as-an-azure-resource&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Go to &lt;a href=&#34;https://portal.azure.com/&#34;&gt;https://portal.azure.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click on &amp;ldquo;Create a resource&amp;rdquo;.&lt;/li&gt;&#xA;&lt;li&gt;Type &amp;ldquo;EZ RADIUS&amp;rdquo; in the search bar.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/azure-portal-radius-as-a-service.png&#34; alt=&#34;Azure Portal Create a resource page with EZ RADIUS typed in search bar&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Press enter.&lt;/li&gt;&#xA;&lt;li&gt;Select the EZRADIUS offering&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/create-cloud-radius.png&#34; alt=&#34;Azure Marketplace search results showing EZ RADIUS by Keytos offering highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select the plan.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/select-cloud-radius-plan-in-azure.png&#34; alt=&#34;Select your cloud radius Plan&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Subscribe&amp;rdquo; button&lt;/li&gt;&#xA;&lt;li&gt;Enter your subscription and resource group information.&lt;/li&gt;&#xA;&lt;li&gt;Enter the name of the subscription you want to use.&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Review + Subscribe&amp;rdquo; button&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/create-azure-radius.png&#34; alt=&#34;Enter details for Azure RADIUS as a Service&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Subscribe&amp;rdquo; button&lt;/li&gt;&#xA;&lt;li&gt;Once the subscription is complete, click the &amp;ldquo;Configure account now&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/cloud-radius-in-azure.png&#34; alt=&#34;Configure your cloud radius&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;This will redirect you to our portal (&lt;a href=&#34;https://portal.ezradius.io/%29&#34;&gt;https://portal.ezradius.io/)&lt;/a&gt;. Sign in with your same Microsoft account.&lt;/li&gt;&#xA;&lt;li&gt;If you created an dedicated plan, select the deployment region and subdomain.&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Create Instance&amp;rdquo; button. This will activate your Azure subscription and assign your account to an EZRADIUS instance.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/CreateInstance.png&#34; alt=&#34;Create Cloud RADIUS Instance&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Once your instance is ready, the instance URL will be displayed, it is recommended you bookmark this instance so you can enter it directly.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/create-cloud-radius-in-azure.png&#34; alt=&#34;Finish the creation of cloud radius service&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;You can now access your EZRADIUS instance by clicking on the instance URL.&lt;/li&gt;&#xA;&lt;li&gt;Once you have created your instance, you can now connect to your SIEM. &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/connect-cloud-radius-to-siem/&#34;&gt;Learn how to connect to your SIEM&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>How-To: Issue Entra CBA Smart Cards with Azure PKI</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-enable-phishing-resistant-authentication-in-entra-id-domain/create-cloud-pki-for-entra-cba/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-enable-phishing-resistant-authentication-in-entra-id-domain/create-cloud-pki-for-entra-cba/</guid>
      <description>&lt;h2 id=&#34;prerequisites-for-creating-entra-cba-smart-cards-with-ezcms-and-ezca&#34;&gt;Prerequisites for Creating Entra CBA Smart Cards with EZCMS and EZCA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites-for-creating-entra-cba-smart-cards-with-ezcms-and-ezca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;EZCA Subscription&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Having certificate based authentication requires you to have a Certificate Authority that will issue certificates for your smart cards. We recommend using a PKI as a service CA such as our &lt;a href=&#34;https://www.keytos.io/azure-pki&#34;&gt;EZCA&lt;/a&gt; tool to have a compliant, HSM backed CA without all the management overhead.&lt;/p&gt;&#xA;&lt;h2 id=&#34;getting-started---creating-a-cloud-pki-for-entra-cba&#34;&gt;Getting Started - Creating a Cloud PKI for Entra CBA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#getting-started---creating-a-cloud-pki-for-entra-cba&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Go to &lt;a href=&#34;https://portal.ezca.io/&#34;&gt;https://portal.ezca.io/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Login with an account that is registered as a PKI Admin in EZCA.&lt;/li&gt;&#xA;&lt;li&gt;Navigate to Certificate Authorities.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/CAMenu.png&#34; alt=&#34;Cloud CA Menu for Entra CBA Certificates&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click on the &amp;ldquo;Create CA&amp;rdquo;&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/CREATECA.png&#34; alt=&#34;Create Cloud PKI for Entra CBA&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select Subordinate/Intermediate CA.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/CREATECA1b.png&#34; alt=&#34;Select Subordinate/Intermediate Cloud CA&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click Next&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h3 id=&#34;entering-cloud-ca-information&#34;&gt;Entering Cloud CA Information&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#entering-cloud-ca-information&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Enter &lt;strong&gt;Common Name&lt;/strong&gt;: This is the name of the CA how it will appear in the certificate.&lt;/li&gt;&#xA;&lt;li&gt;(Optional) Enter &lt;strong&gt;CA Friendly Name&lt;/strong&gt; This is the name that will appear in the EZCA portal, by default we will use the Common Name&lt;/li&gt;&#xA;&lt;li&gt;(Optional) Enter the &lt;strong&gt;Organization&lt;/strong&gt; The Organization field is an optional certificate field that usually has the company name.&lt;/li&gt;&#xA;&lt;li&gt;(Optional) Enter the &lt;strong&gt;Organization Unit&lt;/strong&gt; The Organization Unit field is an optional certificate field that usually contains the unit that runs this CA (For example: IT or HR).&lt;/li&gt;&#xA;&lt;li&gt;(Optional) Enter the &lt;strong&gt;Country Code&lt;/strong&gt; The Country Code field is an optional certificate field that identifies the country where this CA is located.&lt;/li&gt;&#xA;&lt;li&gt;Click Next.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/CREATECA2b.png&#34; alt=&#34;CA Details for Entra CBA Cloud PKI&#34;&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h3 id=&#34;cryptographic-requirements&#34;&gt;Cryptographic Requirements&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#cryptographic-requirements&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Unless you have specific compliance or security requirements, leave the default cryptographic values for best security and compatibility.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/CREATECA3.png&#34; alt=&#34;Crypto Details For Entra CBA&#34;&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h3 id=&#34;validity-period&#34;&gt;Validity Period&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#validity-period&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Select your Validity Period &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/concepts/what-is-the-best-validity-period-for-a-ca/&#34;&gt;Learn more about Validity Period best practices&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Enter a &lt;strong&gt;Notification Email&lt;/strong&gt; this email address (as well as the PKI Administrators) will get all the notifications for the lifecycle of the CA.&lt;/li&gt;&#xA;&lt;li&gt;Select the lifecycle action you want EZCA to take when expiry of the CA is approaching (for now we recommend manually rotating the Certificate Authorities since Entra CBA does not support automatic CA rotation).&lt;/li&gt;&#xA;&lt;li&gt;Select the percentage of lifetime of the certificate when you want EZCA to start taking Lifecycle actions.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/CREATECA4b.png&#34; alt=&#34;EZCA Cloud PKI Create CA step 4 showing validity period, notification email, and lifecycle action settings&#34;&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h3 id=&#34;ca-certificate-revocation-list&#34;&gt;CA Certificate Revocation List&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#ca-certificate-revocation-list&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Select if you want this CA should issue a CRL &lt;strong&gt;(Highly recommended)&lt;/strong&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click Next.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/CREATECA6.png&#34; alt=&#34;EZCA Cloud PKI Create CA validity and CRL settings with Next button highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h3 id=&#34;ca-certificate-revocation-list-advance-settings&#34;&gt;CA Certificate Revocation List Advance Settings&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#ca-certificate-revocation-list-advance-settings&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;div class=&#34;alert alert-warning&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Warning&lt;/div&gt;&#xA;&lt;p&gt;Changes to this section are only recommended for PKI experts with specific requirements.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Manage Passkey and Smart Card Settings for Entra ID</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-manage-fido2-and-smartcard-settings-in-entra-id/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-manage-fido2-and-smartcard-settings-in-entra-id/</guid>
      <description>&lt;p&gt;The EZCMS setting page is your home to manage all things related to your subscription. From types of smart cards/FIDO2 Tokens you offer, to security settings such as pin complexity and card assignment requirements to RBAC for token administrators.&lt;/p&gt;&#xA;&lt;h2 id=&#34;how-to-set-instance-administrators&#34;&gt;How to Set Instance Administrators&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-set-instance-administrators&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Instance administrators are the equivalent of global administrators of the application, this permission will allow the user to manage any setting of EZCMS as well as give themselves permission to execute any action in the portal.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Register ACME Agent in EZCA</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/how-to-enable-acme-for-private-pki/how-to-connect-internal-acme-to-ezca/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/how-to-enable-acme-for-private-pki/how-to-connect-internal-acme-to-ezca/</guid>
      <description>&lt;p&gt;For EZCA to validate the local domain ownership, we have to install a local agent in your network. This web service will receive all ACME request and validate the domain ownership on behalf of EZCA. In this step we will register the ACME Agent in EZCA to issue certificates for your CA.&lt;/p&gt;&#xA;&lt;h2 id=&#34;registering-the-agent-in-ezca&#34;&gt;Registering the Agent in EZCA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#registering-the-agent-in-ezca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Navigate to the &lt;a href=&#34;https://portal.ezca.io/&#34;&gt;EZCA portal&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Navigate to Certificate Authorities.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/CAMenu.png&#34; alt=&#34;EZCA Cloud PKI Certificate Authorities dashboard with list of CAs and their statuses&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Register the EZCMS Entra ID Application</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/getting-started/registerapp/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/getting-started/registerapp/</guid>
      <description>&lt;h2 id=&#34;registering-the-application&#34;&gt;Registering the Application&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#registering-the-application&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZCMS uses two Entra ID Applications to authenticate you to our services. To register these applications in your tenant, login with a Global Administrator account &lt;a href=&#34;https://login.microsoftonline.com/common/oauth2/authorize?client_id=833a967e-8ae0-492b-b221-4e524cd6a142&amp;amp;prompt=admin_consent&amp;amp;response_type=code&amp;amp;redirect_uri=https%3A%2F%2Fwww.ezsmartcard.io%2FWelcome&#34;&gt;at this link&lt;/a&gt; and consent on behalf of your organization.&lt;/p&gt;&#xA;&lt;p&gt;Alternately, you can copy &amp;amp; paste the following URL into your browser:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-txt&#34; data-lang=&#34;txt&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;https://login.microsoftonline.com/common/oauth2/authorize?client_id=833a967e-8ae0-492b-b221-4e524cd6a142&amp;amp;prompt=admin_consent&amp;amp;response_type=code&amp;amp;redirect_uri=https%3A%2F%2Fwww.ezsmartcard.io%2FWelcome&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/consent.png&#34; alt=&#34;Microsoft Entra ID admin consent dialog for Keytos EZCMS app with Accept button highlighted&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Once this step is done, you are ready to &lt;a href=&#34;https://www.keytos.io/docs/passwordless-onboarding/getting-started/select_plan_in_azure/&#34;&gt;Create EZCMS Resource in Azure&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Register the EZRADIUS App in Your Azure Tenant</title>
      <link>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/</guid>
      <description>&lt;h2 id=&#34;how-to-register-the-keytos-applications-for-ezradius&#34;&gt;How to Register the Keytos Applications for EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-register-the-keytos-applications-for-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZRADIUS uses a set of Entra ID Applications to authenticate you to our services and manage your RADIUS infrastructure. To register these applications in your tenant, use your Global Administrator account and follow these steps:&lt;/p&gt;&#xA;&lt;h3 id=&#34;register-the-keytos-applications-in-your-entra-tenant&#34;&gt;Register the Keytos Applications in Your Entra Tenant&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#register-the-keytos-applications-in-your-entra-tenant&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;The Keytos and Keytos Client Entra ID applications are used by Keytos services including EZRADIUS to sign you in and manage your EZRADIUS, EZCA, and other Keytos services. This step must be done first before registering the EZRADIUS applications.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Register the Keytos EZMonitor Application</title>
      <link>https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/registering_app_in_tenant/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/registering_app_in_tenant/</guid>
      <description>&lt;h2 id=&#34;registering-the-application&#34;&gt;Registering the Application&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#registering-the-application&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZMonitor uses two Entra ID Applications to authenticate you to our services. To register these applications in your tenant, login with a Global Administrator account &lt;a href=&#34;https://login.microsoftonline.com/common/oauth2/authorize?client_id=eddb4ead-89dd-4da8-9196-09c7ea82d724&amp;amp;prompt=admin_consent&amp;amp;response_type=code&amp;amp;redirect_uri=https%3A%2F%2Fportal.ezmonitor.io%2FWelcome&#34;&gt;at this link&lt;/a&gt; and consent on behalf of your organization.&lt;/p&gt;&#xA;&lt;p&gt;Alternately, you can copy &amp;amp; paste the following URL into your browser:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-txt&#34; data-lang=&#34;txt&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;https://login.microsoftonline.com/common/oauth2/authorize?client_id=eddb4ead-89dd-4da8-9196-09c7ea82d724&amp;amp;prompt=admin_consent&amp;amp;response_type=code&amp;amp;redirect_uri=https%3A%2F%2Fportal.ezmonitor.io%2FWelcome&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/consent.png&#34; alt=&#34;Microsoft Entra ID admin consent dialog for Keytos EZMonitor app with Accept button highlighted&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Once this step is done, you are ready to start the sign up process. You can create your free trial through &lt;a href=&#34;https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/selecting-a-plan/select_plan_in_ezmonitor/&#34;&gt;EZMonitor&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Select an EZCA Plan in the EZCA Portal with a Free Trial</title>
      <link>https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/select_plan_in_ezca/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/select_plan_in_ezca/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;video-version&#34;&gt;Video Version&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#video-version&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/Iy7iYNxUvvo?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;sign-up-for-1-month-free-trial&#34;&gt;Sign up for 1 Month Free Trial&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#sign-up-for-1-month-free-trial&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;To register for your EZCA free trial, begin by navigating to the portal corresponding with your desired EZCA instance:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://portal.ezca.io/Signup&#34;&gt;EZCA Global&lt;/a&gt; - Global instance hosted in a variety of global datacenters.&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://eu.ezca.io/Signup/&#34;&gt;EZCA EU&lt;/a&gt; - European instance hosted only in datacenters within the European Union.&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://au.ezca.io/Signup/&#34;&gt;EZCA Australia&lt;/a&gt; - Australian instance hosted only in Australian datacenters.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &lt;strong&gt;Log in&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Select an EZMonitor Plan in the EZMonitor Portal</title>
      <link>https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/selecting-a-plan/select_plan_in_ezmonitor/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/selecting-a-plan/select_plan_in_ezmonitor/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;sign-up-for-1-month-free-trial&#34;&gt;Sign up for 1 Month Free trial&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#sign-up-for-1-month-free-trial&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;To register for your EZMonitor free trial, go to &lt;a href=&#34;https://portal.ezmonitor.io/Signup&#34;&gt;https://portal.ezmonitor.io/Signup&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click on &amp;ldquo;Log in&amp;rdquo;&lt;/li&gt;&#xA;&lt;li&gt;Enter your Azure AD credentials.&lt;/li&gt;&#xA;&lt;li&gt;You will be presented with this Screen:&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/SignUpScreen.PNG&#34; alt=&#34;EZMonitor SSL Monitoring free trial signup page showing subscription settings and plan selection options&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Enter the Name of the Subscription (this is for your reference only).&lt;/li&gt;&#xA;&lt;li&gt;Enter the AAD Users or Groups that are allowed to manage your billing settings.&lt;/li&gt;&#xA;&lt;li&gt;During the Free trial you can enter the plan you will want to purchase after the trial is over, or you can click skip for now and come back once you have tried our product.&lt;/li&gt;&#xA;&lt;li&gt;If you opted for selecting the plan, please also enter your credit card information and billing notification email below (you will not be charged until the trial is over).&lt;/li&gt;&#xA;&lt;li&gt;Click Register!&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/SignUpScreen1.png&#34; alt=&#34;EZMonitor SSL Monitoring payment information page showing plan tiers with Register button highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;After registering, you are ready to &lt;a href=&#34;https://www.keytos.io/docs/ssl-monitoring/getting-started/connecting_siem/&#34;&gt;Connect EZMonitor to SIEM&lt;/a&gt; or to &lt;a href=&#34;https://www.keytos.io/docs/ssl-monitoring/monitor-domains/&#34;&gt;Start monitoring your domains&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>How-To: Select an EZSSH Plan in the EZSSH Portal</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/select_plan_in_ezssh/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/select_plan_in_ezssh/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;video-version&#34;&gt;Video Version&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#video-version&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/Tbk1qfbP78Q?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;sign-up-for-1-month-free-trial&#34;&gt;Sign up for 1 Month Free trial&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#sign-up-for-1-month-free-trial&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;To register for your EZSSH free trial, go to &lt;a href=&#34;https://portal.ezssh.io/Signup&#34;&gt;https://portal.ezssh.io/Signup&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click on &amp;ldquo;Log in&amp;rdquo;&lt;/li&gt;&#xA;&lt;li&gt;Enter your Azure AD credentials.&lt;/li&gt;&#xA;&lt;li&gt;You will be presented with this Screen:&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/SignUpScreen.PNG&#34; alt=&#34;EZSSH Agentless JIT Access portal sign up page showing subscription settings, GitHub access certificates, and support plan options&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Enter the Name of the Subscription (this is for your reference only)&lt;/li&gt;&#xA;&lt;li&gt;Select if you want to have dual key approval for any policy changes (Admin operations)&lt;/li&gt;&#xA;&lt;li&gt;By Default, GitHub Certificate are enabled, this help you secure your GitHub instance with SSH Certificates &lt;a href=&#34;https://www.keytos.io/blog/2021/03/24/secure-gh&#34;&gt;Read More&lt;/a&gt; if you will not use this feature, you can uncheck the box.&lt;/li&gt;&#xA;&lt;li&gt;If you are using GitHub Certificates enter the length in hours that you want your developers certificates to last (This is how ofter the engineer has to get a new certificate). &lt;em&gt;Note: In Keytos we have it set to 8 hours so our engineers only request access once a day&lt;/em&gt;&lt;/li&gt;&#xA;&lt;li&gt;In Advance Setting you can set the location of where we keep your certificates. (By Default it is East US)&lt;/li&gt;&#xA;&lt;li&gt;During the Free trial you can enter the plan you will want to purchase after the trial is over, or you can click skip for now and come back once you have tried our product.&lt;/li&gt;&#xA;&lt;li&gt;If you opted for selecting the plan, please also enter your credit card information and billing notification email below.&lt;/li&gt;&#xA;&lt;li&gt;Click Register!&lt;/li&gt;&#xA;&lt;li&gt;Once you are registered, you are ready to connect to your &lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/connecting_to_azure_resources/&#34;&gt;Azure Subscriptions&lt;/a&gt; and &lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/how-to-enable-ssh-certificates-in-github/&#34;&gt;GitHub&lt;/a&gt; Instances.&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>How-To: Setup IIS</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-enable-phishing-resistant-authentication-in-entra-id-domain/connectadcs/settingupiis/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-enable-phishing-resistant-authentication-in-entra-id-domain/connectadcs/settingupiis/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;For EZCA to connect to your ADCS CAs it is required for a domain joined machine to run the EZCA certificate agent web service. This web service receives authenticated requests from EZCA and then requests the certificate on behalf of EZCA. The first step is setting up IIS in a Windows machine.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/EZIDAgent.jpg&#34; alt=&#34;EZSmartCard ADCS Connection diagram showing certificate request flow from user through agent to Certificate Authority&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;setting-up-the-server&#34;&gt;Setting up the Server&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#setting-up-the-server&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;install-iis-windows-feature&#34;&gt;Install IIS Windows feature&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#install-iis-windows-feature&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;In a domain joined PC open an Administrator PowerShell window and run the following command:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Distribute EAP-TLS WiFi Profiles to non managed Apple iOS devices with EZRADIUS</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/how-to-install-eap-tls-wifi-profile-apple/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/how-to-install-eap-tls-wifi-profile-apple/</guid>
      <description>&lt;h2 id=&#34;how-to-distribute-wifi-profiles-to-non-managed-ios-devices-with-ezradius&#34;&gt;How to Distribute WiFi Profiles to non managed iOS devices with EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-distribute-wifi-profiles-to-non-managed-ios-devices-with-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If your organization has &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/&#34;&gt;enabled self-service wifi profiles&lt;/a&gt; you can create your own Wi-Fi profile for your Apple devices. There are three ways to obtain them: EZRADIUS sent you an email with the profile, you downloaded the profile from the EZRADIUS portal, or request an email with your profile from the EZRADIUS portal.&lt;/p&gt;&#xA;&lt;h2 id=&#34;how-to-install-wi-fi-profile-on-macos---video-tutorial&#34;&gt;How to Install Wi-Fi Profile on MacOS - Video Tutorial&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-install-wi-fi-profile-on-macos---video-tutorial&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div class=&#34;video-medium&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/invDopzv8s8?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h3 id=&#34;option-1-email-received-from-ezradius&#34;&gt;Option 1: Email Received from EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#option-1-email-received-from-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;If you received an email from EZRADIUS with your profile, follow these steps to install the profile on your Apple device:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Learn About the Difference Between Private and Public CAs</title>
      <link>https://www.keytos.io/docs/azure-pki/concepts/what-is-the-difference-between-private-and-public-ca/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/concepts/what-is-the-difference-between-private-and-public-ca/</guid>
      <description>&lt;h2 id=&#34;what-is-the-difference-publicly-trusted-cas-vs-private-cas&#34;&gt;What is The Difference Publicly Trusted CAs vs Private CAs&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-is-the-difference-publicly-trusted-cas-vs-private-cas&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;As mentioned in the CA Overview, PKI is based on trust. Clients must trust the Root Certificate Authority to build a chain of trust and accept a certificate. The key difference between a publicly trusted and private certificate authority is that all computers and browsers trust publicly trusted Certificate Authorities while private CAs will have to be explicitly added by the IT administrator. Both private and public certificates have their valid use cases. In the following sections we will help you choose which certificate type you should use by showing some sample use cases for each type of certificate.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Learn How to Get Started with Certificate Authorities</title>
      <link>https://www.keytos.io/docs/azure-pki/concepts/how-to-design-a-pki/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/concepts/how-to-design-a-pki/</guid>
      <description>&lt;h2 id=&#34;what-are-certificate-authorities&#34;&gt;What Are Certificate Authorities&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-are-certificate-authorities&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;In cryptography a certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a trusted third party—trusted both by the subject (owner) of the certificate and by the party relying upon the certificate.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Learn the Differences Between Root CA and Issuing CAs</title>
      <link>https://www.keytos.io/docs/azure-pki/concepts/difference-between-root-and-issuing-ca/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/concepts/difference-between-root-and-issuing-ca/</guid>
      <description>&lt;h2 id=&#34;what-are-the-differences-between-a-root-ca-and-issuing-ca&#34;&gt;What are the Differences Between a Root CA and Issuing CA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-are-the-differences-between-a-root-ca-and-issuing-ca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;As mentioned in the &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/concepts/how-to-design-a-pki/#two-tier-hierarchy-the-recommended-way&#34;&gt;two tier hierarchy explanation&lt;/a&gt;, the two tier hierarchy has two CA types: Root CA and Issuing/Subordinate CA.&lt;/p&gt;&#xA;&lt;h2 id=&#34;root-ca&#34;&gt;Root CA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#root-ca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;As the name implies, the Root CA is the root of trust for your PKI. To trust a certificate chain, the root certificate has to be added to the trusted root store of the operating system. &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-root-ca-in-azure/how-to-trust-a-root-ca-in-windows-and-mac/&#34;&gt;How To Trust a New Root CA&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Download EZSSH</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/how_to_download/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/how_to_download/</guid>
      <description>&lt;h2 id=&#34;tenant-prerequisites&#34;&gt;Tenant Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#tenant-prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The following prerequisites have to be done only once per tenant.&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/&#34;&gt;Selecting a Plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;windows&#34;&gt;Windows&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#windows&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;command-line-tool&#34;&gt;Command line tool&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#command-line-tool&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;ezssh is also available as a standalone Windows installer. &lt;a href=&#34;https://download.keytos.io/Downloads/Windows/Latest/ezsshInstaller.msi&#34;&gt;Download&lt;/a&gt; the installer and click through the installation process. Once ezssh is installed, open a new terminal and you should be ready to &lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/how_to_download/#start-using-ezssh&#34;&gt;start using ezssh&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;h3 id=&#34;ezssh-ui&#34;&gt;EZSSH UI&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#ezssh-ui&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;EZSSH UI is currently in beta and the installer can be downloaded from &lt;a href=&#34;https://download.keytos.io/Downloads/Windows/ezsshUI.msix&#34;&gt;here&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Register the Keytos Entra ID App in Your Tenant</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Before you begin, ensure that you are logged into Entra ID as a Global Administrator user or you have elevated to Global Administrator via Entra Privileged Identity Management (PIM).&lt;/p&gt;&#xA;&lt;h2 id=&#34;register-keytos-entra-applications&#34;&gt;Register Keytos Entra Applications&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#register-keytos-entra-applications&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&lt;a class=&#34;btn  btn-primary&#34; href=&#34;https://login.microsoftonline.com/common/oauth2/authorize?client_id=eddb4ead-89dd-4da8-9196-09c7ea82d724&amp;amp;prompt=admin_consent&amp;amp;response_type=code&amp;amp;redirect_uri=https%3A%2F%2Fportal.ezssh.io%2FWelcome&#34; role=&#34;button&#34;target=&#34;_blank&#34;&gt;Register Application&lt;/a&gt;&lt;br /&gt;&#xA;&lt;br /&gt;&#xA;&lt;p&gt;Alternately, you can copy &amp;amp; paste the following URL into your browser:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-txt&#34; data-lang=&#34;txt&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;https://login.microsoftonline.com/common/oauth2/authorize?client_id=eddb4ead-89dd-4da8-9196-09c7ea82d724&amp;amp;prompt=admin_consent&amp;amp;response_type=code&amp;amp;redirect_uri=https%3A%2F%2Fportal.ezssh.io%2FWelcome&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/consent.png&#34; alt=&#34;Consent Page&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;next-steps&#34;&gt;Next Steps&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#next-steps&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Once the applications are registered, you are ready to start the sign up process. You can create your free trial through &lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/select_plan_in_ezssh/&#34;&gt;EZSSH&lt;/a&gt; or &lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/select_plan_in_azure/&#34;&gt;Azure Marketplace&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Self-Enroll YubiKeys and FIDO2 Keys for Entra CBA Using Verifiable Credentials</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/creating-identity/how-to-onboard-phishing-resistant-fido2-and-entra-cba-with-verifiable-credentials/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/creating-identity/how-to-onboard-phishing-resistant-fido2-and-entra-cba-with-verifiable-credentials/</guid>
      <description>&lt;h2 id=&#34;introduction---how-to-self-enroll-smartcards-and-fido2-keys-for-entra-cba-using-government-id-ezcms&#34;&gt;Introduction - How to Self-Enroll Smartcards and FIDO2 Keys for Entra CBA Using Government ID EZCMS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-self-enroll-smartcards-and-fido2-keys-for-entra-cba-using-government-id-ezcms&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If you are creating your phishing resistant identity for the first time or you are locked out of your Entra ID (Microsoft 365) credential, depending on the settings of your organization you might be able to onboard your FIDO2 or Entra CBA token using a government ID. This requires you to have your hardware key or smartcard, if you do not have one &lt;a href=&#34;https://www.keytos.io/docs/passwordless-onboarding/request-smart-card/&#34;&gt;request one&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Learn About EZSSH Policies</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/creating-your-first-policy/difference_between_policy_types/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/creating-your-first-policy/difference_between_policy_types/</guid>
      <description>&lt;h2 id=&#34;what-are-ezssh-policies&#34;&gt;What Are EZSSH Policies?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-are-ezssh-policies&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZSSH makes it easy to manage access to your SSH endpoints by using your corporate identity to seamlessly create SSH Certificates and connect you to the desired endpoint without any changes to the endpoint or input from the user. However, to create this great experience, EZSSH needs to know who in your organization has access to those endpoints. We do this by creating Access Policies. These policies allow you to say who has auto approved access, who needs someone else to approve the access, and who is authorized to approve requests.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How To Create Cloud Radius Free Trial with EZRADIUS</title>
      <link>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/select-radius-plan-in-ezradius/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/select-radius-plan-in-ezradius/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra applications are registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;how-to-create-cloud-radius-free-trial&#34;&gt;How to Create Cloud RADIUS Free Trial&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-cloud-radius-free-trial&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Go to &lt;a href=&#34;https://portal.ezradius.io/Signup&#34;&gt;https://portal.ezradius.io/Signup&lt;/a&gt;&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/ezradius-signup.png&#34; alt=&#34;EZRADIUS Cloud RADIUS signup page showing New Subscription form with subscription name and deployment location fields&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Enter the Subscription Name (&lt;em&gt;This is a friendly name for your subscription for your reference&lt;/em&gt;).&lt;/li&gt;&#xA;&lt;li&gt;Select the location you want to deploy your RADIUS service.&lt;/li&gt;&#xA;&lt;li&gt;Select your plan and optionally enter your credit card information. Click &amp;ldquo;Skip for now&amp;rdquo; to start your free trial without entering payment information. (&lt;em&gt;If you do enter a credit card, you will not be charged for the first month&lt;/em&gt;)&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/select-cloud-radius-plan-in-ezradius.png&#34; alt=&#34;EZRADIUS Cloud RADIUS plan selection showing Basic RADIUS plan with pricing tiers and Skip for now button&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Scroll to the top of the page and click on the &amp;ldquo;Register&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/create-cloud-radius-for-azure.png&#34; alt=&#34;EZRADIUS Cloud RADIUS New Subscription form with Register button highlighted in the top right corner&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Once your instance is ready, the instance URL will be displayed, it is recommended you bookmark this instance so you can enter it directly.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/create-cloud-radius-in-ezradius.png&#34; alt=&#34;EZRADIUS Cloud RADIUS portal showing Existing Subscriptions page with the new cloud RADIUS instance URL ready&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Now you can &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/create-cloud-radius-network-policies/&#34;&gt;create your fist policy&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>How-To: Add EZSSH Access to Endpoints With Bash Script</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/adding-ezssh-access-to-endpoints/manually_adding_with_script/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/adding-ezssh-access-to-endpoints/manually_adding_with_script/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/creating-your-first-policy/&#34;&gt;Have at least one policy with endpoints&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZSSH uses SSH Certificates to authenticate to endpoints. Since this is a OpenSSH supported protocol, no custom code has to run on your endpoints for authentication to work. By &lt;a href=&#34;https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/deployment_guide/sec-distributing_and_trusting_ssh_ca_public_keys&#34;&gt;adding your EZSSH Certificate to your TrustedUserCAKeys&lt;/a&gt; your endpoint will start working with EZSSH.&lt;/p&gt;&#xA;&lt;p&gt;In this page we will go through how to do this with running a bash script on an existing endpoint. You might also be interested in:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create ADCS CA Templates For EZCA Integration</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/create-adcs-ca-templates/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/create-adcs-ca-templates/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;In this page we will walk you through how to set up your ADCS CA to have an enrollment agent certificate and use that enrollment certificate to issue certificates.&lt;/p&gt;&#xA;&lt;h2 id=&#34;creating-enrollment-certificate&#34;&gt;Creating Enrollment Certificate&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#creating-enrollment-certificate&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Open The Certificate Authority management console.&lt;/li&gt;&#xA;&lt;li&gt;Right click the Certificate Templates Folder.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/adcsTemplate1.png&#34; alt=&#34;ADCS Certificate Authority console with Certificate Templates folder highlighted in left panel&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click Manage.&lt;/li&gt;&#xA;&lt;li&gt;Right click the Enrollment Agent Template&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/adcsTemplate2.png&#34; alt=&#34;ADCS Certificate Templates console showing Enrollment Agent template highlighted in the list&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select the Duplicate option.&lt;/li&gt;&#xA;&lt;li&gt;Switch to the General tab.&lt;/li&gt;&#xA;&lt;li&gt;Change the Name to EZCA Enrollment Agent.&lt;/li&gt;&#xA;&lt;li&gt;Change validity period to 2 months.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/adcsTemplate3.png&#34; alt=&#34;ADCS Certificate Template Properties General tab showing EZCA Enrollment Agent name and 2 month validity period&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Navigate to the Security tab.&lt;/li&gt;&#xA;&lt;li&gt;Click Add.&lt;/li&gt;&#xA;&lt;li&gt;Click Object Types.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/adcsTemplate4.png&#34; alt=&#34;ADCS Select Users dialog with Object Types button highlighted to add service accounts&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Add Service Accounts.&lt;/li&gt;&#xA;&lt;li&gt;Click OK.&lt;/li&gt;&#xA;&lt;li&gt;Enter the name of your gMSA. &lt;strong&gt;Note: if you have not created your gMSA go to the &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/how-to-connect-adcs-to-ezca/#creating-the-gmsa&#34;&gt;create gMSA&lt;/a&gt; section of these docs&lt;/strong&gt;&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/adcsTemplate5.png&#34; alt=&#34;ADCS Select Users dialog with gMSA account name entered in the object name field&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click OK.&lt;/li&gt;&#xA;&lt;li&gt;Back in the security tab, make sure the gMSA has read and enroll rights to this template.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/adcsTemplate6.png&#34; alt=&#34;ADCS Certificate Template Properties Security tab showing gMSA with Read and Enroll permissions granted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Navigate to the Subject Name tab.&lt;/li&gt;&#xA;&lt;li&gt;Select the &amp;ldquo;Supply in the request&amp;rdquo; option.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/adcsTemplate7.png&#34; alt=&#34;ADCS Certificate Template Properties Subject Name tab with Supply in the request option selected&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Save the changes and exit the dialog by Clicking the OK button.&lt;/li&gt;&#xA;&lt;li&gt;Back in the Certificate Authority management console, click on Certificate Templates.&lt;/li&gt;&#xA;&lt;li&gt;Once in the Certificate Templates page, right click any whitespace and select New &amp;gt; Certificate Template to Issue.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/adcsTemplate8.png&#34; alt=&#34;ADCS Certificate Authority console showing context menu with New and Certificate Template to Issue options&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select the EZCA Enrollment Template that we just created.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/adcsTemplate9.png&#34; alt=&#34;ADCS Enable Certificate Templates dialog with EZCA Enrollment Agent template highlighted and selected&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Your CA can now issue this certificate to the EZCA gMSA. Repeat the last 3 steps on each CA that you want to enable this template.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;create-ezca-test-certificate-template&#34;&gt;Create EZCA Test Certificate Template&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#create-ezca-test-certificate-template&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;To ensure high uptime, EZCA will create test certificates in each of the registered CAs every few minutes. To enable this, we will create a short lived template for EZCA to Issue.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create CA Templates For Entra CBA Smart Cards</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-enable-phishing-resistant-authentication-in-entra-id-domain/connectadcs/createcerttemplates/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-enable-phishing-resistant-authentication-in-entra-id-domain/connectadcs/createcerttemplates/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;In this page we will walk you through how to set up your ADCS CA to have an enrollment agent certificate and use that enrollment certificate to issue certificates.&lt;/p&gt;&#xA;&lt;h2 id=&#34;creating-enrollment-certificate&#34;&gt;Creating Enrollment Certificate&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#creating-enrollment-certificate&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZCMS will use a certificate issued by your CA to sign the requests and authenticate that the request was issued by our EZCMS agent. In the following steps I will walk you through how to create the template for this certificate.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create Cloud RADIUS Network Policies that Uses Entra ID Passwords</title>
      <link>https://www.keytos.io/docs/cloud-radius/create-cloud-radius-network-policies/how-to-create-radius-policy-with-entra-id-passwords/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/create-cloud-radius-network-policies/how-to-create-radius-policy-with-entra-id-passwords/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra applications are registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/&#34;&gt;You have an active EZRADIUS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/managing-subscription/&#34;&gt;You are a Subscription Owner or Network Administrator on your EZRADIUS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&#xA;&#xA;&#xA;&lt;h2 id=&#34;how-to-create-cloud-radius-for-entra-id-password-authentication---video-tutorial&#34;&gt;How to Create Cloud RADIUS For Entra ID Password Authentication - Video Tutorial&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-cloud-radius-for-entra-id-password-authentication---video-tutorial&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div class=&#34;video-medium&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/bF-cB3TWnMo?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;introduction-to-managing-cloud-radius-network-policies-in-ezradius&#34;&gt;Introduction to Managing Cloud RADIUS Network Policies in EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction-to-managing-cloud-radius-network-policies-in-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The Policies page in EZRADIUS allows you to create and manage your Cloud RADIUS network policies. Each policy defines the conditions under which a user or device can connect to your network, including authentication methods, accepted certificate authorities, and access policies.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create Your First Hybrid Policy</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/creating-your-first-policy/first_hybrid_policy/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/creating-your-first-policy/first_hybrid_policy/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/&#34;&gt;Selecting a Plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZSSH Hybrid policies are the best option to manage access to your cross-cloud and on-premise Linux endpoints. This policy allows you to manage access to your resources without the need of a highly privilege agent.&lt;/p&gt;&#xA;&lt;h2 id=&#34;video-version&#34;&gt;Video Version&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#video-version&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/06l9kZkEVHQ?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;getting-started&#34;&gt;Getting Started&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#getting-started&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Go to  &lt;a href=&#34;https://portal.ezssh.io/&#34;&gt;https://portal.ezssh.io/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Navigate to Hybrid Policies&lt;/li&gt;&#xA;&lt;li&gt;Click on the &amp;ldquo;Create New Policy&amp;rdquo;&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/HybPolicy1.png&#34; alt=&#34;EZSSH Agentless JIT Access Hybrid Policies page with Create New Policy button highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Enter &lt;strong&gt;Policy Name&lt;/strong&gt;: This name is just to make it easier for users to know what this policy gives them access to.&lt;/li&gt;&#xA;&lt;li&gt;Enter &lt;strong&gt;Notification Email&lt;/strong&gt;: Usually a team DL that would get notifications for changes to the policy.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/HybPolicy2.png&#34; alt=&#34;EZSSH Agentless JIT Access new hybrid policy form with Policy Name and Notification Email fields filled in&#34;&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;adding-policy-owners&#34;&gt;Adding Policy Owners&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#adding-policy-owners&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;overview-1&#34;&gt;Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview-1&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;Policy owners are the people that can make changes to EZSSH policies.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Issue SCEP Certificates to macOS Devices with Intune</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/create-macos-intune-scep-profiles/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/create-macos-intune-scep-profiles/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---how-to-issue-scep-certificates-to-macos-devices-with-intune&#34;&gt;Introduction - How to Issue SCEP Certificates to macOS Devices with Intune&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-issue-scep-certificates-to-macos-devices-with-intune&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;This guide shows how to issue X509 certificates to macOS devices with Microsoft Intune and SCEP. You will create:&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;A &lt;strong&gt;Trusted Certificate&lt;/strong&gt; profile to establish trust with your CA chain.&lt;/li&gt;&#xA;&lt;li&gt;A &lt;strong&gt;SCEP Certificate&lt;/strong&gt; profile to request and install certificates for users or devices.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;By the end, your macOS devices will be able to enroll and receive certificates from your EZCA SCEP CA.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Select an EZCA Plan in Azure Portal</title>
      <link>https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/how-to-create-a-ca-in-azure/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/how-to-create-a-ca-in-azure/</guid>
      <description>&lt;div class=&#34;alert alert-warning&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Azure Billing + Free Trials&lt;/div&gt;&#xA;&lt;p&gt;Creating an EZCA plan through the Azure Marketplace will bill you through your Azure subscription and count towards your Azure consumption commitments. If you prefer to be billed directly through Keytos, please follow the steps in the &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/select_plan_in_ezca/&#34;&gt;EZCA Portal&lt;/a&gt; instead.&lt;/p&gt;&#xA;&lt;p&gt;A free trial is not available when signing up through the Azure Marketplace.&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;Ensure the EZCA application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;how-to-create-ezca-as-an-azure-resource&#34;&gt;How To Create EZCA as an Azure Resource&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-ezca-as-an-azure-resource&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to &lt;a href=&#34;https://portal.azure.com/&#34;&gt;https://portal.azure.com/&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Select an EZMonitor Plan in the Azure Portal</title>
      <link>https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/selecting-a-plan/select_plan_in_azure/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/selecting-a-plan/select_plan_in_azure/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;creating-the-azure-resource&#34;&gt;Creating the Azure Resource&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#creating-the-azure-resource&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Go to &lt;a href=&#34;https://portal.azure.com/&#34;&gt;https://portal.azure.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click on &amp;ldquo;Create a resource&amp;rdquo;.&lt;/li&gt;&#xA;&lt;li&gt;Type &amp;ldquo;EZMonitor&amp;rdquo; in the search bar.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/AzPortal1.png&#34; alt=&#34;Azure Marketplace Create a resource page with EZMonitor typed in the search bar&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Press enter.&lt;/li&gt;&#xA;&lt;li&gt;Select the EZMonitor offering&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/AzPortal2.png&#34; alt=&#34;Azure Marketplace search results showing EZMonitor by Keytos highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select the plan.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/AzPortal3.png&#34; alt=&#34;Azure Marketplace EZMonitor offering page showing plan selection and Subscribe button&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Subscribe&amp;rdquo; button&lt;/li&gt;&#xA;&lt;li&gt;Enter your subscription and resource group information.&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Review + Subscribe&amp;rdquo; button&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Subscribe&amp;rdquo; button&lt;/li&gt;&#xA;&lt;li&gt;Once the subscription is complete, click the &amp;ldquo;Configure account now&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/AzPortal5.png&#34; alt=&#34;Azure subscription progress page showing Configure account now button highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;This will redirect you to our portal (&lt;a href=&#34;https://portal.ezmonitor.io/%29&#34;&gt;https://portal.ezmonitor.io/)&lt;/a&gt;. Sign in with your same Microsoft account.&lt;/li&gt;&#xA;&lt;li&gt;Enter the AAD Users or Groups that represent your subscription administrators&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/EZMonAzSub.png&#34; alt=&#34;EZMonitor SSL Monitoring Welcome page showing Subscription Administrators list with users added&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Once you have added the subscription administrators, click the &amp;ldquo;Purchase Plan&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/AzPortal6.png&#34; alt=&#34;EZMonitor SSL Monitoring Welcome page showing Purchase Plan button highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Once you have registered in EZMonitor, the status in your Azure resource will change to subscribed.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/AzPortal7.png&#34; alt=&#34;Azure EZMonitor resource showing subscribed status in product and plan details&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Now you are ready to &lt;a href=&#34;https://www.keytos.io/docs/ssl-monitoring/monitor-domains/&#34;&gt;monitor your domains&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>How-To: Setup EZCA ACME Agent</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/how-to-enable-acme-for-private-pki/setup-internal-acme-server/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/how-to-enable-acme-for-private-pki/setup-internal-acme-server/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/how-to-enable-acme-for-private-pki/how-to-connect-internal-acme-to-ezca/&#34;&gt;Register Agent in EZCA&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;introduction---setup-internal-acme-agent-to-issue-certificates-to-your-local-network&#34;&gt;Introduction - Setup Internal ACME Agent To Issue Certificates To Your Local Network&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---setup-internal-acme-agent-to-issue-certificates-to-your-local-network&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;For EZCA to validate the local domain ownership, we have to install a local agent in your network. This web service will receive all ACME request and validate the domain ownership on behalf of EZCA. In this step we will set up the agent.&lt;/p&gt;&#xA;&lt;h2 id=&#34;how-to-setup-the-server&#34;&gt;How To Setup The Server&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-setup-the-server&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;install-iis-windows-feature&#34;&gt;Install IIS Windows feature&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#install-iis-windows-feature&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;In a Windows Server open an Administrator PowerShell window and run the following command:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Setup Remote FIDO2 and CBA Onboarding in Azure</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/getting-started/select_plan_in_azure/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/getting-started/select_plan_in_azure/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/passwordless-onboarding/getting-started/registerapp/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;how-to-enable-fido2-and-entra-cba-onboarding-in-azure-video-version&#34;&gt;How to Enable FIDO2 and Entra CBA Onboarding in Azure Video Version&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-fido2-and-entra-cba-onboarding-in-azure-video-version&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/UtDBtx2iaTE?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;creating-the-azure-resource&#34;&gt;Creating the Azure Resource&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#creating-the-azure-resource&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Go to &lt;a href=&#34;https://portal.azure.com/&#34;&gt;https://portal.azure.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click on &amp;ldquo;Create a resource&amp;rdquo;.&lt;/li&gt;&#xA;&lt;li&gt;Type &amp;ldquo;EZCMS&amp;rdquo; in the search bar.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/AzPortal1.png&#34; alt=&#34;Find EZCMS in the Azure Portal for seamless onboarding to FIDO2 and Entra CBA phishing resistant credentials&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Press enter.&lt;/li&gt;&#xA;&lt;li&gt;Select the EZCMS offering&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/AzPortal2.png&#34; alt=&#34;Start passwordless onboarding in Azure Portal&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select the plan.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/AzPortal3.png&#34; alt=&#34;Select EZCMS plain in the Azure Portal&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Subscribe&amp;rdquo; button&lt;/li&gt;&#xA;&lt;li&gt;Enter your subscription and resource group information.&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Review + Subscribe&amp;rdquo; button&lt;/li&gt;&#xA;&lt;li&gt;Enter your email and phone number&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/AzPortal4.png&#34; alt=&#34;Azure Passwordless onboarding with EZCMS&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Subscribe&amp;rdquo; button&lt;/li&gt;&#xA;&lt;li&gt;Once the subscription is complete, click the &amp;ldquo;Configure account now&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/AzPortal5.png&#34; alt=&#34;Configure EZCMS Account&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;This will redirect you to our portal (&lt;a href=&#34;https://www.ezsmartcard.io/%29&#34;&gt;https://www.ezsmartcard.io/)&lt;/a&gt;. Sign in with your same Microsoft account.&lt;/li&gt;&#xA;&lt;li&gt;Enter the Sub-domain you want to use for your EZCMS Instance&lt;/li&gt;&#xA;&lt;li&gt;Select the Azure Region where you want your resources to be created.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/EZSCDeployer.png&#34; alt=&#34;EZCMS Passwordless Onboarding Azure Resource Creation&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Once the subscription details are correct, click the &amp;ldquo;Create Instance&amp;rdquo; button. This will create your private EZSmartCard instance.&lt;/li&gt;&#xA;&lt;li&gt;After 10-20 minutes, your private Azure resources will be created and you can &lt;a href=&#34;https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-manage-fido2-and-smartcard-settings-in-entra-id/&#34;&gt;set up your smart card settings&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>How-To: Troubleshoot Cloud RADIUS Entra ID Authentication</title>
      <link>https://www.keytos.io/docs/cloud-radius/how-to-troubleshoot-radius/how-to-troubleshoot-entra-id-radius-authentication/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/how-to-troubleshoot-radius/how-to-troubleshoot-entra-id-radius-authentication/</guid>
      <description>&lt;h2 id=&#34;how-to-troubleshoot-entra-id-wifi-authentication-in-ezradius&#34;&gt;How To Troubleshoot Entra ID Wifi Authentication in EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-troubleshoot-entra-id-wifi-authentication-in-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If you have setup your Cloud RADIUS instance and are having trouble authenticating users with Entra ID, this guide will help you troubleshoot your Cloud RADIUS configuration for Entra ID Wifi Authentication in EZRADIUS.&lt;/p&gt;&#xA;&lt;div class=&#34;video-medium&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/OYjy7Kx3HG0?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h3 id=&#34;how-to-troubleshoot-entra-id-radius-username-not-found&#34;&gt;How to Troubleshoot Entra ID RADIUS Username not found&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-troubleshoot-entra-id-radius-username-not-found&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;The most common issue with Entra ID authentication is that the username is not found. This is usually caused due to your device defaulting to MSCHAPv2 authentication which is not supported by Entra ID, therefore EZRADIUS assumes that the username is for a local user. To solve this issue, you need to configure your client device to use EAP-TTLS PAP authentication. For testing, you can &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/in-device/&#34;&gt;do it manually in the device&lt;/a&gt;, however this does not scale well. To solve this issue at scale, you can use &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/&#34;&gt;your MDM to push the wifi profile&lt;/a&gt; (once the profile is installed then the user will login as usual with username and password) or the &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/&#34;&gt;EZRADIUS Profile creator that allows you to create wifi profiles and send them to your users&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Trust a Root Certificate in Windows and macOS</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-root-ca-in-azure/how-to-trust-a-root-ca-in-windows-and-mac/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-root-ca-in-azure/how-to-trust-a-root-ca-in-windows-and-mac/</guid>
      <description>&lt;h2 id=&#34;overview---how-to-install-a-root-ca-in-windows&#34;&gt;Overview - How To Install a Root CA in Windows&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---how-to-install-a-root-ca-in-windows&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;As mentioned in the &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/concepts/how-to-design-a-pki/&#34;&gt;CA Overview&lt;/a&gt; for a CA to be trusted by an organization it has to be added to the trusted root store of all their devices. This guide will guide you on how to install it in Windows Certificate Root Store.&lt;/p&gt;&#xA;&lt;h2 id=&#34;getting-the-root-ca-certificate-from-ezca&#34;&gt;Getting the Root CA Certificate from EZCA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#getting-the-root-ca-certificate-from-ezca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Go to &lt;a href=&#34;https://portal.ezca.io/&#34;&gt;https://portal.ezca.io/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Navigate to Certificate Authorities.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/CAMenu.png&#34; alt=&#34;EZCA Cloud PKI Certificate Authorities dashboard showing active CAs with pie charts for status and key type&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;View Details&amp;rdquo; button for the CA you want to download the certificate from.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/CAMenu2.png&#34; alt=&#34;EZCA Cloud PKI My CAs list showing multiple certificate authorities with View Details button highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Download Certificate&amp;rdquo; button for the location that you want to download the certificate from.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/DownloadRootCert.png&#34; alt=&#34;EZCA Cloud PKI internalRootCA Details page showing CA Locations section with Download Certificate button highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h3 id=&#34;installing-certificate-through-intune&#34;&gt;Installing Certificate Through Intune&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#installing-certificate-through-intune&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;Usually MDM solutions is the preferred way IT Admins install internal Root CAs as a trusted authority in all of the corporate devices. To do this in Microsoft Intune, follow &lt;a href=&#34;https://docs.microsoft.com/en-us/mem/intune/protect/certificates-trusted-root&#34;&gt;this guide&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Use EZSSH Interactive Mode</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/interactive_mode/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/interactive_mode/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/how_to_download/&#34;&gt;Download EZSSH&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/creating-your-first-policy/&#34;&gt;Have at least one policy with endpoints&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;tenant-prerequisites&#34;&gt;Tenant Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#tenant-prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The following prerequisites have to be done only once per tenant.&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/&#34;&gt;Selecting a Plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;starting-interactive-mode&#34;&gt;Starting Interactive Mode&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#starting-interactive-mode&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The easiest way to explore your resources and connect to them is using EZSSH Interactive mode.&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;First run the following command in your favorite terminal:&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ezssh i&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;ol&gt;&#xA;&lt;li&gt;This command will start ezssh in interactive mode.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/EZSSHI.PNG&#34; alt=&#34;EZSSH Agentless JIT Access interactive mode terminal showing numbered menu options for managing SSH policies and endpoints&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;This will show you 5 different options, let&amp;rsquo;s explore each one.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h3 id=&#34;list-my-policies&#34;&gt;List My Policies&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#list-my-policies&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Press 0 to List the policies you own or have access to.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/EZSSHI3.PNG&#34; alt=&#34;EZSSH Agentless JIT Access interactive mode listing available policies with Hybrid and Azure policy types shown&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;This will list the policy name, and whether it is a Hybrid or Azure Policy. You can learn the difference between the two&lt;/li&gt;&#xA;&lt;li&gt;Select the policy you want to explore&lt;/li&gt;&#xA;&lt;li&gt;This will give you two options &lt;strong&gt;List policy&amp;rsquo;s endpoints&lt;/strong&gt; and &lt;strong&gt;Download policy&amp;rsquo;s endpoints to csv (for batchssh)&lt;/strong&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h4 id=&#34;list-endpoints&#34;&gt;List Endpoints&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#list-endpoints&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h4&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;List endpoints will give you a list of all the endpoints available in that policy (One endpoint might have multiple rows if it has different Linux user principals in the policy)&lt;/li&gt;&#xA;&lt;li&gt;Enter the number of the endpoint you want to connect or the number for going back to the policy menu.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/EZSSHI5.PNG&#34; alt=&#34;EZSSH Agentless JIT Access interactive mode showing policy endpoints list with user, VM name, IP, and access duration details&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;If you use &lt;a href=&#34;https://docs.microsoft.com/en-us/azure/security-center/security-center-just-in-time?tabs=jit-config-asc%2Cjit-request-asc&#34;&gt;Azure Networking JIT&lt;/a&gt; EZSSH can make the request to open it for you. Enter y for opening a JIT request. Press enter to skip.&lt;/li&gt;&#xA;&lt;li&gt;EZSSH defaults to try to connect to port 22, if your endpoint uses another port, enter the port number. Press enter to skip.&lt;/li&gt;&#xA;&lt;li&gt;EZSSH works on the Just In Time methodology of just giving users access for the time they need, enter the number of hours you need access to the machine. It defaults to the maximum allowed time for that machine. Press enter for the default value.&lt;/li&gt;&#xA;&lt;li&gt;SSH session will start in another window.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h4 id=&#34;download-policys-endpoints-to-csv-for-batchssh&#34;&gt;Download policy&amp;rsquo;s endpoints to csv (for batchssh)&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#download-policys-endpoints-to-csv-for-batchssh&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h4&gt;&#xA;&lt;p&gt;Download policy endpoints gives you the option of saving the policy endpoints into a CSV that can then be used to &lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/batchssh/&#34;&gt;connect to multiple endpoints at once&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Troubleshoot EZSSH Issues with GitHub</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/troubleshooting/git_not_working/</link>
      <pubDate>Tue, 03 Mar 2026 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/troubleshooting/git_not_working/</guid>
      <description>&lt;h2 id=&#34;common-issues-with-the-ezssh-cli-for-github&#34;&gt;Common Issues with the ezssh CLI for GitHub&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#common-issues-with-the-ezssh-cli-for-github&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;authentication-errors-troubleshooting&#34;&gt;Authentication Errors Troubleshooting&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#authentication-errors-troubleshooting&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Make sure to run &lt;code&gt;ezzshh git&lt;/code&gt; before running your Git Commands&lt;/li&gt;&#xA;&lt;li&gt;Make sure your git repository is on the Git organization that trusts EZSSH&lt;/li&gt;&#xA;&lt;li&gt;Make sure you have the right access to the repository.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h3 id=&#34;permission-denied-publickey-error-on-windows&#34;&gt;Permission Denied (publickey) Error on Windows&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#permission-denied-publickey-error-on-windows&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;If when you run:&lt;/p&gt;&#xA;&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt; ssh YOURGITORGADDRESS&#xA;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;you are able to authenticate. But when you run any git operation you get the following error:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create a Local Proxy for Cloud RADIUS</title>
      <link>https://www.keytos.io/docs/cloud-radius/how-to-deploy-cloud-radius-local-backup/how-to-create-local-radius-proxy-cloud-radius/</link>
      <pubDate>Thu, 15 Jan 2026 08:00:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/how-to-deploy-cloud-radius-local-backup/how-to-create-local-radius-proxy-cloud-radius/</guid>
      <description>&lt;h2 id=&#34;prerequisites-to-create-a-local-proxy-for-cloud-radius&#34;&gt;Prerequisites to Create a Local Proxy for Cloud RADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites-to-create-a-local-proxy-for-cloud-radius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/how-to-create-radius-service-in-azure/&#34;&gt;EZRADIUS Subscription&lt;/a&gt; (This is included in all EZRADIUS tiers).&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/create-cloud-radius-network-policies/how-to-create-certificate-radius-policy/&#34;&gt;Setup your Access Policies&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/&#34;&gt;EZCA SCEP or SSL CA&lt;/a&gt; to issue client certificates to the proxy.&lt;/li&gt;&#xA;&lt;li&gt;Local Server (Linux) to host the proxy&lt;/li&gt;&#xA;&lt;li&gt;Permissions to create an Entra ID Application&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;system-requirements-for-local-radius-proxy&#34;&gt;System Requirements for Local RADIUS Proxy&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#system-requirements-for-local-radius-proxy&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Operating System&lt;/strong&gt;: Ubuntu 24.04 or later&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;CPU&lt;/strong&gt;: 2 cores minimum&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;RAM&lt;/strong&gt;: 4 GB minimum&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;div class=&#34;alert alert-info&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Note&lt;/div&gt;&#xA;&lt;p&gt;While Keytos support can advise on software features and basic troubleshooting, please note that hosting and managing the underlying hardware for a Local RADIUS Proxy is self-service and not included in our basic support. If you would like to meet with a Keytos engineer to discuss a hosting plan and review your system architecture, we offer &lt;a href=&#34;https://download.keytos.io/Downloads/marketing/keytos-professional-services.pdf&#34;&gt;professional services&lt;/a&gt; to help you get set up.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Enable WiFi Certificate Authentication in Intune</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/intune/how-to-enable-wifi-certificate-authentication/</link>
      <pubDate>Tue, 25 Nov 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/intune/how-to-enable-wifi-certificate-authentication/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID applications are registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/how-to-create-radius-service-in-azure/&#34;&gt;You have signed up for an EZRADIUS Plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/managing-subscription/&#34;&gt;You are a Subscription Owner or Network Administrator&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;You are an Intune Administrator&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/&#34;&gt;You have created Intune Trusted Certificates and SCEP profiles&lt;/a&gt; to issue certificates to your devices.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;div class=&#34;alert alert-info&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;SCEP Configuration&lt;/div&gt;&#xA;&lt;p&gt;This guide assumes that you have already set up your Trusted Certificates and SCEP Profiles for your PKI in your Intune portal. If you have not done so, please follow the guide on &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/&#34;&gt;how to create Intune Trusted Certificates and SCEP profiles&lt;/a&gt;, or watch &lt;a href=&#34;https://www.youtube.com/watch?v=XDldgDJHgY0&#34;&gt;this 5 minute video&lt;/a&gt; where you proceed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Enable WiFi Entra ID Authentication in Intune</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/intune/how-to-enable-wifi-entra-id-authentication/</link>
      <pubDate>Tue, 25 Nov 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/intune/how-to-enable-wifi-entra-id-authentication/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID applications are registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/how-to-create-radius-service-in-azure/&#34;&gt;You have signed up for an EZRADIUS Plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/managing-subscription/&#34;&gt;You are a Subscription Owner or Network Administrator&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;You are an Intune Administrator&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;how-to-enable-wifi-entra-id-authentication-in-intune&#34;&gt;How to Enable WiFi Entra ID Authentication in Intune&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-wifi-entra-id-authentication-in-intune&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The following steps will guide you through the process of creating a WiFi profile in Intune that uses Entra ID Password Authentication with EZRADIUS. At a high level, you will need to:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Distribute WiFi Profiles Windows to non managed devices with EZRADIUS</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/how-to-install-eap-tls-wifi-profile-windows/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/how-to-install-eap-tls-wifi-profile-windows/</guid>
      <description>&lt;h2 id=&#34;how-to-distribute-wifi-profiles-to-non-managed-windows-devices-with-ezradius&#34;&gt;How to Distribute WiFi Profiles to non managed Windows devices with EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-distribute-wifi-profiles-to-non-managed-windows-devices-with-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If your organization has &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/&#34;&gt;enabled self-service wifi profiles&lt;/a&gt; you can create your own Wi-Fi profile for your Windows devices. There are three ways to obtain them: EZRADIUS sent you an email with the profile, you downloaded the profile from the EZRADIUS portal, or request an email with your profile from the EZRADIUS portal.&lt;/p&gt;&#xA;&lt;h3 id=&#34;option-1-email-received-from-ezradius&#34;&gt;Option 1: Email Received from EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#option-1-email-received-from-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;If you received an email from EZRADIUS with 3 different files: Root CA certificate (root.cer), the Windows Wi-Fi Profile (wifi-profile.xml), and your Wi-Fi Certificate (certificate.pfx), each file will be used to install the profile on your Windows device.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Learn How to Renew a Certificate Authority Without Outage</title>
      <link>https://www.keytos.io/docs/azure-pki/concepts/how-to-renew-a-certificate-authority-without-outage/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/concepts/how-to-renew-a-certificate-authority-without-outage/</guid>
      <description>&lt;h2 id=&#34;overview----how-to-renew-a-certificate-authority-without-outage&#34;&gt;Overview  - How to Renew a Certificate Authority Without Outage&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview----how-to-renew-a-certificate-authority-without-outage&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Renewing a Certificate Authority (CA) is a critical task that must be performed without causing disruptions to the services that rely on the certificates issued by the CA. This guide outlines the steps necessary to rotate a private CA seamlessly, ensuring that all dependent systems continue to function without interruption.&lt;/p&gt;&#xA;&lt;h2 id=&#34;differences-between-renewing-a-root-ca-and-a-subordinate-ca&#34;&gt;Differences Between Renewing a Root CA and a Subordinate CA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#differences-between-renewing-a-root-ca-and-a-subordinate-ca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;When renewing a Root CA, the process is more complex and requires careful planning. The Root CA is the trust anchor for all certificates issued by it and its subordinate CAs. Renewing a Root CA basically means that you have to issue the new Root CA certificate, distribute it to all clients, and ensure that all services trust the new Root CA. Then you can start issuing certificates from the new Root CA.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Manage YubiKey and Smart Card Inventory for Entra ID</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/administrator/manage-smartcards/manage-smartcard-inventory/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/administrator/manage-smartcards/manage-smartcard-inventory/</guid>
      <description>&lt;h2 id=&#34;overview---how-to-manage-key-inventory-and-prevent-supply-chain-attacks-for-hardware-tokens&#34;&gt;Overview - How To Manage Key Inventory and Prevent Supply Chain Attacks for Hardware Tokens&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---how-to-manage-key-inventory-and-prevent-supply-chain-attacks-for-hardware-tokens&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZCMS best practices recommend that all hardware tokens (YubiKey, FIDO2 Keys, and Smartcards) issued are pre-registered by your organization. This pre-registration allows you to keep track of your inventory as well as preventing supply chain attacks where you send the keys to the user and someone changes the key for a compromised Key.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Issue SCEP Certificates to Android Devices with Intune</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/create-android-intune-scep-profiles/</link>
      <pubDate>Wed, 01 Apr 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/create-android-intune-scep-profiles/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---how-to-issue-scep-certificates-to-android-devices-with-intune&#34;&gt;Introduction - How to Issue SCEP Certificates to Android Devices with Intune&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-issue-scep-certificates-to-android-devices-with-intune&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;This guide shows how to issue X509 certificates to Android devices with Microsoft Intune and SCEP. You will create:&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;A &lt;strong&gt;Trusted Certificate&lt;/strong&gt; profile to establish trust with your CA chain.&lt;/li&gt;&#xA;&lt;li&gt;A &lt;strong&gt;SCEP Certificate&lt;/strong&gt; profile to request and install certificates for users or devices.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;By the end, your Android devices will be able to enroll and receive certificates from your EZCA SCEP CA.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Add EZSSH Access to Endpoints With Pulumi</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/adding-ezssh-access-to-endpoints/pulumi_vm_example/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/adding-ezssh-access-to-endpoints/pulumi_vm_example/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/creating-your-first-policy/&#34;&gt;Have at least one policy with endpoints&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.pulumi.com/docs/iac/languages-sdks/dotnet/&#34;&gt;Install Pulumi for C# Runtime&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://github.com/markeytos/PulumiAzureSample&#34;&gt;Clone or Download EZSSH Pulumi Sample&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZSSH uses SSH Certificates to authenticate to endpoints. Since this is a OpenSSH supported protocol, no custom code has to run on your endpoints for authentication to work. By &lt;a href=&#34;https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/deployment_guide/sec-distributing_and_trusting_ssh_ca_public_keys&#34;&gt;adding your EZSSH Certificate to your TrustedUserCAKeys&lt;/a&gt; your endpoint will start working with EZSSH.&lt;/p&gt;&#xA;&lt;p&gt;In this page we will go through how to do this by deploying to Azure using Pulumi. You might also be interested in:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create Cloud RADIUS Network Policies for Local User Authentication</title>
      <link>https://www.keytos.io/docs/cloud-radius/create-cloud-radius-network-policies/how-to-create-local-user-radius-policy/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/create-cloud-radius-network-policies/how-to-create-local-user-radius-policy/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra applications are registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/&#34;&gt;You have an active EZRADIUS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/managing-subscription/&#34;&gt;You are a Subscription Owner or Network Administrator on your EZRADIUS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&#xA;&#xA;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/how-to-configure-local-radius-users/&#34;&gt;You have created local RADIUS users&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;introduction-to-managing-cloud-radius-network-policies-in-ezradius&#34;&gt;Introduction to Managing Cloud RADIUS Network Policies in EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction-to-managing-cloud-radius-network-policies-in-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The Policies page in EZRADIUS allows you to create and manage your Cloud RADIUS network policies. Each policy defines the conditions under which a user or device can connect to your network, including authentication methods, accepted certificate authorities, and access policies.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create Your First Azure Policy</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/creating-your-first-policy/first_azure_policy/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/creating-your-first-policy/first_azure_policy/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/&#34;&gt;Selecting a Plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/connecting_to_azure_resources/&#34;&gt;Giving Access to Azure Subscriptions&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Azure Policies are the best option for easily and seamlessly connecting to Azure SSH endpoints using AAD Identities. The policy will have a scope (Subscription or Resource Group) and will manage access to the resources inside the scope.&lt;/p&gt;&#xA;&lt;h2 id=&#34;video-version&#34;&gt;Video Version&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#video-version&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/jCqgQFHxsH4?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;getting-started&#34;&gt;Getting Started&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#getting-started&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Go to  &lt;a href=&#34;https://portal.ezssh.io/&#34;&gt;https://portal.ezssh.io/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Navigate to Azure Policies&lt;/li&gt;&#xA;&lt;li&gt;Click on the &amp;ldquo;Create New Policy&amp;rdquo;&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/AZPOLICY1.PNG&#34; alt=&#34;EZSSH Agentless JIT Access Azure Policy page with Create New Policy button highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Enter &lt;strong&gt;Policy Name&lt;/strong&gt;: This name is just to make it easier for users to know what this policy gives them access to.&lt;/li&gt;&#xA;&lt;li&gt;Enter &lt;strong&gt;Notification Email&lt;/strong&gt;: Usually a team DL that would get notifications for changes to the policy.&lt;/li&gt;&#xA;&lt;li&gt;Select the &lt;strong&gt;Scope Type&lt;/strong&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select the &lt;strong&gt;Policy Scope&lt;/strong&gt; from the dropdown.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/AZPOLICY2.PNG&#34; alt=&#34;EZSSH Agentless JIT Access new Azure policy form with Policy Name, Notification Email, and Scope fields&#34;&gt;&#xA; &lt;div class=&#34;alert alert-info&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Note&lt;/div&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;If you do not see your scope here. &lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/troubleshooting/test_ezssh_azure_access/&#34;&gt;Test EZSSH Azure Access&lt;/a&gt;&#xA;&lt;/div&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Setup Access To Azure Resources</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/connecting_to_azure_resources/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/connecting_to_azure_resources/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/&#34;&gt;Selecting a Plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/creating-your-first-policy/first_hybrid_policy/&#34;&gt;Creating an Azure Policy&lt;/a&gt; requires EZSSH to have access to your subscription. Based on what features you want to enable you can give it different permissions. If you want to use our &amp;ldquo;Auto Add&amp;rdquo; Feature that automatically adds your EZSSH Policy certificate to the machines we detect in your subscription, &lt;strong&gt;Contributor&lt;/strong&gt; role is required. If you only want EZSSH to detect the machine and you will add the certificate to the machines, using your deployment templates (&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/adding-ezssh-access-to-endpoints/pulumi_vm_example/&#34;&gt;Pulumi Example&lt;/a&gt;) then only &lt;strong&gt;Reader&lt;/strong&gt; role is required.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Setup ACME Clients for Internal PKI</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/how-to-enable-acme-for-private-pki/setup-acme-clients-for-internal-ca/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/how-to-enable-acme-for-private-pki/setup-acme-clients-for-internal-ca/</guid>
      <description>&lt;h2 id=&#34;introduction---how-to-automate-certificate-management-with-acme-for-internal-pki&#34;&gt;Introduction - How To Automate Certificate Management with ACME for Internal PKI&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-automate-certificate-management-with-acme-for-internal-pki&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;ACME (Automatic Certificate Management Environment) is a communication protocol for automating certificate lifecycle between certificate authorities and servers. This automation dramatically reduces the cost of certificate lifecycle and prevents costly outages.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/ACME-Explained.jpg&#34; alt=&#34;Diagram showing ACME protocol flow between web server admin software, EZCA certificate authority, and domain validation&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Since ACME depends on the validation of domain ownership, an agent has to be deployed in your local network. In this section we will guide you on how to point the most common ACME agents to your EZCA Agent.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Setup EZCA ADCS Agent To Automate Microsoft CA Certificate Management</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/how-to-connect-adcs-to-ezca/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/how-to-connect-adcs-to-ezca/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/how-to-connect-adcs-to-ezca/&#34;&gt;Setup IIS&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/create-adcs-ca-templates/&#34;&gt;Create Certificate Templates In CA&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;introduction---how-to-manage-adcs-certificates-in-a-web-portal-with-ezca&#34;&gt;Introduction - How To Manage ADCS Certificates in a web portal With EZCA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-manage-adcs-certificates-in-a-web-portal-with-ezca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;For EZCA to connect to your ADCS CAs it is required for a domain joined machine to run the EZCA certificate agent web service. This web service receives authenticated requests from EZCA and then requests the certificate on behalf of EZCA. In this page we will set up the Agent, from registering the gMSA to getting the Agent operational.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/EZCA_ADCS_Diagram.jpg&#34; alt=&#34;Diagram showing EZCA cloud agent architecture connecting user certificate requests to on-premises ADCS CA&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: SSH to an Endpoint</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/ssh_to_endpoint/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/ssh_to_endpoint/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/how_to_download/&#34;&gt;Download EZSSH&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/creating-your-first-policy/&#34;&gt;Have at least one policy with endpoints&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;tenant-prerequisites&#34;&gt;Tenant Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#tenant-prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The following prerequisites have to be done only once per tenant.&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/&#34;&gt;Selecting a Plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;starting-the-ssh-session&#34;&gt;Starting the SSH Session&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#starting-the-ssh-session&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;To Start an SSH Session to an endpoint you have access to simply run:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ezssh ssh -e USERNAME@ENDPOINT&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;EZSSH will start the SSH Session in a new window.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/EZSSHSSH.PNG&#34; alt=&#34;EZSSH Agentless JIT Access command line connecting to endpoint via SSH certificate with Ubuntu terminal window opening&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Troubleshoot EZSSH Issues with Azure Resources</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/troubleshooting/test_ezssh_azure_access/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/troubleshooting/test_ezssh_azure_access/</guid>
      <description>&lt;h2 id=&#34;troubleshooting-ezssh-not-finding-your-azure-resources&#34;&gt;Troubleshooting EZSSH Not Finding Your Azure Resources&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#troubleshooting-ezssh-not-finding-your-azure-resources&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If EZSSH cannot find your Azure resources you will need to verify that the EZSSH Application has access to your Azure resources.&lt;/p&gt;&#xA;&lt;p&gt;The easiest way to check, is by going to &lt;a href=&#34;https://portal.ezssh.io/&#34;&gt;https://portal.ezssh.io/&lt;/a&gt; and navigating to the settings page.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/settings.png&#34; alt=&#34;EZSSH Agentless JIT Access portal Settings page showing Test Domain Setup button and subscription settings&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Once in the setting page click the &amp;ldquo;Test Domain Setup&amp;rdquo; button.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Distribute WiFi Profiles to non managed Android devices with EZRADIUS</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/how-to-install-eap-tls-wifi-profile-android/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/how-to-install-eap-tls-wifi-profile-android/</guid>
      <description>&lt;h2 id=&#34;how-to-distribute-wifi-profiles-to-non-managed-android-devices-with-ezradius&#34;&gt;How to Distribute WiFi Profiles to non managed Android devices with EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-distribute-wifi-profiles-to-non-managed-android-devices-with-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If your organization has &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/&#34;&gt;enabled self-service wifi profiles&lt;/a&gt; you can create your own Wi-Fi profile for your Android devices. There are 2 ways to obtain them: EZRADIUS sent you an email with the profile or request an email with your profile from the EZRADIUS portal.&lt;/p&gt;&#xA;&lt;h3 id=&#34;how-to-request-an-email-with-your-wifi-profile-from-the-ezradius-portal&#34;&gt;How To Request an Email with your Wifi Profile from the EZRADIUS Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-request-an-email-with-your-wifi-profile-from-the-ezradius-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;If you need access to your Wifi and your administrator has enabled self service profile distribution in EZRADIUS, you can request an email with your certificate from the EZRADIUS portal.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Install Wifi Certificate on MacOS</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/how-to-add-wifi-profile-on-macos/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/how-to-add-wifi-profile-on-macos/</guid>
      <description>&lt;h2 id=&#34;how-to-distribute-wifi-profiles-to-non-managed-ios-devices-with-ezradius&#34;&gt;How to Distribute WiFi Profiles to non managed iOS devices with EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-distribute-wifi-profiles-to-non-managed-ios-devices-with-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If your organization has &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/&#34;&gt;enabled self-service wifi profiles&lt;/a&gt; you can create your own Wi-Fi profile for your Apple devices. There are three ways to obtain them: EZRADIUS sent you an email with the profile, you downloaded the profile from the EZRADIUS portal, or request an email with your profile from the EZRADIUS portal.&lt;/p&gt;&#xA;&lt;h3 id=&#34;option-1-email-received-from-ezradius&#34;&gt;Option 1: Email Received from EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#option-1-email-received-from-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;If you received an email from EZRADIUS with your profile, follow these steps to install the profile on your Apple device:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Assign Smartcards and FIDO2 Keys for Entra CBA</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/administrator/manage-smartcards/how-to-assign-a-smartcard/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/administrator/manage-smartcards/how-to-assign-a-smartcard/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;With current distributed workforce, additional security measures have to been added to smart card distribution. To mitigate the supply chain risks added by shipping smart cards to remote workers, EZCMS allows you to assign each smart card to a user, ensuring that only that user can add certificates to that smart card.&lt;/p&gt;&#xA;&lt;h2 id=&#34;how-to-assign-a-smart-card-and-fido2-keys-for-entra-cba&#34;&gt;How To Assign a Smart Card and FIDO2 Keys for Entra CBA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-assign-a-smart-card-and-fido2-keys-for-entra-cba&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Open your EZCMS client application.&lt;/li&gt;&#xA;&lt;li&gt;Login with your Entra ID user account that is a smartcard administrator in EZCMS.&lt;/li&gt;&#xA;&lt;li&gt;Select the &amp;ldquo;Admin Manage Security Tokens&amp;rdquo; Page on the left menu.&lt;/li&gt;&#xA;&lt;li&gt;Select the &amp;ldquo;Assign Security Token&amp;rdquo; tab.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/how-to-assign-yubikey.png&#34; alt=&#34;Assign Smart Card or Security token for Entra CBA&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;If you are using an modern token that supports Key attestation such as a &lt;a href=&#34;https://www.yubico.com/us/product/yubikey-5-series/yubikey-5c-nfc/&#34;&gt;YubiKey&lt;/a&gt; or a &lt;a href=&#34;https://store.keytos.io/products/phishing-resistant-fido2-key-with-smartcard-piv-functionality-and-nfc-usb-a-security-key&#34;&gt;FEITIAN Key&lt;/a&gt;, connect the token you want to assign to the user.&lt;/li&gt;&#xA;&lt;li&gt;Select a user from the queue.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/assign-yubikey-to-entra-id-user.png&#34; alt=&#34;Assign YubiKey to Entra ID User&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select the token you want to assign to the user.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/assign-yubikey-to-entra-id-user-2.png&#34; alt=&#34;Manage User YubiKeys in Entra ID&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;If shipping enter the tracking number of the package.&lt;/li&gt;&#xA;&lt;li&gt;Click &amp;ldquo;Next&amp;rdquo; on the bottom right to assign the token to the user.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/AssignSC3.png&#34; alt=&#34;Assign Smart Card Serial Number&#34;&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>How-To: Issue SmartCard Certificates With ECMS Agent</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-enable-phishing-resistant-authentication-in-entra-id-domain/connectadcs/settingupsite/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-enable-phishing-resistant-authentication-in-entra-id-domain/connectadcs/settingupsite/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-enable-phishing-resistant-authentication-in-entra-id-domain/connectadcs/settingupiis/&#34;&gt;Setup IIS&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-enable-phishing-resistant-authentication-in-entra-id-domain/connectadcs/createcerttemplates/&#34;&gt;Create Certificate Templates In CA&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;For EZCMS to connect to your ADCS CAs it is required for a domain joined machine to run the EZCMS certificate agent web service. This web service receives authenticated requests from EZCMS and then requests the certificate on behalf of EZCMS. In this page we will set up the Agent, from registering the gMSA to getting the Agent operational.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/EZIDAgent.jpg&#34; alt=&#34;CA Agent&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Self-Enroll YubiKeys and FIDO2 Keys Using your Existing Entra ID Account</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/creating-identity/how-to-onboard-phishing-resistant-fido2-and-entra-cba-with-existing-microsoft-365-account/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/creating-identity/how-to-onboard-phishing-resistant-fido2-and-entra-cba-with-existing-microsoft-365-account/</guid>
      <description>&lt;h2 id=&#34;how-to-self-enroll-smartcards-and-fido2-keys-for-entra-cba-using-entra-id-and-ezcms&#34;&gt;How to Self-Enroll Smartcards and FIDO2 Keys for Entra CBA Using Entra ID and EZCMS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-self-enroll-smartcards-and-fido2-keys-for-entra-cba-using-entra-id-and-ezcms&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;This page will guide you on how to create your passwordless identity, your organization might require you to have a hardware token if you have not requested a hardware token, please &lt;a href=&#34;https://www.keytos.io/docs/passwordless-onboarding/request-smart-card/&#34;&gt;request one&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;h2 id=&#34;how-to-onboard-phishing-resistant-fido2-and-entra-cba-with-existing-microsoft-365-account&#34;&gt;How To Onboard Phishing Resistant FIDO2 and Entra CBA with Existing Microsoft 365 Account&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-onboard-phishing-resistant-fido2-and-entra-cba-with-existing-microsoft-365-account&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Open the EZCMS Tool.&lt;/li&gt;&#xA;&lt;li&gt;Login.&lt;/li&gt;&#xA;&lt;li&gt;Navigate to &amp;ldquo;Request Identity&amp;rdquo;.&lt;/li&gt;&#xA;&lt;li&gt;Select &amp;ldquo;SSO Login&amp;rdquo; and click Next.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/select-entra-id-sso.png&#34; alt=&#34;How To Onboard YubiKey To Entra ID&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Connect the hardware key or smartcard to your computer.&lt;/li&gt;&#xA;&lt;li&gt;Select the domain and account you want to create an identity for.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/Select-Domain-for-entra-cba.png&#34; alt=&#34;Select Domain for Entra CBA Certificate creation&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select the Hardware key you want to use.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/select-yubikey-for-entra-cba.png&#34; alt=&#34;How To create certificate for YubiKey for Entra CBA&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Enter your PIN (If this is the first time it will ask you to confirm your PIN).&lt;/li&gt;&#xA;&lt;li&gt;Click &amp;ldquo;Next&amp;rdquo;&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/yubikey-entra-cba-fido2.png&#34; alt=&#34;Request a YubiKey Certificate for Entra CBA and FIDO2&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Follow the instructions on the screen (If it freezes, it might be waiting for input on your YubiKey, look at the YubiKey to see if it is flashing slowly, if it is, press the copper part).&lt;/li&gt;&#xA;&lt;li&gt;Your Key is now read to use!&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>How-To: Unlock Preloaded Entra CBA SmartCard</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/creating-identity/how-to-unlock-entra-id-preloaded-phishing-resisitant-key/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/creating-identity/how-to-unlock-entra-id-preloaded-phishing-resisitant-key/</guid>
      <description>&lt;h2 id=&#34;introduction---how-to-unlock-preloaded-entra-cba-smartcard&#34;&gt;Introduction - How to Unlock Preloaded Entra CBA SmartCard&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-unlock-preloaded-entra-cba-smartcard&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If your IT department has preloaded your smart card with your identity, you will need to unblock the smart card before you can use it. This guide will show you how to unblock your smart card. To unblock your smartcard there are 3 different methods, depending on your organization&amp;rsquo;s settings, you might have one or more of the following options:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How To: Setup Certificate Authentication in GitHub</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/how-to-enable-ssh-certificates-in-github/</link>
      <pubDate>Thu, 02 Apr 2026 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/how-to-enable-ssh-certificates-in-github/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---protecting-your-github-repositories-with-ssh-certificates&#34;&gt;Introduction - Protecting Your GitHub Repositories with SSH Certificates&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---protecting-your-github-repositories-with-ssh-certificates&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZSSH Helps you protect your code hosted in GitHub by removing the non-expiring ssh keys from the equation. Instead using your secure corporate identity to authenticate the engineers and issuing a short term SSH certificate that can be used to authenticate with GitHub.&lt;/p&gt;&#xA;&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Before you can set up SSH Certificate Authentication for GitHub, you will need to have the following:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Connect to Multiple Endpoints at Once with EZSSH</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/batchssh/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/batchssh/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/how_to_download/&#34;&gt;Download EZSSH&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/creating-your-first-policy/&#34;&gt;Have at least one policy with endpoints&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;tenant-prerequisites&#34;&gt;Tenant Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#tenant-prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The following prerequisites have to be done only once per tenant.&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/&#34;&gt;Selecting a Plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;video-version&#34;&gt;Video Version&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#video-version&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/bb3G04WOblo?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;getting-the-csv&#34;&gt;Getting the CSV&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#getting-the-csv&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The easiest way to get a CSV of your endpoints is using EZSSH &lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/interactive_mode/&#34;&gt;Interactive Mode&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Issue SCEP Certificates to Linux Devices with Intune</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/how-to-create-linux-scep-certificates-in-intune/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/how-to-create-linux-scep-certificates-in-intune/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---how-to-issue-scep-certificates-to-linux-devices-with-intune&#34;&gt;Introduction - How to Issue SCEP Certificates to Linux Devices with Intune&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-issue-scep-certificates-to-linux-devices-with-intune&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;This guide shows how to issue X509 certificates to Linux devices with Microsoft Intune and SCEP. You will create:&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;A &lt;strong&gt;Trusted Certificate&lt;/strong&gt; profile to establish trust with your CA chain.&lt;/li&gt;&#xA;&lt;li&gt;A &lt;strong&gt;SCEP Certificate&lt;/strong&gt; profile to request and install certificates for users or devices.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;While Intune has SCEP profiles for &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/create-macos-intune-scep-profiles/&#34;&gt;Mac and iOS devices&lt;/a&gt;, &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/create-windows-intune-scep-profiles/&#34;&gt;Windows&lt;/a&gt;, and &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/create-android-intune-scep-profiles/&#34;&gt;Android&lt;/a&gt;, it does not have a specific profile for Linux devices. However, we have created some custom profiles that will allow you to issue certificates to Linux devices.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Register ADCS Agent in EZCA</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/register-adcs-agent-in-ezca/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/register-adcs-agent-in-ezca/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/how-to-connect-adcs-to-ezca/&#34;&gt;Setup IIS&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/create-adcs-ca-templates/&#34;&gt;Create Certificate Templates In CA&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/how-to-connect-adcs-to-ezca/&#34;&gt;Setup EZCA Agent&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The last step to linking EZCA to your existing ADCS CAs is registering the CA in EZCA.&lt;/p&gt;&#xA;&lt;h2 id=&#34;registering-the-ca-in-ezca&#34;&gt;Registering the CA in EZCA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#registering-the-ca-in-ezca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Navigate to the &lt;a href=&#34;https://portal.ezca.io/&#34;&gt;EZCA portal&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;li&gt;Navigate to Certificate Authorities.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/CAMenu.png&#34; alt=&#34;EZCA Cloud PKI portal dashboard with Certificate Authorities menu item highlighted in left navigation&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click on the &amp;ldquo;Create CA&amp;rdquo;.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/CREATECA.png&#34; alt=&#34;EZCA Cloud PKI My CAs list page with Create CA button highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select ADCS CA.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/CREATEADCSCA.png&#34; alt=&#34;EZCA Cloud PKI Create CA wizard showing ADCS CA type selected to connect to existing Active Directory CA&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Press Next.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h3 id=&#34;connect-cas&#34;&gt;Connect CAs&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#connect-cas&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;Now we will connect EZCA to all the CAs you want to manage with EZCA.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Manage your Cloud RADIUS Local Users</title>
      <link>https://www.keytos.io/docs/cloud-radius/how-to-configure-local-radius-users/manage-cloud-radius-pap-user-passwords/</link>
      <pubDate>Mon, 03 Nov 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/how-to-configure-local-radius-users/manage-cloud-radius-pap-user-passwords/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/how-to-create-radius-service-in-azure/&#34;&gt;Creating Cloud Radius Instance&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/managing-subscription/&#34;&gt;Being a Subscription Owner or Network Administrator&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;introduction---how-to-manage-local-radius-users-in-ezradius&#34;&gt;Introduction - How to Manage Local RADIUS Users in EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-manage-local-radius-users-in-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;While we recommend using EAP-TLS for your RADIUS users, we understand that some devices might not support this protocol and you might have to fall back to passwords. In this page we will go through how to manage your Local users and passwords in EZRADIUS.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Distribute WiFi Profiles For Entra ID to non managed Apple iOS devices</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/how-to-install-eap-ttls-wifi-profile-apple/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/how-to-install-eap-ttls-wifi-profile-apple/</guid>
      <description>&lt;h2 id=&#34;how-to-distribute-wifi-profiles-for-entra-id-to-non-managed-ios-devices-with-ezradius&#34;&gt;How to Distribute WiFi Profiles for Entra ID to non managed iOS devices with EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-distribute-wifi-profiles-for-entra-id-to-non-managed-ios-devices-with-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If your organization has &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/&#34;&gt;enabled self-service wifi profiles&lt;/a&gt; you can create your own Wi-Fi profile for Entra ID for your Apple devices. There are three ways to obtain them: EZRADIUS sent you an email with the profile, you downloaded the profile from the EZRADIUS portal, or request an email with your profile from the EZRADIUS portal.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Delete/Unassign Smartcards and FIDO2 Keys for Entra CBA</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/administrator/manage-smartcards/how-to-deactivate-smartcard-and-fido2-keys/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/administrator/manage-smartcards/how-to-deactivate-smartcard-and-fido2-keys/</guid>
      <description>&lt;h2 id=&#34;overview---how-to-deleteunassign-yubikeys-and-fido2-keys-for-entra-cba&#34;&gt;Overview - How to Delete/Unassign YubiKeys and FIDO2 Keys for Entra CBA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---how-to-deleteunassign-yubikeys-and-fido2-keys-for-entra-cba&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;When a user no longer needs a the smartcard or FIDO2 key, EZCMS gives you two options, one is to remove the user assignment of that key allowing you to re-use that card by assigning it to a new user, or delete the key from the inventory invalidating all it&amp;rsquo;s certificates and preventing this smart card to be assigned again.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Preload Smartcards and FIDO2 Keys for Entra CBA</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/administrator/manage-smartcards/how-to-create-user-smartcards/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/administrator/manage-smartcards/how-to-create-user-smartcards/</guid>
      <description>&lt;h2 id=&#34;overview---how-to-preload-smartcards-and-fido2-keys-for-entra-cba&#34;&gt;Overview - How To Preload Smartcards and FIDO2 Keys for Entra CBA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---how-to-preload-smartcards-and-fido2-keys-for-entra-cba&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;For highly regulated industries, the PIV standard requires in person verification to create the smart card, this page explains how a smart card administrator can create smart cards for users. While this is how smartcards have been created in the past, if this is not a regulatory requirement, we recommend using the &lt;a href=&#34;https://www.keytos.io/docs/passwordless-onboarding/creating-identity/&#34;&gt;self-service smart card and FIDO2 creation&lt;/a&gt; for a more streamlined process.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Access GitHub with EZSSH</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/accessgithub/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/accessgithub/</guid>
      <description>&lt;div class=&#34;alert alert-info&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Tip&lt;/div&gt;&#xA;&lt;p&gt;If you are having trouble authenticating to your git repository, make sure to check out our &lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/troubleshooting/git_not_working/&#34;&gt;Troubleshooting git problems&lt;/a&gt; guide&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/using-ezssh-client/how_to_download/&#34;&gt;Download EZSSH&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;tenant-prerequisites&#34;&gt;Tenant Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#tenant-prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Your tenant admin/GitHub admins must &lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/how-to-enable-ssh-certificates-in-github/&#34;&gt;connect EZSSH to GitHub Enterprise&lt;/a&gt; before users are able to login to Git using EZSSH.&lt;/p&gt;&#xA;&lt;h2 id=&#34;video-version&#34;&gt;Video Version&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#video-version&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/2oWYr6AvMhU?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;usage&#34;&gt;Usage&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#usage&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Go to your favorite terminal, and enter:&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ezssh git&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;ol&gt;&#xA;&lt;li&gt;The first time it will ask you to login with your Azure Active Directory Account&lt;/li&gt;&#xA;&lt;li&gt;You should get a &amp;ldquo;GitHub identity created successfully&amp;rdquo; message&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/EZSSHGH.PNG&#34; alt=&#34;EZSSH Agentless JIT Access terminal showing ezssh git command with GitHub identity created successfully confirmation message&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Start using your favorite Git Tool for committing your code!&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;div class=&#34;alert alert-info&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Note&lt;/div&gt;&#xA;&lt;p&gt;EZSSH Git certificates are short lived (based on your organizations settings might last between 1 and 72 hours). You will have to run this command each time the certificate is expired.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create Dashboards for EZRADIUS your Cloud RADIUS Service in Azure</title>
      <link>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/create-radius-dashboard-for-cloud-radius/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/create-radius-dashboard-for-cloud-radius/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra applications are registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/&#34;&gt;You have an active EZRADIUS subscription&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/connect-cloud-radius-to-siem/export-logs-to-azure-sentinel/&#34;&gt;You have connected your EZRADIUS subscription to Azure Sentinel or Log Analytics&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;how-to-create-dashboards-for-ezradius-in-azure&#34;&gt;How to Create Dashboards for EZRADIUS in Azure&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-dashboards-for-ezradius-in-azure&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If you are pushing your EZRADIUS logs to Azure Log Analytics, Azure Sentinel, or Azure Monitor, you can create dashboards to monitor your RADIUS service. We have created a dashboard template that you can import into your Azure Monitor workspace. Once imported, you can customize the dashboard to fit your needs.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export EZSSH Logs to Azure Sentinel</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/export-ezssh-audit-logs-to-siem/export-logs-to-azure-sentinel/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/export-ezssh-audit-logs-to-siem/export-logs-to-azure-sentinel/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/&#34;&gt;Selecting a Plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;video-version&#34;&gt;Video Version&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#video-version&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/TPnnx4R68a8?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZSSH enables your security team to monitor access granted through EZSSH by pushing the information to your SIEM. If your SIEM provider is not currently supported email your Keytos contact and request a connector for that specific provider.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Retrieve User PUK</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/administrator/manage-smartcards/how-to-get-user-puk/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/administrator/manage-smartcards/how-to-get-user-puk/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If PUK retrieval is activated in your subscription, your IT team can help users unblock their blocked smart card by leveraging the SmartCard&amp;rsquo;s Pin Unblocking Key (PUK) a key that allows you to reset the pin without having to reset the smart card and lose the cryptographic keys.&lt;/p&gt;&#xA;&lt;div class=&#34;alert alert-info&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Note&lt;/div&gt;&#xA;&lt;p&gt;This setting cannot be retroactively enabled since EZSmartCard will not store the randomized PUKs if PUK retrieval is not enabled.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Enable WiFi Certificate Authentication For Linux in Intune</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/intune/how-to-enable-certificate-wifi-authentication-in-linux-in-intune/</link>
      <pubDate>Wed, 25 Mar 2026 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/intune/how-to-enable-certificate-wifi-authentication-in-linux-in-intune/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/how-to-create-radius-service-in-azure/&#34;&gt;Creating Cloud Radius Instance&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/managing-subscription/&#34;&gt;Being a Subscription Owner or Network Administrator&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Being an MDM Administrator.&lt;/li&gt;&#xA;&lt;li&gt;Have a certificate in the Device, if you do not have one, follow the guide on &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-certificate-profiles/how-to-create-linux-scep-certificates-in-intune/&#34;&gt;how to create Intune SCEP profiles for Linux&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;how-to-linux-enable-wifi-certificate-authentication-in-intune&#34;&gt;How to Linux Enable WiFi Certificate Authentication in Intune&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-linux-enable-wifi-certificate-authentication-in-intune&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to your Intune portal: &lt;a href=&#34;https://aka.ms/Intune&#34;&gt;https://aka.ms/Intune&lt;/a&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Select: Devices -&amp;gt; Linux -&amp;gt; Scripts.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click the &amp;ldquo;Add&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/Intune-Linux-Menu.png&#34; alt=&#34;How to add SCEP certificate configuration profile in intune&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Distribute WiFi Profiles to non managed devices For Entra ID</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/how-to-install-eap-ttls-wifi-profile-windows/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/how-to-install-eap-ttls-wifi-profile-windows/</guid>
      <description>&lt;h2 id=&#34;how-to-distribute-wifi-profiles-to-non-managed-windows-devices-with-ezradius&#34;&gt;How to Distribute WiFi Profiles to non managed Windows devices with EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-distribute-wifi-profiles-to-non-managed-windows-devices-with-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;While this is not necessary since &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/in-device/#how-to-configure-eap-ttlspap-on-windows-for-radius-authentication&#34;&gt;you can setup windows for Entra ID Wifi Authentication&lt;/a&gt;, If your organization has &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/self-service-wifi-portal/&#34;&gt;enabled self-service wifi profiles&lt;/a&gt; you can create your own Wi-Fi profile for your Windows devices. There are three ways to obtain them: EZRADIUS sent you an email with the profile, you downloaded the profile from the EZRADIUS portal, or request an email with your profile from the EZRADIUS portal.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Use EZRADIUS Cloud RADIUS with Microsoft Intune Cloud PKI</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/intune/how-to-enable-cloud-radius-with-intune-cloud-pki/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/intune/how-to-enable-cloud-radius-with-intune-cloud-pki/</guid>
      <description>&lt;h2 id=&#34;how-can-i-use-my-cloud-pki-certificates-with-radius-for-passwordless-wi-fi-authentication&#34;&gt;How Can I Use My Cloud PKI Certificates with RADIUS for Passwordless Wi-Fi Authentication?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-can-i-use-my-cloud-pki-certificates-with-radius-for-passwordless-wi-fi-authentication&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://learn.microsoft.com/intune/intune-service/protect/microsoft-cloud-pki-overview&#34;&gt;Microsoft Cloud PKI&lt;/a&gt; allows you to issue certificates to your Intune-managed devices. But once you have certificates on your devices, how can you use them for Wi-Fi authentication?&lt;/p&gt;&#xA;&lt;p&gt;EZRADIUS Cloud RADIUS natively supports certificate-based authentication, making it easy to leverage your Cloud PKI certificates for secure, passwordless Wi-Fi access. No more passwords or complex on-premises RADIUS servers. Just configure EZRADIUS to trust your Cloud PKI and you&amp;rsquo;re set.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Learn the Differences in Cryptographic Algorithms for PKI</title>
      <link>https://www.keytos.io/docs/azure-pki/concepts/difference-between-rsa-and-ecdsa/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/concepts/difference-between-rsa-and-ecdsa/</guid>
      <description>&lt;h2 id=&#34;what-are-rsa-keys&#34;&gt;What are RSA Keys&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-are-rsa-keys&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;RSA  (Rivest Shamir Adleman) has been the standard for asymmetric cryptography for 3 decades. RSA uses the prime factorization method for one-way encryption of a message. While certain attacks have been found due to poorly implemented random number generation, this method has passed the test of time by being a trusted cryptographic method for over 3 decades with no significant findings. While the algorithm is very secure, with the advances on compute, factorizing large numbers has become easier for large computers, forcing the industry to move from 512 bit keys, to 1024 bit keys, and now 2048 bit keys and some governments recommending 4096 bit keys.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Transfer Your EZCA Cloud Certificate Authority to a New Subscription</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-manage-ezca-subscriptions/migrate-cas-to-another-subscription/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-manage-ezca-subscriptions/migrate-cas-to-another-subscription/</guid>
      <description>&lt;h2 data-toc-text=&#34;Overview&#34; id=&#34;overview---transfer-your-ezca-cloud-ca-to-a-new-subscription&#34;&gt;Overview - Transfer Your EZCA Cloud CA to a New Subscription&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---transfer-your-ezca-cloud-ca-to-a-new-subscription&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;This guide provides step-by-step instructions on how to transfer your EZCA Cloud Certificate Authorities to a new subscription. This is required if you have a trial subscription which has expired or if your old subscription was deleted or otherwise expired.&lt;/p&gt;&#xA;&lt;div class=&#34;alert alert-info&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Can I Re-Enable My Old EZCA Subscription?&lt;/div&gt;&#xA;&lt;p&gt;If your old subscription was deleted or expired, it cannot be re-enabled. You will need to create a new subscription and transfer your certificate authorities to it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: View Cloud RADIUS Audit Logs</title>
      <link>https://www.keytos.io/docs/cloud-radius/how-to-troubleshoot-radius/view-audit-logs/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/how-to-troubleshoot-radius/view-audit-logs/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/how-to-create-radius-service-in-azure/&#34;&gt;Creating Cloud Radius Instance&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/managing-subscription/&#34;&gt;Being a Subscription Owner or Network Administrator or Log Reader&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;introduction---how-to-view-cloud-radius-audit-logs-in-ezradius&#34;&gt;Introduction - How to View Cloud RADIUS Audit Logs in EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-view-cloud-radius-audit-logs-in-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;While we recommend connecting your Cloud RADIUS instance to your &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/connect-cloud-radius-to-siem/&#34;&gt;SIEM&lt;/a&gt; (Or an Azure Log Analytics workspace) and &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/create-radius-dashboard-for-cloud-radius/&#34;&gt;create Azure Dashboards&lt;/a&gt;, EZRADIUS also allows you to view the audit logs of your Cloud RADIUS instance. In this page we will go through how to view these logs.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Transfer Your EZRADIUS Cloud RADIUS Policies to a New Subscription</title>
      <link>https://www.keytos.io/docs/cloud-radius/managing-subscription/migrate-cloud-radius-azure-subscription/</link>
      <pubDate>Wed, 04 Feb 2026 09:30:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/managing-subscription/migrate-cloud-radius-azure-subscription/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;This guide provides step-by-step instructions on how to transfer your EZRADIUS Cloud RADIUS policies to a new subscription. This is required if you have a trial subscription which has expired or if your old subscription was deleted or otherwise expired.&lt;/p&gt;&#xA;&lt;div class=&#34;alert alert-info&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Can I Re-Enable My Old Subscription?&lt;/div&gt;&#xA;&lt;p&gt;If your old subscription was deleted or expired, it cannot be re-enabled. You will need to create a new subscription and transfer your policies to it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Learn About PKI Validity Periods &amp; Revocation Best Practices</title>
      <link>https://www.keytos.io/docs/azure-pki/concepts/what-is-the-best-validity-period-for-a-ca/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/concepts/what-is-the-best-validity-period-for-a-ca/</guid>
      <description>&lt;h2 id=&#34;how-to-select-a-ca-validity-period&#34;&gt;How To Select a CA Validity Period&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-select-a-ca-validity-period&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;When designing the validity period of a Certificate Authority (CA), many factors have to be taken into consideration: Lifetime of the parent CA, desired lifetime for issued certificates, key algorithm used, and security of the private key. Now let&amp;rsquo;s look into what you have to take into account when looking at each of the factors mentioned.&lt;/p&gt;&#xA;&lt;p&gt;Lifetime of the parent CA and desired lifetime for issued certificates are both based on the fact that CAs cannot issue certificates that are longer than their lifetime. Let&amp;rsquo;s look at a scenario where you want to issue 2 year certificates in a two tier PKI. The intermediate CA&amp;rsquo;s validity period has to be larger than 2 years, ideally you would want to be able to achieve at least one rotation of certificates before having to rotate the CA, meaning that the intermediate CA&amp;rsquo;s validity period has to be larger than 4 years. Industry standards would recommend to have an intermediate CA of 5 years and create a new intermediate CA to replace it after 2.5 years, giving IT administrators enough time to push the new intermediate CA certificate to clients before the 3 year mark where the first intermediate CA would not be able to issue 2 year certificates. Once we have established the lifetime of the intermediate CA we can establish the minimum validity period for the root CA: &amp;gt;10 years.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Select an EZSSH Plan in Azure Portal</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/select_plan_in_azure/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/select_plan_in_azure/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;video-version&#34;&gt;Video Version&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#video-version&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/Aps26R12quo?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;creating-the-azure-resource&#34;&gt;Creating the Azure Resource&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#creating-the-azure-resource&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Go to &lt;a href=&#34;https://portal.azure.com/&#34;&gt;https://portal.azure.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click on &amp;ldquo;Create a resource&amp;rdquo;.&lt;/li&gt;&#xA;&lt;li&gt;Type &amp;ldquo;EZSSH&amp;rdquo; in the search bar.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/AzPortal1.png&#34; alt=&#34;Azure Portal Marketplace Create a resource page with EZSSH typed in search bar&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Press enter.&lt;/li&gt;&#xA;&lt;li&gt;Select the EZSSH offering&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/AzPortal2.png&#34; alt=&#34;Azure Marketplace search results showing EZSSH listing highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select the plan.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/AzPortal3.png&#34; alt=&#34;EZSSH Agentless JIT Access Azure Marketplace listing page with Set up and Subscribe button highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Set up + Subscribe&amp;rdquo; button&lt;/li&gt;&#xA;&lt;li&gt;Enter your subscription and resource group information.&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Review + Subscribe&amp;rdquo; button&lt;/li&gt;&#xA;&lt;li&gt;Enter your email and phone number&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/AzPortal4.png&#34; alt=&#34;Azure Subscribe To EZSSH form with contact details email and phone fields highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Subscribe&amp;rdquo; button&lt;/li&gt;&#xA;&lt;li&gt;Once the subscription is complete, click the &amp;ldquo;Configure account now&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/AzPortal5.png&#34; alt=&#34;Azure subscription progress page showing SaaS subscription complete with Configure account now button&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;This will redirect you to our portal (&lt;a href=&#34;https://portal.ezssh.io/%29&#34;&gt;https://portal.ezssh.io/)&lt;/a&gt;. Sign in with your same Microsoft account.&lt;/li&gt;&#xA;&lt;li&gt;EZSSH will now show the features that are included your plan.&lt;/li&gt;&#xA;&lt;li&gt;Enable or disable if you want to also issue GitHub certificates. &lt;strong&gt;Note:&lt;/strong&gt; Only one GitHub subscription is allowed per Azure Tenant.&lt;/li&gt;&#xA;&lt;li&gt;Once the subscription details are correct, click the &amp;ldquo;Purchase Plan&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/AzPortal6.png&#34; alt=&#34;EZSSH Agentless JIT Access portal Welcome page showing plan features list with Purchase Plan button highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Once you have registered in EZSSH, the status in your Azure resource will change to subscribed.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/AzPortal7.png&#34; alt=&#34;Azure resource page for EZSSH subscription showing Subscribed status&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Once you are registered, you are ready to connect to your &lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/connecting_to_azure_resources/&#34;&gt;Azure Subscriptions&lt;/a&gt; and &lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/how-to-enable-ssh-certificates-in-github/&#34;&gt;GitHub&lt;/a&gt; Instances.&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>How-To: Troubleshoot EZCMS Administration Issues</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/troubleshooting/administration-troubleshooting/</link>
      <pubDate>Tue, 03 Mar 2026 08:00:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/troubleshooting/administration-troubleshooting/</guid>
      <description>&lt;h2 id=&#34;ezcms-deployment-cannot-find-users-during-sign-up&#34;&gt;EZCMS Deployment Cannot Find Users During Sign-Up&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#ezcms-deployment-cannot-find-users-during-sign-up&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If you are trying to sign up for EZCMS and you are getting an error that says &amp;ldquo;No Results Found&amp;rdquo; when trying to add your administrators, it means that the EZCMS AAD application does not have permission to view your tenant users, please &lt;a href=&#34;https://www.keytos.io/docs/passwordless-onboarding/getting-started/registerapp/&#34;&gt;register the application&lt;/a&gt;, and open a new tab and reauthenticate.&lt;/p&gt;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/Signup-Not-Found.png&#34; width=&#34;500px&#34; alt=&#34;User not found&#34;&gt;&#xA;&#xA;&#xA;&lt;h2 id=&#34;error-when-testing-fido2-or-phone-tenant-connection&#34;&gt;Error When Testing FIDO2 Or Phone Tenant Connection&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#error-when-testing-fido2-or-phone-tenant-connection&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If you get the following error:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Learn How to Secure your IoT Devices in Azure with Certificates</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/security-best-practices/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/security-best-practices/</guid>
      <description>&lt;h2 id=&#34;azure-iot-best-practices---video-overview&#34;&gt;Azure IoT Best Practices - Video Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#azure-iot-best-practices---video-overview&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div class=&#34;video-medium&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/wIzsF5WMUUg?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;overview---how-to-secure-your-iot-devices&#34;&gt;Overview - How to Secure Your IoT Devices&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---how-to-secure-your-iot-devices&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;With IoT&amp;rsquo;s gaining popularity, it has become a must have for many businesses, but as any emerging technology, IoT has been also grabbed the attention of hackers. Most IoT attacks from small attacks directed to specific companies, to large scale attacks such as &lt;a href=&#34;https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/&#34;&gt;the attack on DNS infrastructure by the Mirai Botnet&lt;/a&gt;, have a weak identity story to manage the IoT devices in common. As this space matures, it is our responsibility to apply best practices to protect users around the world from these bad actors. In this document we will share a guide outlining best practices to help you architect a secure and compliant device provisioning system.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Enable Azure IoT Hub Certificate Authentication in EZCA</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/enable-azure-iot-hub-certificate-authentication/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/enable-azure-iot-hub-certificate-authentication/</guid>
      <description>&lt;div class=&#34;alert alert-warning&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;⚠️ This step is optional&lt;/div&gt;&#xA;&#xA;&#xA;Only follow this guide if you intend to have EZCA automatically manage new CA certificates in your Azure IoT Hubs. If you do not leverage Azure IoT Hub, or if you plan to manually add CA certificates to your IoT Hubs, you can skip this step.&#xA;&lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;enable-azure-iot-hub-access-for-certificate-authentication-in-ezca&#34;&gt;Enable Azure IoT Hub Access For Certificate Authentication in EZCA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#enable-azure-iot-hub-access-for-certificate-authentication-in-ezca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If you are using EZCA for Azure IoT and would like to &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/certificate-based-authentication/&#34;&gt;EZCA to automatically add new CA certificates to Azure IoT&lt;/a&gt;, EZCA must to have &lt;a href=&#34;https://learn.microsoft.com/azure/role-based-access-control/built-in-roles/privileged#contributor&#34;&gt;Contributor&lt;/a&gt; role access to your IoT Hubs. With this access, EZCA will be able to automatically add new CA certificates to your IoT Hubs, and rotate your CAs when they expire. If you would also like EZCA to disable your IoT devices when a certificate is revoked, EZCA must also have the &lt;a href=&#34;https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#iot-hub-registry-contributor&#34;&gt;IoT Hub Registry Contributor&lt;/a&gt; role on your IoT Hubs as well.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Issue SCEP Certificates in Jamf Pro</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/how-to-create-scep-certificates-in-jamf/how-to-create-scep-certificates-in-jamf-pro/</link>
      <pubDate>Thu, 12 Mar 2026 09:00:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/how-to-create-scep-certificates-in-jamf/how-to-create-scep-certificates-in-jamf-pro/</guid>
      <description>&lt;h2 data-toc-text=&#34;Video Guide&#34; id=&#34;how-to-configure-jamf-pro-scep-certificate-authority---video-guide&#34;&gt;How To Configure Jamf Pro SCEP Certificate Authority - Video Guide&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-configure-jamf-pro-scep-certificate-authority---video-guide&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The following video will guide you through all the steps from start to finish to create a SCEP profile in Jamf Pro using your EZCA SCEP CA.&lt;/p&gt;&#xA;&lt;div class=&#34;video-medium&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/xJQasVphvY0?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 data-toc-text=&#34;Step by Step Guide&#34; id=&#34;how-to-configure-jamf-pro-scep-certificate-authority---step-by-step-guide&#34;&gt;How to Configure Jamf Pro SCEP Certificate Authority - Step by Step Guide&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-configure-jamf-pro-scep-certificate-authority---step-by-step-guide&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The following steps will walk you through the process of configuring Jamf Pro to issue SCEP certificates using your EZCA SCEP CA.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Authenticate with Certificates to Azure IoT Hub</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/certificate-based-authentication/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/certificate-based-authentication/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/&#34;&gt;(PKI Admin) Created a Subordinate CA in Azure&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;overview---how-to-authenticate-with-certificates-to-azure-iot-hub&#34;&gt;Overview - How to Authenticate with Certificates to Azure IoT Hub&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---how-to-authenticate-with-certificates-to-azure-iot-hub&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;X509 Certificates are the most secure way for IoT devices to authenticate with Azure IoT Hub. In this tutorial, we will show you how to create an Certificate Authority in Azure using EZCA and connect your IoT devices to Azure IoT Hub in a secure and compliant way.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Register Devices in Azure IoT Hub For Certificate Authentication Using Azure IoT Device Provisioning Service</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/how-to-create-azure-device-provisioning-service/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/how-to-create-azure-device-provisioning-service/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/&#34;&gt;(PKI Admin) Created a Subordinate CA&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;overview---how-to-use-azure-device-provisioning-service-to-automatically-provision-iot-devices&#34;&gt;Overview - How To Use Azure Device Provisioning Service to Automatically Provision IoT Devices&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---how-to-use-azure-device-provisioning-service-to-automatically-provision-iot-devices&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;X509 Certificates are the most secure way for IoT devices to authenticate with Azure. In this tutorial, we will show you how to use Azure Device Provisioning Service to automatically enroll and connect your IoT devices to Azure in a secure and compliant way.&lt;/p&gt;&#xA;&lt;div class=&#34;alert alert-warning&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Warning&lt;/div&gt;&#xA;&lt;p&gt;Using Device Provisioning Service does not support CA certificate rotation and forces you to &lt;a href=&#34;https://learn.microsoft.com/en-us/azure/iot-dps/how-to-roll-certificates&#34;&gt;re-enroll the device each certificate rotation&lt;/a&gt;. To get the full certificate automation that our &lt;a href=&#34;https://www.keytos.io/azure-iot-certificate-authority&#34;&gt;Azure IoT Certificate Integration&lt;/a&gt; offers We recommend using &lt;a href=&#34;https://learn.microsoft.com/en-us/azure/iot-hub/authenticate-authorize-x509#benefits-of-x509-ca-certificate-authentication&#34;&gt;IoT Hub CA Certificate Authentication instead&lt;/a&gt;. Here is a &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/certificate-based-authentication/&#34;&gt;guide on how to set it up&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Issue SCEP Certificates in Jamf Now</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/how-to-create-scep-certificates-in-jamf/how-to-create-scep-certificates-in-jamf-now/</link>
      <pubDate>Wed, 25 Feb 2026 08:30:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/how-to-create-scep-certificates-in-jamf/how-to-create-scep-certificates-in-jamf-now/</guid>
      <description>&lt;h2 data-toc-text=&#34;Overview&#34; id=&#34;overview---what-is-jamf-now&#34;&gt;Overview - What is Jamf Now?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---what-is-jamf-now&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://www.jamf.com/products/jamf-now/&#34;&gt;Jamf Now&lt;/a&gt; is a cloud-based mobile device management (MDM) solution designed for small businesses. It allows organizations to easily manage and secure their Apple devices, including iPhones, iPads, and Macs.&lt;/p&gt;&#xA;&lt;h3 data-toc-text=&#34;SCEP Support&#34; id=&#34;does-jamf-now-support-scep-certificates&#34;&gt;Does Jamf Now Support SCEP Certificates?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#does-jamf-now-support-scep-certificates&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;&lt;strong&gt;Yes, via Custom Profiles&lt;/strong&gt;. While Jamf Now does not directly support SCEP certificate issuance (&lt;em&gt;as of writing&lt;/em&gt;), it does allow you to configure Custom Profiles via Apple Configurator which can be used to deploy SCEP certificates to your devices. The guide below will walk you through how to use Custom Profiles in Jamf Now to issue SCEP certificates from your EZCA SCEP CA.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Issue SCEP Certificates in Apple Configurator</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/how-to-create-scep-certificates-in-apple-configurator/</link>
      <pubDate>Wed, 25 Feb 2026 08:30:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/how-to-create-scep-certificates-in-apple-configurator/</guid>
      <description>&lt;h2 data-toc-text=&#34;Overview&#34; id=&#34;overview---what-is-apple-configurator&#34;&gt;Overview - What is Apple Configurator?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---what-is-apple-configurator&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://support.apple.com/apple-configurator&#34;&gt;Apple Configurator&lt;/a&gt; is a macOS application that allows administrators to configure and deploy iOS, iPadOS, and tvOS devices in bulk. It provides tools for creating and installing configuration profiles, including SCEP certificates, on Apple devices.&lt;/p&gt;&#xA;&lt;h3 data-toc-text=&#34;SCEP Support&#34; id=&#34;does-apple-configurator-support-scep-certificates&#34;&gt;Does Apple Configurator Support SCEP Certificates?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#does-apple-configurator-support-scep-certificates&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;&lt;strong&gt;Yes&lt;/strong&gt;. Apple Configurator has built-in support for creating and deploying SCEP certificates to Apple devices. You can use Apple Configurator to create a configuration profile that includes a trusted Certificate and SCEP payload, which can then be installed on your devices to issue SCEP certificates from your EZCA SCEP CA.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How To: Create IoT Edge EST Certificate Authority</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/how-to-create-azure-iot-est-certificate-authority/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/how-to-create-azure-iot-est-certificate-authority/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://learn.microsoft.com/en-us/azure/iot-dps/quick-setup-auto-provision?view=iotedge-1.5#create-an-iot-hub&#34;&gt;An Azure IoT Hub Instance&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://learn.microsoft.com/en-us/azure/iot-dps/quick-setup-auto-provision?view=iotedge-1.5&#34;&gt;An Azure IoT Device Provisioning Service Instance&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://learn.microsoft.com/en-us/azure/iot-edge/how-to-provision-devices-at-scale-linux-x509?view=iotedge-1.5&amp;amp;tabs=individual-enrollment%2Cubuntuu&#34;&gt;A Linux Machine running IoT Edge&lt;/a&gt;  (For this one just install IoT Edge, once you get to the &lt;a href=&#34;https://learn.microsoft.com/en-us/azure/iot-edge/how-to-provision-devices-at-scale-linux-x509?view=iotedge-1.5&amp;amp;tabs=individual-enrollment%2Cubuntu#provision-the-device-with-its-cloud-identity&#34;&gt;provisioning the device with it&amp;rsquo;s cloud identity&lt;/a&gt; section, jump to this guide)&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;overview---create-iot-edge-certificates-using-a-cloud-based-est-certificate-authority&#34;&gt;Overview - Create IoT Edge Certificates Using a Cloud Based EST Certificate Authority&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---create-iot-edge-certificates-using-a-cloud-based-est-certificate-authority&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Azure IoT Edge devices need a secure way to authenticate to the cloud, however, managing certificates in IoT devices can be a challenge. Azure IoT Edge supports the Enrollment over Secure Transport (EST) protocol which allows devices to request certificates from a Certificate Authority (CA) in a secure way. This guide will walk you through creating a CA in EZCA that can issue certificates to IoT Edge devices using the EST protocol.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Connect SCEP CA To ManageEngine MDM Plus</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/connect-scep-ca-to-manageengine-mdm-plus/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/connect-scep-ca-to-manageengine-mdm-plus/</guid>
      <description>&lt;p&gt;EZCA, the first Azure based PKI, enables you to create a secure and compliant certificate authority in Azure in minutes one of the MDMs we are happy to integrate with is ManageEngine Mobile Device Manager Plus. In this page we will guide you on how to connect your CA to ManageEngine MDM Plus.&lt;/p&gt;&#xA;&lt;h2 id=&#34;prerequisites---create-your-cloud-certificate-authority&#34;&gt;Prerequisites - Create your Cloud Certificate Authority&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites---create-your-cloud-certificate-authority&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;This page assumes that you have already &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/&#34;&gt;created your SCEP CA&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;how-to-issue-ssl-certificates-in-manageengine-mobile-device-manager-plus---video-version&#34;&gt;How to Issue SSL Certificates in ManageEngine Mobile Device Manager Plus - Video Version&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-issue-ssl-certificates-in-manageengine-mobile-device-manager-plus---video-version&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/TtQSeXmT2os?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;how-to-connect-your-ca-to-manageengine-mdm-plus-for-scep-certificate-issuance&#34;&gt;How To Connect Your CA to ManageEngine MDM Plus For SCEP Certificate Issuance&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-connect-your-ca-to-manageengine-mdm-plus-for-scep-certificate-issuance&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;The first step, is to download your CA certificate. To do this, navigate to the &lt;a href=&#34;https://portal.ezca.io&#34;&gt;EZCA portal&lt;/a&gt; (If you have your private instance go to that specific portal)&lt;/li&gt;&#xA;&lt;li&gt;Login with an account that is registered as a PKI Admin in EZCA.&lt;/li&gt;&#xA;&lt;li&gt;Navigate to Certificate Authorities.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/CAMenu.png&#34; alt=&#34;View my cloud based CAs&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click on the &amp;ldquo;View Details&amp;rdquo; CA you want to connect to ManageEngine MDM Plus.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/view-ca-details.png&#34; alt=&#34;View SCEP CA Details&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click on the &amp;ldquo;Download CA Certificate&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/download-ca-certificate.png&#34; alt=&#34;Download CA Certificate&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Repeat this step for all locations of the CA.&lt;/li&gt;&#xA;&lt;li&gt;If you also have a Root CA, download the Root CA certificate as well.&lt;/li&gt;&#xA;&lt;li&gt;In another Tab, navigate to your ManageEngine MDM Plus portal.&lt;/li&gt;&#xA;&lt;li&gt;Click on the device Mgmt tab and Select Certificates in the left menu.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/manageengine-mdm-plus-certificates.png&#34; alt=&#34;ManageEngine MDM Plus Certificates&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click on the &amp;ldquo;CA Severs&amp;rdquo; tab at the top.&lt;/li&gt;&#xA;&lt;li&gt;Click on the &amp;ldquo;Add CA Server&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/manageengine-mdm-plus-add-ca-server.png&#34; alt=&#34;ManageEngine MDM Plus Add CA Server&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select the &amp;ldquo;Generic SCEP&amp;rdquo; option.&lt;/li&gt;&#xA;&lt;li&gt;Enter a CA Name (this is just so you identify it under ManageEngine MDM Plus).&lt;/li&gt;&#xA;&lt;li&gt;Go Back to your EZCA tab, in the CAs list, and click &amp;ldquo;View Requirements&amp;rdquo; for the CA you want to connect to ManageEngine MDM Plus.&lt;/li&gt;&#xA;&lt;li&gt;Ensure &amp;ldquo;Enable SCEP Static Challenge&amp;rdquo; is checked. If not, Check the option and click &amp;ldquo;Save Changes&amp;rdquo; on the top right.&lt;/li&gt;&#xA;&lt;li&gt;Now you will copy the Static Challenge SCEP URL&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/enable-scep-static-challenge-for-Manage-engine.png&#34; alt=&#34;Enable SCEP Static Challenge&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Go back to your ManageEngine MDM Plus tab, and paste the URL in the &amp;ldquo;SCEP Server URL&amp;rdquo; field.&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Add Certificate Link&amp;rdquo;&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/manageengine-add-certificate.png&#34; alt=&#34;Past SCEP Certificate Authority URL in Manage Engine MDM Plus&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select your SCEP CA certificate from your computer.&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Add Certificate Button&amp;rdquo;&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Save&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/save-ca-manageengine-mdm.png&#34; alt=&#34;Past SCEP Certificate Authority URL in Manage Engine MDM Plus&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Enter a Certificate Template Name (this is for reference in the ManageEngine MDM Plus portal).&lt;/li&gt;&#xA;&lt;li&gt;Enter the Subject Name (this is the name of the certificate that will be issued to the device). You can do dynamic names based on the user requesting them with their keywords for example &lt;code&gt;CN=%USERNAME%&lt;/code&gt; will issue the certificate with the username of the user requesting the certificate.&lt;/li&gt;&#xA;&lt;li&gt;If your infrastructure requires, add the settings for Subject Alternative Name (SAN) of the certificate, this field is also commonly used for certificate authentication.&lt;/li&gt;&#xA;&lt;li&gt;Enter the maximum number of attempts for a failed request and how long to wait between failed attempts.&lt;/li&gt;&#xA;&lt;li&gt;In Challenge Type, select &amp;ldquo;Static&amp;rdquo;.&lt;/li&gt;&#xA;&lt;li&gt;Go Back to the EZCA Tab, and copy the &amp;ldquo;SCEP Challenge&amp;rdquo;.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/get-scep-challenge.png&#34; alt=&#34;Get SCEP Certificate Authority Challenge from EZCA Manage Engine MDM Plus&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Paste the SCEP Challenge in the &amp;ldquo;SCEP Challenge&amp;rdquo; field in ManageEngine MDM Plus.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/manageengine-scep-challenge.png&#34; alt=&#34;Paste SCEP Challenge in Manage Engine MDM Plus for automated certificate issuance&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Set the Key Size to 2048.&lt;/li&gt;&#xA;&lt;li&gt;Select what you want your users to use the Key for (Digital Signature and/or Key Encipherment).&lt;/li&gt;&#xA;&lt;li&gt;Set the Certificates to Automatically Renew.&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Save&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/save-scep-certificate-authority.png&#34; alt=&#34;Save SCEP Certificate Authority in Manage Engine MDM Plus&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;If you also have a root certificate, Go to the Certificates Tab and Also add that certificate.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;how-to-create-your-manage-engine-mdm-plus-profile&#34;&gt;How To Create Your Manage Engine MDM Plus Profile&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-your-manage-engine-mdm-plus-profile&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;In the ManageEngine MDM Plus portal, click on the &amp;ldquo;Profiles&amp;rdquo; menu on the left.&lt;/li&gt;&#xA;&lt;li&gt;Click &amp;ldquo;Create Profile&amp;rdquo; and select your desired platform.&lt;/li&gt;&#xA;&lt;li&gt;Enter a name for the profile.&lt;/li&gt;&#xA;&lt;li&gt;Click Continue.&lt;/li&gt;&#xA;&lt;li&gt;On the Left Menu, click on &amp;ldquo;SCEP&amp;rdquo;.&lt;/li&gt;&#xA;&lt;li&gt;Select your SCEP template we created above.&lt;/li&gt;&#xA;&lt;li&gt;Click &amp;ldquo;Save&amp;rdquo;.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/manageengine-select-scep-profile.png&#34; alt=&#34;Select SCEP profile in ManageEngine MDM Plus&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;On the left menu, click on &amp;ldquo;Certificate&amp;rdquo;.&lt;/li&gt;&#xA;&lt;li&gt;Select the SCEP certificate we created above.&lt;/li&gt;&#xA;&lt;li&gt;Click &amp;ldquo;Save&amp;rdquo;.&lt;/li&gt;&#xA;&lt;li&gt;Add any other settings you might want to add to this profile, and then click publish.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/manageengine-select-scep-certificate.png&#34; alt=&#34;Select SCEP certificate in ManageEngine MDM Plus&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;If you also have a Root CA, create another profile to push that certificate to the certificate root store of your computer.&lt;/li&gt;&#xA;&lt;li&gt;Now you can assign this profile to your devices.&lt;/li&gt;&#xA;&lt;li&gt;Assign it to your first device and verify that your certificate was issued.&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>How To: Create EST Certificates for Azure IoT Hub</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/how-to-create-est-certificates/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/how-to-create-est-certificates/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/&#34;&gt;(PKI Admin) Created a Subordinate CA in Azure (SSL Template)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;overview---how-to-authenticate-with-certificates-to-azure-iot-hub&#34;&gt;Overview - How to Authenticate with Certificates to Azure IoT Hub&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---how-to-authenticate-with-certificates-to-azure-iot-hub&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;X509 Certificates are the most secure way for IoT devices to authenticate with Azure IoT Hub. In this tutorial, we will show you how to create an Certificate Authority in Azure using EZCA and connect your IoT devices to Azure IoT Hub in a secure and compliant way. Once the bootstrap certificate is created, we must think about the renewal process. EZCA has multiple ways to achieve this, one is using our &lt;a href=&#34;https://github.com/markeytos/EZCAClient&#34;&gt;EZCA Nuget Packet with Code Samples&lt;/a&gt;, you can see the documentation for that and code samples &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/certificate-based-authentication/&#34;&gt;here&lt;/a&gt;. Another way is using &lt;a href=&#34;https://tools.ietf.org/html/rfc7030&#34;&gt;EST (Enrollment over Secure Transport)&lt;/a&gt; to renew the certificates. In this tutorial, we will show you how to create a certificate using EST and connect it to Azure IoT Hub.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Manage an EZSSH Subscription</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/manage-ezssh-subscription/</link>
      <pubDate>Tue, 03 Mar 2026 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/manage-ezssh-subscription/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---what-is-an-ezssh-subscription&#34;&gt;Introduction - What is an EZSSH Subscription?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---what-is-an-ezssh-subscription&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;An EZSSH subscription is a way to manage billing, configuration, and access for your EZSSH instance. When you sign up for EZSSH, you will be asked to create a subscription either directly through the EZSSH portal or through Azure. Once created, the subscription will be the central place to manage your EZSSH instance. You can have multiple subscriptions if you want to separate different teams or projects.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Distribute the EZCMS Application to Your Users via Microsoft Intune</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-distribute-ezcms/how-to-distribute-ezcms-via-intune/</link>
      <pubDate>Wed, 08 Apr 2026 07:30:00 -0700</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/administrator/how-to-distribute-ezcms/how-to-distribute-ezcms-via-intune/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---distributing-the-ezcms-application-via-microsoft-intune&#34;&gt;Introduction - Distributing the EZCMS Application via Microsoft Intune&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---distributing-the-ezcms-application-via-microsoft-intune&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Due to your organization&amp;rsquo;s endpoints and configuration being build directly into the EZCMS application binary, it cannot be distributed through centralized app stores and must be distributed directly to your users. If you want your users to have a seamless experience where the EZCMS application is automatically installed on their devices without needing to manually download and install it, you can use a Mobile Device Management (MDM) solution like Microsoft Intune to distribute the EZCMS application to their devices.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Register EZCA Intune App</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/register-keytos-intune-app/</link>
      <pubDate>Wed, 01 Apr 2026 14:00:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/register-keytos-intune-app/</guid>
      <description>&lt;h2 data-toc-text=&#34;Register Keytos Intune Application&#34; id=&#34;how-to-register-the-keytos-intune-application-for-ezca&#34;&gt;How to Register the Keytos Intune Application for EZCA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-register-the-keytos-intune-application-for-ezca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If you will be using EZCA with Microsoft Intune to issue SCEP certificates you will need to register the Keytos Intune Application in your tenant. This allows EZCA to connect to Intune and issue certificates for your Intune-managed devices.&lt;/p&gt;&#xA;&lt;div class=&#34;alert alert-info&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Keytos Client vs Keytos Intune&lt;/div&gt;&#xA;&lt;p&gt;Make sure you&amp;rsquo;ve consented both the &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;&lt;strong&gt;Keytos Client&lt;/strong&gt;&lt;/a&gt; and the &lt;strong&gt;Keytos Intune&lt;/strong&gt; applications in your tenant. The Keytos Client application allows you to use the full functionality of the EZCA portal, while the Keytos Intune application allows EZCA to issue and manage certificates for your Intune-managed devices.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create a SCEP CA with EZCA Cloud PKI</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-create-a-scep-ca/</link>
      <pubDate>Wed, 01 Apr 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-create-a-scep-ca/</guid>
      <description>&lt;h2 data-toc-text=&#34;Prerequisites&#34; id=&#34;prerequisites-for-creating-a-scep-ca-in-azure&#34;&gt;Prerequisites for Creating a SCEP CA in Azure&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites-for-creating-a-scep-ca-in-azure&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;You have registered the Keytos Entra ID applications&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;You have created an EZCA subscription&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;If you plan to use Intune, you have &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/register-keytos-intune-app/&#34;&gt;registered the Intune application&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&#xA;&#xA;&#xA;&#xA;&lt;h2 data-toc-text=&#34;Video Tutorial&#34; id=&#34;how-to-create-a-scep-ca-in-ezca-cloud-pki---video-tutorial&#34;&gt;How To Create a SCEP CA in EZCA Cloud PKI - Video Tutorial&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-a-scep-ca-in-ezca-cloud-pki---video-tutorial&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Want to follow along with our video tutorial? Check out our video tutorial below where we walk you through how to create a SCEP CA in EZCA:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To Register the EZCA App in your Azure Tenant</title>
      <link>https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/</guid>
      <description>&lt;h2 id=&#34;how-to-register-the-keytos-applications-for-ezca&#34;&gt;How to Register the Keytos Applications for EZCA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-register-the-keytos-applications-for-ezca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZCA uses two Entra ID Applications to authenticate you to our services. To register the Keytos applications in your tenant, use your Global Administrator account and follow these steps:&lt;/p&gt;&#xA;&#xA;&#xA;&#xA;&lt;ul class=&#34;nav nav-tabs&#34; id=&#34;tabs-register-ezca-app&#34; role=&#34;tablist&#34;&gt;&#xA;  &lt;li class=&#34;nav-item&#34;&gt;&#xA;      &lt;button class=&#34;nav-link active&#34;&#xA;          id=&#34;tabs-register-ezca-app-00-tab&#34; data-bs-toggle=&#34;tab&#34; data-bs-target=&#34;#tabs-register-ezca-app-00&#34; role=&#34;tab&#34;&#xA;          data-td-tp-persist=&#34;single click&#34; aria-controls=&#34;tabs-register-ezca-app-00&#34; aria-selected=&#34;true&#34;&gt;&#xA;        Single Click&#xA;      &lt;/button&gt;&#xA;    &lt;/li&gt;&lt;li class=&#34;nav-item&#34;&gt;&#xA;      &lt;button class=&#34;nav-link&#34;&#xA;          id=&#34;tabs-register-ezca-app-01-tab&#34; data-bs-toggle=&#34;tab&#34; data-bs-target=&#34;#tabs-register-ezca-app-01&#34; role=&#34;tab&#34;&#xA;          data-td-tp-persist=&#34;manual url&#34; aria-controls=&#34;tabs-register-ezca-app-01&#34; aria-selected=&#34;false&#34;&gt;&#xA;        Manual URL&#xA;      &lt;/button&gt;&#xA;    &lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&#xA;&lt;div class=&#34;tab-content&#34; id=&#34;tabs-register-ezca-app-content&#34;&gt;&#xA;    &lt;div class=&#34;tab-body tab-pane fade show active&#34;&#xA;        id=&#34;tabs-register-ezca-app-00&#34; role=&#34;tabpanel&#34; aria-labelled-by=&#34;tabs-register-ezca-app-00-tab&#34; tabindex=&#34;register-ezca-app&#34;&gt;&#xA;        &#xA;&lt;p&gt;The easiest way to register the applications is to click the button below while logged in with your Global Administrator account:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create a New Certificate in a Browser</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/create-new-certificate/how-to-create-certificate-in-browser/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/create-new-certificate/how-to-create-certificate-in-browser/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/registering-a-domain/&#34;&gt;Register Domain&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZCA allows users to securely create a certificate in the browser by locally generating a private key in the browser and then requesting a certificate, following the PKI best practices of the private key never leaving the client&amp;rsquo;s computer.&lt;/p&gt;&#xA;&lt;h2 id=&#34;how-to-create-a-certificate-in-browser-with-ezca&#34;&gt;How to Create a Certificate in Browser with EZCA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-a-certificate-in-browser-with-ezca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Navigate to &lt;a href=&#34;https://portal.ezca.io/&#34;&gt;https://portal.ezca.io/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Navigate to Domains.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/DomainsMenu.png&#34; alt=&#34;EZCA Cloud PKI portal My Domains page listing registered domains with Request Certificate buttons&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Enable Self-Service user management for Cloud RADIUS with Entra ID in EZRADIUS</title>
      <link>https://www.keytos.io/docs/cloud-radius/how-to-configure-local-radius-users/self-service-user-management/enable-self-service-user-management/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/how-to-configure-local-radius-users/self-service-user-management/enable-self-service-user-management/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/how-to-create-radius-service-in-azure/&#34;&gt;Creating Cloud Radius Instance&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/managing-subscription/&#34;&gt;Being a Subscription Owner or Network Administrator&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;how-to-enable-self-service-user-management-in-ezradius&#34;&gt;How to Enable Self Service User Management in EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-self-service-user-management-in-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;While we recommend using EAP-TLS for your RADIUS users, we understand that some devices might not support this protocol and you might have to fall back to passwords. If possible, we recommend using EAP-TTLs which can use your user passwords from Entra ID. However, if your networking gear (such as &lt;a href=&#34;https://documentation.meraki.com/MX/Client_VPN/Configuring_RADIUS_Authentication_with_Client_VPN_IPsec&#34;&gt;Meraki VPN&lt;/a&gt;) require other authentication methods such as &lt;a href=&#34;https://datatracker.ietf.org/doc/html/draft-kamath-pppext-eap-mschapv2&#34;&gt;PEAP-MSCHAPv2&lt;/a&gt; or &lt;a href=&#34;https://en.wikipedia.org/wiki/Password_Authentication_Protocol&#34;&gt;PAP&lt;/a&gt;, then you must use RADIUS local users, in this page we will guide you on how to setup self service user management for your users, allowing your users to manage their own passwords without help from your IT desk.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your EZMonitor SSL Monitoring Logs to Azure Log Analytics and Azure Sentinel</title>
      <link>https://www.keytos.io/docs/ssl-monitoring/getting-started/connecting_siem/export-logs-to-azure-sentinel/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/ssl-monitoring/getting-started/connecting_siem/export-logs-to-azure-sentinel/</guid>
      <description>&lt;div class=&#34;alert alert-info&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Do I Need Azure Sentinel?&lt;/div&gt;&#xA;&lt;p&gt;This guide applies to both Azure Log Analytics and Azure Sentinel since Sentinel is built on top of Log Analytics. Azure Sentinel is not required if you only want to collect and analyze logs, but it provides additional security features if you choose to use it.&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;You have an active EZCA plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;You are an &lt;strong&gt;Owner&lt;/strong&gt; or &lt;strong&gt;User Access Administrator&lt;/strong&gt; on the Resource Group containing your Log Analytics workspace.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;how-to-grant-log-contributor-permissions-to-the-ezmonitor-application-in-azure&#34;&gt;How to Grant Log Contributor Permissions to the EZMonitor Application in Azure&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-grant-log-contributor-permissions-to-the-ezmonitor-application-in-azure&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;!--&#xA;Parameters:&#xA;  - EZMonitor: The name of the Keytos product (e.g., EZRADIUS)&#xA;  - Keytos: The name of the Entra ID application to grant permission to (e.g., Keytos, EZRADIUS)&#xA;  - 68554b48-233f-42b4-9aa7-2eadca4d7727: The Application (client) ID of the Entra ID application (e.g., 5c0e7b30-d0aa-456a-befb-df8c75e8467b)&#xA;  - keytos: The part of filepaths to images specific to the product (e.g., ezca, ezradius)&#xA;---&gt;&#xA;&lt;p&gt;To allow EZMonitor to send logs to your Log Analytics and Azure Sentinel workspace, you need to grant the Keytos application the following roles on the Resource Group containing your Log Analytics workspace:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your RADIUS Logs to Azure Log Analytics and Azure Sentinel</title>
      <link>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/connect-cloud-radius-to-siem/export-logs-to-azure-sentinel/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/connect-cloud-radius-to-siem/export-logs-to-azure-sentinel/</guid>
      <description>&lt;div class=&#34;alert alert-info&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Do I Need Azure Sentinel?&lt;/div&gt;&#xA;&lt;p&gt;This guide applies to both Azure Log Analytics and Azure Sentinel since Sentinel is built on top of Log Analytics. Azure Sentinel is not required if you only want to collect and analyze logs, but it provides additional security features if you choose to use it.&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos and EZRADIUS Entra ID applications are registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/&#34;&gt;You have an active EZRADIUS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;how-to-grant-log-contributor-permissions-to-the-ezradius-application-in-azure&#34;&gt;How to Grant Log Contributor Permissions to the EZRADIUS Application in Azure&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-grant-log-contributor-permissions-to-the-ezradius-application-in-azure&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;!--&#xA;Parameters:&#xA;  - EZRADIUS: The name of the Keytos product (e.g., EZRADIUS)&#xA;  - EZRADIUS: The name of the Entra ID application to grant permission to (e.g., Keytos, EZRADIUS)&#xA;  - 5c0e7b30-d0aa-456a-befb-df8c75e8467b: The Application (client) ID of the Entra ID application (e.g., 5c0e7b30-d0aa-456a-befb-df8c75e8467b)&#xA;  - ezradius: The part of filepaths to images specific to the product (e.g., ezca, ezradius)&#xA;---&gt;&#xA;&lt;p&gt;To allow EZRADIUS to send logs to your Log Analytics and Azure Sentinel workspace, you need to grant the EZRADIUS application the following roles on the Resource Group containing your Log Analytics workspace:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Enable Cloud RADIUS with Entra ID Authentication in Fortinet FortiOS</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-network/how-to-setup-cloud-radius-for-fortinet/</link>
      <pubDate>Thu, 12 Mar 2026 01:22:09 -0800</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-network/how-to-setup-cloud-radius-for-fortinet/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Fortinet provides documentation on how to set up RADIUS &lt;a href=&#34;https://docs.fortinet.com/document/fortigate/7.6.4/administration-guide/759080/configuring-a-radius-server&#34;&gt;on their website&lt;/a&gt;, which you can refer to for additional CLI commands and configuration options. This guide provides a basic overview of the steps involved in setting up RADIUS authentication with Fortinet devices.&lt;/p&gt;&lt;/blockquote&gt;&#xA;&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---how-to-protect-your-fortigate-network-with-cloud-radius&#34;&gt;Introduction - How to Protect Your Fortigate Network with Cloud RADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-protect-your-fortigate-network-with-cloud-radius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;p&gt;Having a single Wi-Fi password for your network is a security nightmare. It&amp;rsquo;s impossible to know who has access to your network, and it&amp;rsquo;s nearly impossible to change the password regularly without causing major outages. The best way to secure your Fortigate network is to use WPA-Enterprise with either certificates or individual user accounts for authentication.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Manage EZCA Resources with the EZCA Portal</title>
      <link>https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-portal/</link>
      <pubDate>Tue, 03 Mar 2026 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-portal/</guid>
      <description>&lt;h2 id=&#34;introduction-to-the-ezca-portal&#34;&gt;Introduction to the EZCA Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction-to-the-ezca-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The EZCA Portal is the primary way to manage your EZCA resources. It provides a user-friendly interface to manage your certificate authorities, domains, and certificates.&lt;/p&gt;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;img src=&#34;https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-portal/ezca-portal.png&#34; width=&#34;900px&#34; alt=&#34;EZCA Portal&#34;&gt;&#xA;&#xA;&#xA;&lt;h2 id=&#34;how-to-manage-your-ezca-resources-with-the-ezca-portal&#34;&gt;How To Manage Your EZCA Resources with the EZCA Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-manage-your-ezca-resources-with-the-ezca-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Throughout the EZCA documentation we primarily reference the EZCA Portal as the main way to manage your EZCA resources. When following along with the documentation, the portal will commonly be used to manage your EZCA resources. Refer to the specific guides in the documentation for more information on how to use the portal to manage your EZCA resources effectively.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Enable Cloud RADIUS with Entra ID Authentication in Ubiquiti Unifi</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-network/how-to-setup-cloud-radius-for-ubiquiti-unifi/</link>
      <pubDate>Fri, 06 Feb 2026 01:10:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-network/how-to-setup-cloud-radius-for-ubiquiti-unifi/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---how-to-protect-your-ubiquiti-unifi-network-with-cloud-radius&#34;&gt;Introduction - How to Protect Your Ubiquiti Unifi Network with Cloud RADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-protect-your-ubiquiti-unifi-network-with-cloud-radius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;p&gt;Having a single Wi-Fi password for your network is a security nightmare. It&amp;rsquo;s impossible to know who has access to your network, and it&amp;rsquo;s nearly impossible to change the password regularly without causing major outages. The best way to secure your Ubiquiti Unifi network is to use WPA-Enterprise with either certificates or individual user accounts for authentication.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How To Set Up 802.1X Network Authentication on Windows</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/in-device/how-to-setup-radius-authentication-windows/</link>
      <pubDate>Thu, 29 Jan 2026 12:00:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/in-device/how-to-setup-radius-authentication-windows/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: While you can manually configure your Windows device to connect to an enterprise 802.1X network, we highly recommend using a &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/&#34;&gt;Mobile Device Management (MDM)&lt;/a&gt; solution like Microsoft Intune to push the necessary network profiles and certificates to your devices. This ensures that all devices are consistently configured and reduces the risk of misconfiguration.&lt;/p&gt;&lt;/blockquote&gt;&#xA;&lt;h2 id=&#34;what-is-8021x-network-authentication&#34;&gt;What is 802.1X Network Authentication?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-is-8021x-network-authentication&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;p&gt;At home, you probably just plug your computer into an ethernet cable or connect to a Wi-Fi network using a single password. It&amp;rsquo;s easy and convenient because at home you (&lt;em&gt;usually&lt;/em&gt;) trust everyone who can connect to your network. However, in an enterprise environment, you want to make sure that only authorized users and devices can connect to your network. This is where 802.1X network authentication comes in. 802.1X is a network protocol that provides an authentication mechanism to devices wishing to attach to a LAN or WLAN. It is commonly used in enterprise networks to provide secure access to network resources.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Sign Into Entra ID Using Your Passwordless Security Key</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/how-to-configure-passwordless-clients/how-to-setup-entra-id-sign-in/</link>
      <pubDate>Fri, 23 Jan 2026 08:30:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/how-to-configure-passwordless-clients/how-to-setup-entra-id-sign-in/</guid>
      <description>&lt;h2 id=&#34;how-to-enable-fido2-passkey-sign-in-in-entra-id&#34;&gt;How to Enable FIDO2 Passkey Sign-In in Entra ID&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-fido2-passkey-sign-in-in-entra-id&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;To allow your users to sign into Entra ID using FIDO2 security keys (passkeys), you need to enable the FIDO2 authentication method in the Entra ID Admin Center. Follow these steps:&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Navigate to the &lt;a href=&#34;https://entra.microsoft.com/&#34;&gt;Entra ID Admin Center&lt;/a&gt; and log in with your Global/Entra Administrator account.&lt;/p&gt;&#xA;&#xA;    &#xA;    &#xA;    &#xA;    &#xA;    &#xA;    &#xA;      &lt;img src=&#34;https://www.keytos.io/docs/passwordless-onboarding/how-to-configure-passwordless-clients/how-to-setup-entra-id-sign-in/entra-authentication-methods.png&#34; width=&#34;1000px&#34; alt=&#34;Entra ID Admin Center Authentication Methods Settings&#34;&gt;&#xA;    &#xA;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Under &lt;strong&gt;Authentication method policies&lt;/strong&gt;, select &lt;strong&gt;Passkey (FIDO2)&lt;/strong&gt;.&lt;/p&gt;&#xA;&#xA;    &#xA;    &#xA;    &#xA;    &#xA;    &#xA;    &#xA;      &lt;img src=&#34;https://www.keytos.io/docs/passwordless-onboarding/how-to-configure-passwordless-clients/how-to-setup-entra-id-sign-in/entra-fido2.png&#34; width=&#34;1000px&#34; alt=&#34;Entra ID FIDO2 Policy&#34;&gt;&#xA;    &#xA;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Ensure that &lt;strong&gt;Enable&lt;/strong&gt; is enabled.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Enable Cloud RADIUS with Entra ID Authentication in Cisco Meraki</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-network/how-to-setup-cloud-radius-for-cisco-meraki/</link>
      <pubDate>Wed, 14 Jan 2026 01:22:09 -0800</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-network/how-to-setup-cloud-radius-for-cisco-meraki/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---how-to-protect-your-cisco-meraki-network-with-cloud-radius&#34;&gt;Introduction - How to Protect Your Cisco Meraki Network with Cloud RADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-protect-your-cisco-meraki-network-with-cloud-radius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;p&gt;Having a single Wi-Fi password for your network is a security nightmare. It&amp;rsquo;s impossible to know who has access to your network, and it&amp;rsquo;s nearly impossible to change the password regularly without causing major outages. The best way to secure your Cisco Meraki network is to use WPA-Enterprise with either certificates or individual user accounts for authentication.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Enable Cloud RADIUS with Entra ID Authentication in Ruckus Unleashed</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-network/how-to-setup-cloud-radius-for-ruckus/</link>
      <pubDate>Wed, 14 Jan 2026 01:22:09 -0800</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-network/how-to-setup-cloud-radius-for-ruckus/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;Ruckus APs can operate in Unleashed mode or in controller-based mode. This guide focuses on Ruckus Unleashed, which is Ruckus&amp;rsquo;s controller-less WiFi solution for small to medium-sized businesses. For more information on setting up RADIUS with Ruckus in controller-based mode, refer to Ruckus&amp;rsquo;s official documentation such as the &lt;a href=&#34;https://support.ruckuswireless.com/documents/1337-configuring-smartzone-and-radius&#34;&gt;SmartZone docs&lt;/a&gt; or &lt;a href=&#34;https://support.ruckuswireless.com/documents/1446-configuring-ruckus-cloud-and-radius&#34;&gt;Ruckus cloud docs&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;&#xA;&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---how-to-protect-your-ruckus-unleashed-network-with-cloud-radius&#34;&gt;Introduction - How to Protect Your Ruckus Unleashed Network with Cloud RADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-protect-your-ruckus-unleashed-network-with-cloud-radius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;p&gt;Having a single Wi-Fi password for your network is a security nightmare. It&amp;rsquo;s impossible to know who has access to your network, and it&amp;rsquo;s nearly impossible to change the password regularly without causing major outages. The best way to secure your Ruckus Unleashed network is to use WPA-Enterprise with either certificates or individual user accounts for authentication.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Enable Cloud RADIUS with Entra ID Authentication in TP-Link Omada</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-network/how-to-setup-tp-link-omada-radius-for-entra-id/</link>
      <pubDate>Wed, 14 Jan 2026 01:22:09 -0800</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-network/how-to-setup-tp-link-omada-radius-for-entra-id/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---how-to-protect-your-tp-link-omada-network-with-cloud-radius&#34;&gt;Introduction - How to Protect Your TP-Link Omada Network with Cloud RADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-protect-your-tp-link-omada-network-with-cloud-radius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;p&gt;Having a single Wi-Fi password for your network is a security nightmare. It&amp;rsquo;s impossible to know who has access to your network, and it&amp;rsquo;s nearly impossible to change the password regularly without causing major outages. The best way to secure your TP-Link Omada network is to use WPA-Enterprise with either certificates or individual user accounts for authentication.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your EZCA Cloud PKI Logs to Azure Log Analytics and Azure Sentinel</title>
      <link>https://www.keytos.io/docs/azure-pki/getting-started/connecting_siem/export-logs-to-azure-sentinel/</link>
      <pubDate>Fri, 19 Dec 2025 11:22:09 -0800</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/getting-started/connecting_siem/export-logs-to-azure-sentinel/</guid>
      <description>&lt;div class=&#34;alert alert-info&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Do I Need Azure Sentinel?&lt;/div&gt;&#xA;&lt;p&gt;This guide applies to both Azure Log Analytics and Azure Sentinel since Sentinel is built on top of Log Analytics. Azure Sentinel is not required if you only want to collect and analyze logs, but it provides additional security features if you choose to use it.&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;You have an active EZCA plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;You are an &lt;strong&gt;Owner&lt;/strong&gt; or &lt;strong&gt;User Access Administrator&lt;/strong&gt; on the Resource Group containing your Log Analytics workspace.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;how-to-grant-log-contributor-permissions-to-the-ezca-application-in-azure&#34;&gt;How to Grant Log Contributor Permissions to the EZCA Application in Azure&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-grant-log-contributor-permissions-to-the-ezca-application-in-azure&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;!--&#xA;Parameters:&#xA;  - EZCA: The name of the Keytos product (e.g., EZRADIUS)&#xA;  - Keytos: The name of the Entra ID application to grant permission to (e.g., Keytos, EZRADIUS)&#xA;  - 68554b48-233f-42b4-9aa7-2eadca4d7727: The Application (client) ID of the Entra ID application (e.g., 5c0e7b30-d0aa-456a-befb-df8c75e8467b)&#xA;  - keytos: The part of filepaths to images specific to the product (e.g., ezca, ezradius)&#xA;---&gt;&#xA;&lt;p&gt;To allow EZCA to send logs to your Log Analytics and Azure Sentinel workspace, you need to grant the Keytos application the following roles on the Resource Group containing your Log Analytics workspace:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your EZCMS Logs to Azure Log Analytics and Azure Sentinel</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/getting-started/export-ezcms-audit-logs-to-siem/export-logs-to-azure-sentinel/</link>
      <pubDate>Fri, 19 Dec 2025 11:22:09 -0800</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/getting-started/export-ezcms-audit-logs-to-siem/export-logs-to-azure-sentinel/</guid>
      <description>&lt;div class=&#34;alert alert-info&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Do I Need Azure Sentinel?&lt;/div&gt;&#xA;&lt;p&gt;This guide applies to both Azure Log Analytics and Azure Sentinel since Sentinel is built on top of Log Analytics. Azure Sentinel is not required if you only want to collect and analyze logs, but it provides additional security features if you choose to use it.&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;You have an active EZCMS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;You are an &lt;strong&gt;Owner&lt;/strong&gt; or &lt;strong&gt;User Access Administrator&lt;/strong&gt; on the Resource Group containing your Log Analytics workspace.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 data-toc-text=&#34;Grant Permissions in Azure&#34; id=&#34;how-to-grant-log-contributor-permissions-to-the-ezcms-application-in-azure&#34;&gt;How to Grant Log Contributor Permissions to the EZCMS Application in Azure&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-grant-log-contributor-permissions-to-the-ezcms-application-in-azure&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;!--&#xA;Parameters:&#xA;  - EZCMS: The name of the Keytos product (e.g., EZRADIUS)&#xA;  - Keytos: The name of the Entra ID application to grant permission to (e.g., Keytos, EZRADIUS)&#xA;  - 68554b48-233f-42b4-9aa7-2eadca4d7727: The Application (client) ID of the Entra ID application (e.g., 5c0e7b30-d0aa-456a-befb-df8c75e8467b)&#xA;  - keytos: The part of filepaths to images specific to the product (e.g., ezca, ezradius)&#xA;---&gt;&#xA;&lt;p&gt;To allow EZCMS to send logs to your Log Analytics and Azure Sentinel workspace, you need to grant the Keytos application the following roles on the Resource Group containing your Log Analytics workspace:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Restore Access to an Orphaned Domain</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/registering-a-domain/restore-access-to-orphaned-domain/</link>
      <pubDate>Tue, 11 Nov 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/registering-a-domain/restore-access-to-orphaned-domain/</guid>
      <description>&lt;p&gt;If a domain owner leaves your organization without transferring domain ownership, the domain becomes orphaned. An orphaned domain means that no current user or group has ownership rights to manage the domain in EZCA, which can prevent certificate requests and management for that domain.&lt;/p&gt;&#xA;&lt;h2 id=&#34;how-to-restore-access-to-an-orphaned-domain-in-ezca&#34;&gt;How to Restore Access to an Orphaned Domain in EZCA&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-restore-access-to-an-orphaned-domain-in-ezca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;To restore access to an orphaned domain, you will need to have a PKI administrator for the Certificate Authority (CA) associated with the orphaned domain delete and re-register the domain with new owners. Follow these steps:&lt;/p&gt;</description>
    </item>
    <item>
      <title>What is RADIUS and How Does it Work?</title>
      <link>https://www.keytos.io/docs/cloud-radius/radius-authentication-concepts/what-is-radius-and-how-does-it-work/</link>
      <pubDate>Mon, 03 Nov 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/radius-authentication-concepts/what-is-radius-and-how-does-it-work/</guid>
      <description>&lt;h2 id=&#34;the-basics-of-radius&#34;&gt;The Basics of RADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#the-basics-of-radius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;RADIUS (Remote Authentication Dial-In User Service) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service. Let&amp;rsquo;s break down what the &amp;ldquo;three A&amp;rsquo;s&amp;rdquo; mean:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Authentication&lt;/strong&gt;: This is the process of verifying the identity of a user or device trying to access the network. RADIUS checks the credentials (&lt;em&gt;like username and password or a certificate&lt;/em&gt;) against a database or certificate authority to ensure they are valid.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Authorization&lt;/strong&gt;: Once a user is authenticated, RADIUS determines what resources or services the user is allowed to access. This could include specific network segments, bandwidth limits, or time-of-day restrictions.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Accounting&lt;/strong&gt;: RADIUS keeps track of the user&amp;rsquo;s activity on the network. This includes logging session start and stop times, data usage, and any other relevant information for billing or auditing purposes.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;what-is-radius-used-for&#34;&gt;What is RADIUS Used For?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-is-radius-used-for&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;One of the most popular use cases for RADIUS is in enterprise Wi-Fi networks. If you&amp;rsquo;ve ever logged into a secure Wi-Fi network at work or school, chances are RADIUS was involved in verifying your credentials and granting you access. Sometimes you may not even need to enter a password, as RADIUS can work with certificates installed on your device for seamless authentication. Ever wonder how your work or school laptop connects automatically to the Wi-Fi without prompting for a password? That&amp;rsquo;s likely RADIUS at work, using certificate-based authentication.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create an Intune SCEP Certificate Authority with EZCA Cloud PKI</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-scep-ca/</link>
      <pubDate>Wed, 01 Apr 2026 14:00:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-scep-ca/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---how-to-create-an-intune-scep-certificate-authority-ca&#34;&gt;Introduction - How to Create an Intune SCEP Certificate Authority (CA)&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-create-an-intune-scep-certificate-authority-ca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Are you looking for a simple and scalable way to issue certificates to your Intune managed devices? In this guide, we will show you how to create a SCEP CA for Microsoft Intune using EZCA, a cloud-based PKI platform that allows you to easily manage your certificate authorities and issuance. With EZCA, you can create a SCEP CA in minutes and start issuing certificates to your Intune devices without the hassle of setting up and maintaining your own on-premises PKI infrastructure. Whether you are new to PKI or an experienced administrator, this guide will provide you with the steps and best practices to get started with Intune SCEP CA in Azure.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Install SCEP Certificate in Linux</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/how-to-manually-issue-scep-certificates/how-to-install-scep-certificate-in-linux/</link>
      <pubDate>Wed, 01 Apr 2026 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/how-to-manually-issue-scep-certificates/how-to-install-scep-certificate-in-linux/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---how-to-install-scep-certificates-in-linux&#34;&gt;Introduction - How to Install SCEP Certificates in Linux&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-install-scep-certificates-in-linux&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;In this page we will guide you on how to install a X509 certificate with EZCA SCEP in Linux with our script with a password-protected private key.&lt;/p&gt;&#xA;&lt;h2 data-toc-text=&#34;Prerequisites&#34; id=&#34;prerequisites-for-installing-scep-certificates-in-linux&#34;&gt;Prerequisites for Installing SCEP Certificates in Linux&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites-for-installing-scep-certificates-in-linux&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Before you begin, make sure you have the following prerequisites in place:&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;You have created an &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/create-intune-scep-ca/&#34;&gt;Intune SCEP CA&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;li&gt;You have registered the &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/register-keytos-intune-app/&#34;&gt;Keytos Intune application&lt;/a&gt; in your Entra ID tenant.&lt;/li&gt;&#xA;&lt;li&gt;You are an Intune administrator with permissions to create configuration profiles in Intune.&lt;/li&gt;&#xA;&lt;li&gt;Make sure you have installed &lt;code&gt;coreutils&lt;/code&gt;, &lt;code&gt;curl&lt;/code&gt;, &lt;code&gt;head&lt;/code&gt;, and &lt;code&gt;openssl&lt;/code&gt; on your device.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 data-toc-text=&#34;Step By Step Guide&#34; id=&#34;how-to-manually-issue-scep-certificates-to-linux-devices---step-by-step-guide&#34;&gt;How To Manually Issue SCEP Certificates to Linux Devices - Step By Step Guide&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-manually-issue-scep-certificates-to-linux-devices---step-by-step-guide&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;In this section, you will first enable static SCEP challenge in your EZCA portal, then use a script to request and install SCEP certificates for Linux devices.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create an SSL Certificate in Windows, Mac, or Linux</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/create-new-certificate/how-to-create-a-certificate/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/create-new-certificate/how-to-create-a-certificate/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/registering-a-domain/&#34;&gt;Register Domain&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;This page guides you through how to create a certificate signing request (CSR) on your Windows, Mac, or Linux PC and sending it to EZCA to create a TLS Certificate.&lt;/p&gt;&#xA;&lt;h2 id=&#34;how-to-request-a-certificate&#34;&gt;How To Request a Certificate&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-request-a-certificate&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Navigate to &lt;a href=&#34;https://portal.ezca.io/&#34;&gt;https://portal.ezca.io/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Navigate to Domains.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/DomainsMenu.png&#34; alt=&#34;EZCA Cloud PKI portal My Domains page listing registered domains with Request Certificate buttons&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Request Certificate&amp;rdquo; button on the domain you want to request a certificate for.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/DomainsMenu2.png&#34; alt=&#34;EZCA Cloud PKI My Domains page with Request Certificate button highlighted for a domain&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;This will pre-populate the Subject Name and Subject Alternate Names with the selected domain.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/CreateCert1.png&#34; alt=&#34;EZCA Cloud PKI Request New Certificate form with pre-filled subject name and DNS names fields&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;If this certificate requires more subject alternate names (Usually for other domains that might use this certificate), add them in the DNS Names section.&lt;/li&gt;&#xA;&lt;li&gt;By Default, EZCA will request the certificate to be the maximum validity allowed by your administrators. If you want to decrease the lifetime of the certificate, adjust the validity slider.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/CreateCert2.png&#34; alt=&#34;EZCA Cloud PKI Request New Certificate form with validity period slider highlighted at 30 days&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Make sure the &amp;ldquo;Import CSR&amp;rdquo; Option is Selected.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/ImportCSR1.png&#34; alt=&#34;EZCA Cloud PKI certificate form with Certificate Location set to Import CSR highlighted&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;How to create a CSR Locally&amp;rdquo; Link.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/ImportCSR2.png&#34; alt=&#34;EZCA Cloud PKI How to create a CSR Locally link highlighted in the Import CSR section&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select your Operating System&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/ImportCSR3.png&#34; alt=&#34;EZCA Cloud PKI Create CSR Request dialog with Windows selected as the certificate location&#34;&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h3 id=&#34;how-to-create-csr-in-windows&#34;&gt;How To Create CSR in Windows&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-csr-in-windows&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Download the .inf file&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/ImportCSR4.png&#34; alt=&#34;EZCA Cloud PKI Create CSR Request dialog showing Download button for the Windows INF configuration file&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Enable MAC Address Bypass Cloud RADIUS with Entra ID in EZRADIUS</title>
      <link>https://www.keytos.io/docs/cloud-radius/how-to-configure-local-radius-users/how-to-enable-mac-address-bypass/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/how-to-configure-local-radius-users/how-to-enable-mac-address-bypass/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/how-to-create-radius-service-in-azure/&#34;&gt;Creating Cloud Radius Instance&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/managing-subscription/&#34;&gt;Being a Subscription Owner or Network Administrator&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;how-to-enable-wifi-mac-address-bypass-mab-in-radius---video-version&#34;&gt;How to Enable WiFi MAC Address Bypass (MAB) in RADIUS - Video Version&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-wifi-mac-address-bypass-mab-in-radius---video-version&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div class=&#34;video-medium&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/fojreG9C098?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;how-to-enable-mac-address-bypass-in-ezradius&#34;&gt;How to Enable MAC Address Bypass in EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-mac-address-bypass-in-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If you are using RADIUS authentication, you might have devices that do not support EAP-TLS or other secure authentication methods. In this case, you can use MAC Address Bypass to allow these devices to connect to your network without needing to authenticate. This is not recommended for most devices as it is not secure, but it can be useful for devices that do not support secure authentication methods. To enable MAC Address Bypass, follow these steps:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your Cloud PKI Logs to Splunk</title>
      <link>https://www.keytos.io/docs/azure-pki/getting-started/connecting_siem/export-logs-to-splunk/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/getting-started/connecting_siem/export-logs-to-splunk/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;You have an active EZCA plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;how-to-export-your-cloud-pki-audit-logs-to-splunk&#34;&gt;How To Export Your Cloud PKI Audit Logs To Splunk&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-cloud-pki-audit-logs-to-splunk&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to the &lt;a href=&#34;https://portal.ezca.io/&#34;&gt;EZCA Portal&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on Settings.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/settings.png&#34; alt=&#34;EZCA Cloud PKI Dashboard with Settings option highlighted in the navigation menu&#34;&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Expand your subscription&amp;rsquo;s advanced settings.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/SIEMEZCA1.png&#34; alt=&#34;EZCA Cloud PKI Settings page showing subscription settings with Advanced Settings section expand button highlighted&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your EZCMS Logs to Splunk</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/getting-started/export-ezcms-audit-logs-to-siem/export-logs-to-splunk/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/getting-started/export-ezcms-audit-logs-to-siem/export-logs-to-splunk/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;You have an active EZCMS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 data-toc-text=&#34;Export to Splunk&#34; id=&#34;how-to-export-your-passwordless-onboarding-audit-logs-to-splunk&#34;&gt;How to Export your Passwordless Onboarding Audit Logs to Splunk&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-passwordless-onboarding-audit-logs-to-splunk&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 data-toc-text=&#34;Enable Log Export in EZCMS&#34; id=&#34;how-to-enable-log-export-in-ezcms-portal&#34;&gt;How To Enable Log Export in EZCMS Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-log-export-in-ezcms-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to your EZCMS portal.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/dashboard-select-settings.png&#34; alt=&#34;EZCMS Passwordless Onboarding portal showing Settings option highlighted in the left navigation sidebar&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your EZMonitor SSL Monitoring Logs to Splunk</title>
      <link>https://www.keytos.io/docs/ssl-monitoring/getting-started/connecting_siem/export-logs-to-splunk/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/ssl-monitoring/getting-started/connecting_siem/export-logs-to-splunk/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/selecting-a-plan/&#34;&gt;You have an active EZMonitor plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;how-to-export-your-ezmonitor-ssl-monitoring-logs-to-splunk&#34;&gt;How To Export Your EZMonitor SSL Monitoring Logs To Splunk&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-ezmonitor-ssl-monitoring-logs-to-splunk&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Navigate to the &lt;a href=&#34;https://portal.ezmonitor.io/&#34;&gt;EZMonitor Portal&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on Settings.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/settings.png&#34; alt=&#34;EZMonitor SSL Monitoring portal with Settings option highlighted in the navigation menu&#34;&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Expand your subscription&amp;rsquo;s advanced settings.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/SIEMEZMon1.png&#34; alt=&#34;EZMonitor SSL Monitoring Settings page with Advanced Settings section expand button highlighted&#34;&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Enable the &amp;ldquo;Send Alerts to SIEM&amp;rdquo; option.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your RADIUS Logs to Splunk</title>
      <link>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/connect-cloud-radius-to-siem/export-logs-to-splunk/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/connect-cloud-radius-to-siem/export-logs-to-splunk/</guid>
      <description>&lt;h2 id=&#34;how-to-connect-your-cloud-radius-to-splunk&#34;&gt;How To Connect Your Cloud RADIUS To Splunk&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-connect-your-cloud-radius-to-splunk&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Go to your EZRADIUS portal.&lt;/li&gt;&#xA;&lt;li&gt;Click on Settings.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/settings.png&#34; alt=&#34;EZRADIUS Cloud RADIUS portal Radius Authentication Overview dashboard with Settings option highlighted in navigation&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Scroll to the bottom and enable the &amp;ldquo;Send Audit Logs&amp;rdquo; to SIEM option.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/enable-radius-siem.png&#34; alt=&#34;EZRADIUS Cloud RADIUS SIEM Settings panel with Send Audit Logs to SIEM checkbox enabled and Sentinel selected as provider&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select Splunk as the SIEM Provider.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/splunk-siem-cloud-pki.png&#34; alt=&#34;Set Splunk as the SIEM in EZRADIUS&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;In another tab, go to your Splunk instance.&lt;/li&gt;&#xA;&lt;li&gt;Go to data inputs by clicking on the settings menu.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/splunk-data-inputs.png&#34; alt=&#34;Splunk Data Inputs&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Add a new Http Event Collector.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/splunk-data-inputs1.png&#34; alt=&#34;Splunk Data Inputs http event collector&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Enter Keytos as the Name click next.&lt;/li&gt;&#xA;&lt;li&gt;Leave input settings with the default values and click next.&lt;/li&gt;&#xA;&lt;li&gt;Click Submit.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/splunk-input-submit.png&#34; alt=&#34;Create Splunk http input&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Copy the splunk token we just created. &lt;strong&gt;Note this is a credential so do not share it publicly.&lt;/strong&gt;&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/splunk-token.png&#34; alt=&#34;Splunk http token&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Now let&amp;rsquo;s go back to the EZRADIUS portal and copy the url of your splunk instance and the token we just created.&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Test Connection&amp;rdquo; button, this will create a test log in your SIEM to make sure EZRADIUS can write to the SIEM.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/test-splunk-siem-connection.png&#34; alt=&#34;test splunk connection for cloud PKI&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;If the connection test is successful, click &amp;ldquo;Save changes&amp;rdquo; at the top of the subscription.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/save-sub-changes.png&#34; alt=&#34;EZRADIUS Cloud RADIUS save RADIUS Settings&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;EZRADIUS will now send your security alerts to your SIEM. If an error occurs it will email your subscription administrators. See below to see the different events EZRADIUS will send.&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>How-To: Manage EZCA Resources with the EZCA Certificate Renewal Client</title>
      <link>https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-cert-renewal-client/</link>
      <pubDate>Wed, 25 Mar 2026 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-cert-renewal-client/</guid>
      <description>&lt;p&gt;At Keytos, our goal is to make EZCA easy-to-use for every person in the world. One way to make this a reality is by removing humans as much as possible from the equation. To help companies achieve this goal, we have created a sample C# console application for Windows that can:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-cert-renewal-client/#register-a-new-domain-in-ezca&#34;&gt;Register a new domain in EZCA&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-cert-renewal-client/#create-a-new-certificate&#34;&gt;Create a new certificate&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-cert-renewal-client/#renew-an-existing-certificate&#34;&gt;Renew an existing certificate&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-cert-renewal-client/#create-a-domain-controller-certificate&#34;&gt;Create a Domain Controller Certificate&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-cert-renewal-client/#create-scep-certificates-for-unmanaged-devices&#34;&gt;Create SCEP Certificates for Unmanaged Devices&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;This application can be used in combination with Windows Task Scheduler to automatically renew certificates before they expire, ensuring that your systems remain secure and compliant without manual intervention.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How To Set Up 802.1X Network Authentication on macOS</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/in-device/how-to-setup-radius-authentication-macos/</link>
      <pubDate>Thu, 29 Jan 2026 12:00:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/in-device/how-to-setup-radius-authentication-macos/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: While you can manually configure your macOS device to connect to an enterprise 802.1X network, we highly recommend using a &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/&#34;&gt;Mobile Device Management (MDM)&lt;/a&gt; solution like Microsoft Intune to push the necessary network profiles and certificates to your devices. This ensures that all devices are consistently configured and reduces the risk of misconfiguration.&lt;/p&gt;&lt;/blockquote&gt;&#xA;&lt;h2 id=&#34;what-is-8021x-network-authentication&#34;&gt;What is 802.1X Network Authentication?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-is-8021x-network-authentication&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;p&gt;At home, you probably just plug your computer into an ethernet cable or connect to a Wi-Fi network using a single password. It&amp;rsquo;s easy and convenient because at home you (&lt;em&gt;usually&lt;/em&gt;) trust everyone who can connect to your network. However, in an enterprise environment, you want to make sure that only authorized users and devices can connect to your network. This is where 802.1X network authentication comes in. 802.1X is a network protocol that provides an authentication mechanism to devices wishing to attach to a LAN or WLAN. It is commonly used in enterprise networks to provide secure access to network resources.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Sign Into Windows Using Your Passwordless Security Key</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/how-to-configure-passwordless-clients/how-to-setup-security-key-windows-sign-in/</link>
      <pubDate>Fri, 23 Jan 2026 08:30:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/how-to-configure-passwordless-clients/how-to-setup-security-key-windows-sign-in/</guid>
      <description>&lt;h2 id=&#34;why-use-a-passwordless-security-key-for-windows-sign-in&#34;&gt;Why Use a Passwordless Security Key for Windows Sign-In?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#why-use-a-passwordless-security-key-for-windows-sign-in&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Using a passwordless security key, such as a FIDO2 key or a Smart Card, to sign into Windows devices offers enhanced security and convenience. These keys provide strong authentication methods that are resistant to phishing attacks and other common threats associated with traditional passwords. By leveraging hardware-based authentication, users can enjoy a seamless sign-in experience while maintaining high security standards.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create and Manage Local Users in Cloud RADIUS with Entra ID in EZRADIUS</title>
      <link>https://www.keytos.io/docs/cloud-radius/how-to-configure-local-radius-users/self-service-user-management/create-new-radius-user/</link>
      <pubDate>Mon, 03 Nov 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/how-to-configure-local-radius-users/self-service-user-management/create-new-radius-user/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/how-to-configure-local-radius-users/self-service-user-management/enable-self-service-user-management/&#34;&gt;The Network Administrator Must Enable Self Service User Management&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;how-to-create-a-user-in-cloud-radius-with-entra-id-in-ezradius&#34;&gt;How to Create a User in Cloud RADIUS with Entra ID in EZRADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-a-user-in-cloud-radius-with-entra-id-in-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to your EZRADIUS portal. (&lt;em&gt;This will be provided by your network administrator&lt;/em&gt;)&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &amp;ldquo;Manage Account&amp;rdquo;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/manage-account.png&#34; alt=&#34;How to Manage Local Account for radius in EZRADIUS - The best Cloud Radius&#34;&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;By default you will see the username that your network administrator has assigned to you. If your network administrator has enabled custom usernames, you can change your username by changing the text in the &amp;ldquo;Username&amp;rdquo; field. (If it does not allow custom usernames, you will not be able to change your username)&lt;/p&gt;</description>
    </item>
    <item>
      <title>What are the Differences Between Classic RADIUS and RadSec?</title>
      <link>https://www.keytos.io/docs/cloud-radius/radius-authentication-concepts/what-are-the-differences-between-classic-radius-and-radsec/</link>
      <pubDate>Tue, 28 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/radius-authentication-concepts/what-are-the-differences-between-classic-radius-and-radsec/</guid>
      <description>&lt;h2 id=&#34;why-are-there-different-types-of-radius&#34;&gt;Why are There Different Types of RADIUS?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#why-are-there-different-types-of-radius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;classic-radius&#34;&gt;Classic RADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#classic-radius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;Classic RADIUS was introduced in the early 1990s as a protocol for managing network access. It uses UDP (User Datagram Protocol) for communication, which is fast but lacks built-in security features. As networks grew and started to span untrusted environments like the internet, the need for a more secure version of RADIUS became apparent. This led to the development of RadSec, which uses TCP (Transmission Control Protocol) and TLS (Transport Layer Security) to provide encrypted communication.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Enable Self Service User Certificates</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-enable-self-service-user-certificate/</link>
      <pubDate>Wed, 01 Apr 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-enable-self-service-user-certificate/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---what-are-self-service-user-certificates&#34;&gt;Introduction - What are Self Service User Certificates?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---what-are-self-service-user-certificates&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If you are using X509 Certificates for user authentication either for Wi-Fi or a VPN, you might have setup a &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/&#34;&gt;SCEP CA&lt;/a&gt; that connects to your MDM and enables your to automatically create certificates for your users. However, some users that require certificates for your organization might not have a device managed by your MDM. In this case you can enable self service user certificates for your users. This will enable your users to create their own certificates for authentication and encryption with a single in our portal; removing the need of an MDM.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Add PKI Administrators to your Azure PKI</title>
      <link>https://www.keytos.io/docs/azure-pki/getting-started/add-pki-administrators/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/getting-started/add-pki-administrators/</guid>
      <description>&lt;h2 id=&#34;what-is-a-pki-administrator&#34;&gt;What is a PKI Administrator?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-is-a-pki-administrator&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;A PKI Administrator is an Entra ID user or group that has been granted administrative privileges to manage your EZCA subscription and Certificate Authorities. PKI Administrators can perform tasks such as creating and managing CAs, issuing and revoking certificates, and configuring PKI settings.&lt;/p&gt;&#xA;&lt;p&gt;When choosing PKI Administrators, it&amp;rsquo;s important to select individuals or groups who are trusted and have the necessary expertise to manage your PKI effectively. This may include members of your IT security team, system administrators, or other personnel responsible for managing digital certificates and encryption within your organization.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your Cloud PKI Logs to CrowdStrike Falcon</title>
      <link>https://www.keytos.io/docs/azure-pki/getting-started/connecting_siem/export-logs-to-crowdstrike-falcon/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/getting-started/connecting_siem/export-logs-to-crowdstrike-falcon/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;You have an active EZCA plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;how-to-export-your-cloud-pki-audit-logs-to-crowdstrike-falcon-logscale&#34;&gt;How To Export Your Cloud PKI Audit Logs To CrowdStrike Falcon LogScale&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-cloud-pki-audit-logs-to-crowdstrike-falcon-logscale&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to the &lt;a href=&#34;https://portal.ezca.io/&#34;&gt;EZCA Portal&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on Settings.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/settings.png&#34; alt=&#34;EZCA Cloud PKI Dashboard with Settings option highlighted in the navigation menu&#34;&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Expand your subscription&amp;rsquo;s advanced settings.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/SIEMEZCA1.png&#34; alt=&#34;EZCA Cloud PKI Settings page showing subscription settings with Advanced Settings section expand button highlighted&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your EZCMS Logs to CrowdStrike Falcon</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/getting-started/export-ezcms-audit-logs-to-siem/export-logs-to-crowdstrike-falcon/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/getting-started/export-ezcms-audit-logs-to-siem/export-logs-to-crowdstrike-falcon/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;You have an active EZCMS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 data-toc-text=&#34;Export to CrowdStrike Falcon&#34; id=&#34;how-to-export-your-passwordless-onboarding-audit-logs-to-crowdstrike-falcon&#34;&gt;How to Export your Passwordless Onboarding Audit Logs to CrowdStrike Falcon&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-passwordless-onboarding-audit-logs-to-crowdstrike-falcon&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 data-toc-text=&#34;Enable Log Export in EZCMS&#34; id=&#34;how-to-enable-log-export-in-ezcms-portal&#34;&gt;How To Enable Log Export in EZCMS Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-log-export-in-ezcms-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to your EZCMS portal.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/dashboard-select-settings.png&#34; alt=&#34;EZCMS Passwordless Onboarding portal showing Settings option highlighted in the left navigation sidebar&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your EZMonitor SSL Monitoring Logs to CrowdStrike Falcon</title>
      <link>https://www.keytos.io/docs/ssl-monitoring/getting-started/connecting_siem/export-logs-to-crowdstrike-falcon/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/ssl-monitoring/getting-started/connecting_siem/export-logs-to-crowdstrike-falcon/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;You have an active EZCA plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;how-to-grant-log-contributor-permissions-to-the-ezmonitor-application-in-azure&#34;&gt;How to Grant Log Contributor Permissions to the EZMonitor Application in Azure&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-grant-log-contributor-permissions-to-the-ezmonitor-application-in-azure&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;!--&#xA;Parameters:&#xA;  - EZMonitor: The name of the Keytos product (e.g., EZRADIUS)&#xA;  - Keytos: The name of the Entra ID application to grant permission to (e.g., Keytos, EZRADIUS)&#xA;  - 68554b48-233f-42b4-9aa7-2eadca4d7727: The Application (client) ID of the Entra ID application (e.g., 5c0e7b30-d0aa-456a-befb-df8c75e8467b)&#xA;  - keytos: The part of filepaths to images specific to the product (e.g., ezca, ezradius)&#xA;---&gt;&#xA;&lt;p&gt;To allow EZMonitor to send logs to your Log Analytics and Azure Sentinel workspace, you need to grant the Keytos application the following roles on the Resource Group containing your Log Analytics workspace:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your RADIUS Logs to CrowdStrike Falcon</title>
      <link>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/connect-cloud-radius-to-siem/export-logs-to-crowdstrike-falcon/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/connect-cloud-radius-to-siem/export-logs-to-crowdstrike-falcon/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra applications are registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/&#34;&gt;You have an active EZRADIUS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;how-to-connect-your-radius-service-to-crowdstrike-falcon-logscale&#34;&gt;How To Connect Your RADIUS Service To CrowdStrike Falcon LogScale&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-connect-your-radius-service-to-crowdstrike-falcon-logscale&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Go to your EZRADIUS portal.&lt;/li&gt;&#xA;&lt;li&gt;Click on Settings.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/settings.png&#34; alt=&#34;EZRADIUS Cloud RADIUS portal Radius Authentication Overview dashboard with Settings option highlighted in navigation&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Scroll to the bottom and enable the &amp;ldquo;Send Audit Logs&amp;rdquo; to SIEM option.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/enable-radius-siem.png&#34; alt=&#34;EZRADIUS Cloud RADIUS SIEM Settings panel with Send Audit Logs to SIEM checkbox enabled and Sentinel selected as provider&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Select CrowdStrike Falcon LogScale as the SIEM Provider.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/crowdstrike-siem.png&#34; alt=&#34;Set CrowdStrike Falcon LogScale as the SIEM in EZRADIUS&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;In another tab, go to your CrowdStrike Falcon LogScale instance.&lt;/li&gt;&#xA;&lt;li&gt;Click on the Settings tab.&lt;/li&gt;&#xA;&lt;li&gt;Select the &amp;ldquo;Ingest Tokens&amp;rdquo; menu.&lt;/li&gt;&#xA;&lt;li&gt;Click on the &amp;ldquo;Add Token&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/crowdstrike-siem-pki-2.png&#34; alt=&#34;CrowdStrike Falcon LogScale Tokens&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Enter the token name&lt;/li&gt;&#xA;&lt;li&gt;Assign the json parser and click &amp;ldquo;Create&amp;rdquo;.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/crowdstrike-siem-pki-3.png&#34; alt=&#34;CrowdStrike Falcon LogScale Token for your cloud PKI&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Copy the token and the ingest host name.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/crowdstrike-siem-pki-4.png&#34; alt=&#34;CrowdStrike Falcon LogScale Token for your cloud PKI&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Go back to the EZRADIUS tab.&lt;/li&gt;&#xA;&lt;li&gt;Paste the ingest host name in the &amp;ldquo;Ingestion Endpoint&amp;rdquo; field.&lt;/li&gt;&#xA;&lt;li&gt;Paste the token in the &amp;ldquo;Ingestion Token&amp;rdquo; field.&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Test Connection&amp;rdquo; button, this will create a test log in your SIEM to make sure EZRADIUS can write to the SIEM.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/crowdstrike-siem-radius.png&#34; alt=&#34;EZRADIUS Cloud RADIUS send radius to crowd strike Settings&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;If the connection test is successful, click &amp;ldquo;Save changes&amp;rdquo; at the top of the subscription.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/save-sub-changes.png&#34; alt=&#34;EZRADIUS Cloud RADIUS save RADIUS Settings&#34;&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;how-to-create-alerts-in-crowdstrike-falcon-logscale-to-monitor-your-cloud-radius-activity&#34;&gt;How To Create Alerts in CrowdStrike Falcon LogScale to Monitor Your Cloud RADIUS Activity&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-alerts-in-crowdstrike-falcon-logscale-to-monitor-your-cloud-radius-activity&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Using a SIEM enables you to create alerts for critical operations or abnormal behavior. We recommend setting up alerts for any high criticality event, and closely monitor medium and low events. Below are sample queries for the Administrator events.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Manage EZCA Resources with the Keytos Terraform Provider</title>
      <link>https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-terraform-provider/</link>
      <pubDate>Tue, 03 Mar 2026 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-terraform-provider/</guid>
      <description>&lt;h2 id=&#34;introduction-to-the-keytos-terraform-provider&#34;&gt;Introduction to the Keytos Terraform Provider&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction-to-the-keytos-terraform-provider&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The Keytos Terraform Provider is a tool that allows you to manage your EZCA resources and other Keytos resources using Terraform. It provides a way to define your infrastructure as code and manage it in a consistent and repeatable way.&lt;/p&gt;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&lt;a class=&#34;btn  btn-primary&#34; href=&#34;#&#34; role=&#34;button&#34;&gt;🌐 Keytos Terraform Provider&lt;/a&gt;&lt;br /&gt;&#xA;&lt;br /&gt;&#xA;&lt;h2 id=&#34;resource-types-available-in-the-keytos-terraform-provider&#34;&gt;Resource Types Available in the Keytos Terraform Provider&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#resource-types-available-in-the-keytos-terraform-provider&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The Keytos Terraform Provider supports the following resource types for managing your EZCA resources:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How To Set Up 802.1X Network Authentication on Android</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/in-device/how-to-setup-radius-authentication-android/</link>
      <pubDate>Thu, 29 Jan 2026 12:00:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/in-device/how-to-setup-radius-authentication-android/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: While you can manually configure your Android device to connect to an enterprise 802.1X network, we highly recommend using a &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/&#34;&gt;Mobile Device Management (MDM)&lt;/a&gt; solution like Microsoft Intune to push the necessary network profiles and certificates to your devices. This ensures that all devices are consistently configured and reduces the risk of misconfiguration.&lt;/p&gt;&lt;/blockquote&gt;&#xA;&lt;h2 id=&#34;what-is-8021x-network-authentication&#34;&gt;What is 802.1X Network Authentication?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-is-8021x-network-authentication&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;p&gt;At home, you probably just plug your computer into an ethernet cable or connect to a Wi-Fi network using a single password. It&amp;rsquo;s easy and convenient because at home you (&lt;em&gt;usually&lt;/em&gt;) trust everyone who can connect to your network. However, in an enterprise environment, you want to make sure that only authorized users and devices can connect to your network. This is where 802.1X network authentication comes in. 802.1X is a network protocol that provides an authentication mechanism to devices wishing to attach to a LAN or WLAN. It is commonly used in enterprise networks to provide secure access to network resources.&lt;/p&gt;</description>
    </item>
    <item>
      <title>What are the Protocols Used by RADIUS?</title>
      <link>https://www.keytos.io/docs/cloud-radius/radius-authentication-concepts/what-radius-protocols-to-use/</link>
      <pubDate>Tue, 28 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/radius-authentication-concepts/what-radius-protocols-to-use/</guid>
      <description>&lt;h2 id=&#34;going-under-the-hood-of-radius&#34;&gt;Going Under the Hood of RADIUS&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#going-under-the-hood-of-radius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Lifting up the hood on RADIUS reveals a variety of protocols that facilitate its core functions of authentication, authorization, and accounting. When setting up a RADIUS server, they can be mixed and matched based on your organization&amp;rsquo;s security requirements and infrastructure capabilities. Below, we explore some of the most common RADIUS protocols and their typical use cases.&lt;/p&gt;&#xA;&lt;h3 id=&#34;eap-tls-extensible-authentication-protocol---transport-layer-security&#34;&gt;EAP-TLS (Extensible Authentication Protocol - Transport Layer Security)&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#eap-tls-extensible-authentication-protocol---transport-layer-security&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;EAP-TLS is widely regarded as the most secure RADIUS authentication method. It uses client-side certificates or smart cards to authenticate users, providing strong security without relying on passwords. In EAP-TLS, both the client and server present certificates to each other, ensuring mutual authentication.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Manage Certificates for SCEP CAs</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-manage-certificates-for-scep-ca/</link>
      <pubDate>Wed, 01 Apr 2026 08:30:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-manage-certificates-for-scep-ca/</guid>
      <description>&lt;p&gt;There are multiple ways to issue and manage certificates in the EZCA portal. In this document we will go over how to manage certificates for your SCEP CA. This is more of an &amp;ldquo;Index&amp;rdquo; that will show all the different ways you can create your certificates in your cloud based CA. Each section will have a link to a more detailed document that will go over how to issue certificates in that specific way.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create a User Certificate</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/create-new-certificate/how-to-create-user-certificate/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/create-new-certificate/how-to-create-user-certificate/</guid>
      <description>&lt;h2 id=&#34;how-to-create-a-user-certificate&#34;&gt;How to create a user certificate&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-a-user-certificate&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If your administrator has enabled self service user certificates, you can follow this guide to create your own certificates for authentication and encryption. go to the &lt;a href=&#34;https://portal.ezca.io&#34;&gt;EZCA portal&lt;/a&gt; (If you have your private instance go to that specific portal) and login with your credentials. Once logged in, follow these steps to create your certificate.&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Click on the &amp;ldquo;User Certificate&amp;rdquo; button.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/create-user-certificate.png&#34; alt=&#34;EZCA Cloud PKI portal User Certificate menu item selected in the left navigation with request form&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;If you have multiple profiles, you will see a Certificate Profile dropdown. Select the profile you want to use. (If you only have one profile, you will not see this dropdown).&lt;/li&gt;&#xA;&lt;li&gt;Enter a Certificate Name (this is just for your reference).&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/select-certificate-name.png&#34; alt=&#34;EZCA Cloud PKI Request User Certificate form with Certificate Name field highlighted for input&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;If your administrator has enabled the option to save the private key in EZCA (this is used for S/MIME or encryption certificates where having a backup of the private key is important), you will see the option to save the private key in EZCA. If you do not see this option, please continue to create your certificate.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/save-private-key.png&#34; alt=&#34;EZCA Cloud PKI Request User Certificate form with Save Private Key checkbox highlighted for central key management&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;One of the advantages of saving your private key in EZCA is that you can have EZCA automatically rotate your certificate when it is about to expire. If you want to enable this option, check the &amp;ldquo;Automatically Renew Certificate Before it Expires&amp;rdquo; option. This option will automatically renew your certificate and send you an email instructing you to download the new certificate.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/enable-user-certificate-rotation.png&#34; alt=&#34;EZCA Cloud PKI Request User Certificate form with Automatically Renew Certificate checkbox and percentage slider&#34;&gt;&lt;/li&gt;&#xA;&lt;li&gt;Click the &amp;ldquo;Create Certificate&amp;rdquo; button on the top right of the page, this might freeze your browser a few seconds while it creates your secure cryptographic key. Once you have created your certificate, you will see a page with the details of your certificate.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/user-certificate-created.png&#34; alt=&#34;EZCA Cloud PKI Certificate Created Successfully page displaying the newly issued user certificate PEM&#34;&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Now you are ready to &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/how-to-install-ssl-certificate/&#34;&gt;install your certificate&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>How-To: Export EZSSH Logs to Datadog</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/export-ezssh-audit-logs-to-siem/export-logs-to-datadog/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/export-ezssh-audit-logs-to-siem/export-logs-to-datadog/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/&#34;&gt;Selecting a Plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 data-toc-text=&#34;Export to Datadog&#34; id=&#34;how-to-export-your-ezssh-audit-logs-to-datadog&#34;&gt;How To Export Your EZSSH Audit Logs To Datadog&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-ezssh-audit-logs-to-datadog&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 data-toc-text=&#34;Enable Log Export in EZSSH&#34; id=&#34;how-to-enable-log-export-in-ezssh-portal&#34;&gt;How To Enable Log Export in EZSSH Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-log-export-in-ezssh-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to the &lt;a href=&#34;https://portal.ezssh.io/&#34;&gt;EZSSH Portal&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/dashboard-select-settings.png&#34; alt=&#34;EZSSH Agentless JIT Access portal dashboard with Settings item highlighted in the left navigation sidebar&#34;&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Expand your subscription&amp;rsquo;s &lt;strong&gt;Advanced Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/subscription-advanced-settings-dropdown.png&#34; alt=&#34;EZSSH Agentless JIT Access subscription settings page showing Advanced Settings section with expand arrow highlighted&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export EZSSH Logs to Huntress</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/getting-started/export-ezssh-audit-logs-to-siem/export-logs-to-huntress/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/getting-started/export-ezssh-audit-logs-to-siem/export-logs-to-huntress/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;Registering the application in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/zero-trust-ssh/getting-started/registering-a-new-tenant/selecting-a-plan/&#34;&gt;Selecting a Plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 data-toc-text=&#34;Export to Huntress&#34; id=&#34;how-to-export-your-ezssh-audit-logs-to-huntress&#34;&gt;How To Export Your EZSSH Audit Logs To Huntress&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-ezssh-audit-logs-to-huntress&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 data-toc-text=&#34;Enable Log Export in EZSSH&#34; id=&#34;how-to-enable-log-export-in-ezssh-portal&#34;&gt;How To Enable Log Export in EZSSH Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-log-export-in-ezssh-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to the &lt;a href=&#34;https://portal.ezssh.io/&#34;&gt;EZSSH Portal&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/dashboard-select-settings.png&#34; alt=&#34;EZSSH Agentless JIT Access portal dashboard with Settings item highlighted in the left navigation sidebar&#34;&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Expand your subscription&amp;rsquo;s &lt;strong&gt;Advanced Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/EZSSH/subscription-advanced-settings-dropdown.png&#34; alt=&#34;EZSSH Agentless JIT Access subscription settings page showing Advanced Settings section with expand arrow highlighted&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your Cloud PKI Logs to Datadog</title>
      <link>https://www.keytos.io/docs/azure-pki/getting-started/connecting_siem/export-logs-to-datadog/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/getting-started/connecting_siem/export-logs-to-datadog/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;You have an active EZCA plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 data-toc-text=&#34;Export to Datadog&#34; id=&#34;how-to-export-your-cloud-pki-audit-logs-to-datadog&#34;&gt;How To Export Your Cloud PKI Audit Logs To Datadog&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-cloud-pki-audit-logs-to-datadog&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 data-toc-text=&#34;Enable Log Export in EZCA&#34; id=&#34;how-to-enable-log-export-in-ezca-portal&#34;&gt;How To Enable Log Export in EZCA Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-log-export-in-ezca-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to the &lt;a href=&#34;https://portal.ezca.io/&#34;&gt;EZCA Portal&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/dashboard-select-settings.png&#34; alt=&#34;EZCA Cloud PKI Dashboard with Settings option highlighted in the navigation menu&#34;&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Expand your subscription&amp;rsquo;s &lt;strong&gt;Advanced Settings&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your Cloud PKI Logs to Huntress</title>
      <link>https://www.keytos.io/docs/azure-pki/getting-started/connecting_siem/export-logs-to-huntress/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/getting-started/connecting_siem/export-logs-to-huntress/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;You have an active EZCA plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 data-toc-text=&#34;Export to Huntress&#34; id=&#34;how-to-export-your-cloud-pki-audit-logs-to-huntress&#34;&gt;How To Export Your Cloud PKI Audit Logs To Huntress&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-cloud-pki-audit-logs-to-huntress&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 data-toc-text=&#34;Enable Log Export in EZCA&#34; id=&#34;how-to-enable-log-export-in-ezca-portal&#34;&gt;How To Enable Log Export in EZCA Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-log-export-in-ezca-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to the &lt;a href=&#34;https://portal.ezca.io/&#34;&gt;EZCA Portal&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/dashboard-select-settings.png&#34; alt=&#34;EZCA Cloud PKI Dashboard with Settings option highlighted in the navigation menu&#34;&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Expand your subscription&amp;rsquo;s &lt;strong&gt;Advanced Settings&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your RADIUS Logs to Datadog</title>
      <link>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/connect-cloud-radius-to-siem/export-logs-to-datadog/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/connect-cloud-radius-to-siem/export-logs-to-datadog/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra applications are registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/&#34;&gt;You have an active EZRADIUS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 data-toc-text=&#34;Export to Datadog&#34; id=&#34;how-to-export-your-cloud-radius-audit-logs-to-datadog&#34;&gt;How To Export Your Cloud RADIUS Audit Logs To Datadog&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-cloud-radius-audit-logs-to-datadog&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 data-toc-text=&#34;Enable Log Export in EZRADIUS&#34; id=&#34;how-to-enable-log-export-in-ezradius-portal&#34;&gt;How To Enable Log Export in EZRADIUS Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-log-export-in-ezradius-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to your EZRADIUS Portal.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/dashboard-select-settings.png&#34; alt=&#34;EZRADIUS Cloud RADIUS portal Radius Authentication Overview dashboard with Settings option highlighted in navigation&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How Do I Set Up PKI Infrastructure for RADIUS to Use Certificates and EAP-TLS?</title>
      <link>https://www.keytos.io/docs/cloud-radius/radius-authentication-concepts/how-to-setup-pki-infrastructure-for-radius/</link>
      <pubDate>Tue, 28 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/radius-authentication-concepts/how-to-setup-pki-infrastructure-for-radius/</guid>
      <description>&lt;h2 id=&#34;how-does-certificate-based-authentication-work&#34;&gt;How Does Certificate-Based Authentication Work?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-does-certificate-based-authentication-work&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Check out our &lt;a href=&#34;https://www.youtube.com/watch?v=9HY6Xit2Ykc&#34;&gt;quick overview video&lt;/a&gt; to learn how certificate-based authentication works with RADIUS.&lt;/p&gt;&#xA;&lt;div class=&#34;video-medium&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/9HY6Xit2Ykc?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;why-are-certificates-better-than-passwords-for-radius&#34;&gt;Why Are Certificates Better Than Passwords for RADIUS?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#why-are-certificates-better-than-passwords-for-radius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;When it comes to securing network access, using certificates for RADIUS authentication offers several advantages over traditional usernames and passwords:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;User Convenience&lt;/strong&gt;: With certificates, users can authenticate without needing to remember complex passwords. Once the certificate is installed on their device, authentication can happen seamlessly in the background.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Stronger Security&lt;/strong&gt;: Certificates provide a higher level of security compared to passwords, which can be weak, reused, or easily compromised. While passwords contain around 10-20 characters on average, certificates use cryptographic keys that are typically 2048 bits or longer, making them nearly impossible to brute-force using current technology.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Phishing Resistance&lt;/strong&gt;: Certificates are not susceptible to phishing attacks, where attackers trick users into revealing their passwords. Since certificates are stored securely on the device and cannot be easily shared, they are much harder for attackers to steal.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Prevents Shared Credentials&lt;/strong&gt;: Unlike passwords, which can be shared among multiple users, certificates are unique to each user or device. This ensures that only authorized individuals can access the network and only the resources they are permitted to use.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Works for Devices and Users&lt;/strong&gt;: Certificates can be issued to both users and devices, allowing for flexible authentication scenarios. This is particularly useful for IoT devices or shared workstations where user credentials may not be practical.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;If these benefits align with your organization&amp;rsquo;s security goals, setting up PKI infrastructure for RADIUS to use certificates and EAP-TLS is a worthwhile investment.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create Domain Controller Certificates for Windows Hello Hybrid</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/domain-controller-certificates-for-windows-hello-hybrid/</link>
      <pubDate>Wed, 01 Apr 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/domain-controller-certificates-for-windows-hello-hybrid/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---how-to-create-a-domain-controller-certificate-with-cloud-pki&#34;&gt;Introduction - How to Create a Domain Controller Certificate with Cloud PKI&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-create-a-domain-controller-certificate-with-cloud-pki&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If you are trying to migrate your PKI to the cloud, but still have Domain controllers on premises, you might still need certificates for your domain controllers. This certificates can be used for regular Domain Controller operations such as &lt;a href=&#34;https://learn.microsoft.com/troubleshoot/windows-server/active-directory/enable-ldap-over-ssl-3rd-certification-authority&#34;&gt;Secure LDAP&lt;/a&gt; or more advanced scenarios like &lt;a href=&#34;https://learn.microsoft.com/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust&#34;&gt;hybrid key trust deployment&lt;/a&gt; for Windows Hello For Business.&lt;/p&gt;&#xA;&lt;p&gt;This guide will show you how to create this without the need of running ADCS (Active Directory Certificate Services) offloading all your PKI needs to EZCA.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create Server Certificates with SCEP Cloud CA</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-create-server-certificates-with-scep-ca/</link>
      <pubDate>Wed, 01 Apr 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-create-server-certificates-with-scep-ca/</guid>
      <description>&lt;h2 data-toc-text=&#34;Introduction&#34; id=&#34;introduction---how-to-create-a-server-certificate-with-cloud-pki&#34;&gt;Introduction - How to Create a Server Certificate with Cloud PKI&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-to-create-a-server-certificate-with-cloud-pki&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;While EZCA SCEP CAs typically issue user and/or device certificates through an MDM solution such as &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/&#34;&gt;Intune&lt;/a&gt; or &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/how-to-create-scep-certificates-in-jamf/&#34;&gt;Jamf&lt;/a&gt;, you can also use it to create server certificates for your network controllers or other servers that require certificate authentication, such as RADIUS servers, VPN servers, and web servers. This saves you from needing to deploy a second SSL CA or running ADCS (Active Directory Certificate Services) to issue server certificates.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Create a Certificate in Azure Key Vault</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/create-new-certificate/how-to-create-certificate-in-azure-key-vault/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/create-new-certificate/how-to-create-certificate-in-azure-key-vault/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/registering-a-domain/&#34;&gt;You have a domain registered&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/give-access-to-key-vault-for-automated-certificate-rotation/&#34;&gt;You have onboarded your Azure Key Vaults to EZCA&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;how-to-create-and-automatically-rotate-ssl-certificates-in-akv---video-version&#34;&gt;How To Create and Automatically Rotate SSL Certificates in AKV - Video Version&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-create-and-automatically-rotate-ssl-certificates-in-akv---video-version&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/n6GwA8mJEwc?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;overview---how-to-create-a-private-certificate-in-azure-key-vault&#34;&gt;Overview - How to Create a Private Certificate in Azure Key Vault&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#overview---how-to-create-a-private-certificate-in-azure-key-vault&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Azure Key Vault is the best way to manage certificates in Azure, it allows you to securely distribute your certificates to all your Azure resources. While Azure Key Vault (AKV) &lt;a href=&#34;https://learn.microsoft.com/en-us/azure/key-vault/certificates/tutorial-rotate-certificates&#34;&gt;has automatic rotation for public certificates&lt;/a&gt; it does not work for your private certificate authority. To help you automatically rotate your private certificates (even for your Windows ADCS CA with &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/connect-adcs-to-azure/&#34;&gt;our ADCS connection&lt;/a&gt;) in Key Vault, we have created a seamless integration with Azure Key Vault to enable users to create, request, and manage certificates in a few clicks from a single place.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your EZCMS Logs to Datadog</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/getting-started/export-ezcms-audit-logs-to-siem/export-logs-to-datadog/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/getting-started/export-ezcms-audit-logs-to-siem/export-logs-to-datadog/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;You have an active EZCMS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 data-toc-text=&#34;Export to Datadog&#34; id=&#34;how-to-export-your-ezcms-audit-logs-to-datadog&#34;&gt;How To Export Your EZCMS Audit Logs To Datadog&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-ezcms-audit-logs-to-datadog&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 data-toc-text=&#34;Enable Log Export in EZCMS&#34; id=&#34;how-to-enable-log-export-in-ezcms-portal&#34;&gt;How To Enable Log Export in EZCMS Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-log-export-in-ezcms-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to your EZCMS portal.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/dashboard-select-settings.png&#34; alt=&#34;EZCMS Passwordless Onboarding portal showing Settings option highlighted in the left navigation sidebar&#34;&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Scroll down to &lt;strong&gt;SIEM Connection Settings&lt;/strong&gt; and enable the &lt;strong&gt;Send Alerts to SIEM&lt;/strong&gt; option.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your EZCMS Logs to Huntress</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/getting-started/export-ezcms-audit-logs-to-siem/export-logs-to-huntress/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/getting-started/export-ezcms-audit-logs-to-siem/export-logs-to-huntress/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/azure-pki/getting-started/selecting-a-plan/&#34;&gt;You have an active EZCMS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 data-toc-text=&#34;Export to Huntress&#34; id=&#34;how-to-export-your-ezcms-audit-logs-to-huntress&#34;&gt;How To Export Your EZCMS Audit Logs To Huntress&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-ezcms-audit-logs-to-huntress&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 data-toc-text=&#34;Enable Log Export in EZCMS&#34; id=&#34;how-to-enable-log-export-in-ezcms-portal&#34;&gt;How To Enable Log Export in EZCMS Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-log-export-in-ezcms-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to your EZCMS portal.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezsc/dashboard-select-settings.png&#34; alt=&#34;EZCMS Passwordless Onboarding portal showing Settings option highlighted in the left navigation sidebar&#34;&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Scroll down to &lt;strong&gt;SIEM Connection Settings&lt;/strong&gt; and enable the &lt;strong&gt;Send Alerts to SIEM&lt;/strong&gt; option.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your EZMonitor SSL Monitoring Logs to Datadog</title>
      <link>https://www.keytos.io/docs/ssl-monitoring/getting-started/connecting_siem/export-logs-to-datadog/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/ssl-monitoring/getting-started/connecting_siem/export-logs-to-datadog/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/selecting-a-plan/&#34;&gt;You have an active EZMonitor plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;how-to-export-your-ezmonitor-ssl-monitoring-logs-to-datadog&#34;&gt;How To Export Your EZMonitor SSL Monitoring Logs To Datadog&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-ezmonitor-ssl-monitoring-logs-to-datadog&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;how-to-enable-log-export-in-ezmonitor-portal&#34;&gt;How To Enable Log Export in EZMonitor Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-log-export-in-ezmonitor-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Navigate to the &lt;a href=&#34;https://portal.ezmonitor.io/&#34;&gt;EZMonitor Portal&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/dashboard-select-settings.png&#34; alt=&#34;EZMonitor SSL Monitoring left navigation sidebar with Settings menu item highlighted in red&#34;&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Expand your subscription&amp;rsquo;s &lt;strong&gt;Advanced Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/subscription-advanced-settings-dropdown.png&#34; alt=&#34;EZMonitor SSL Monitoring subscription settings page showing Advanced Settings collapsible section with expand arrow highlighted&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your EZMonitor SSL Monitoring Logs to Huntress</title>
      <link>https://www.keytos.io/docs/ssl-monitoring/getting-started/connecting_siem/export-logs-to-huntress/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/ssl-monitoring/getting-started/connecting_siem/export-logs-to-huntress/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra ID application is registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/ssl-monitoring/getting-started/registering-a-new-tenant/selecting-a-plan/&#34;&gt;You have an active EZMonitor plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;how-to-export-your-ezmonitor-ssl-monitoring-logs-to-huntress&#34;&gt;How To Export Your EZMonitor SSL Monitoring Logs To Huntress&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-ezmonitor-ssl-monitoring-logs-to-huntress&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;how-to-enable-log-export-in-ezmonitor-portal&#34;&gt;How To Enable Log Export in EZMonitor Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-log-export-in-ezmonitor-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Navigate to the &lt;a href=&#34;https://portal.ezmonitor.io/&#34;&gt;EZMonitor Portal&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/dashboard-select-settings.png&#34; alt=&#34;EZMonitor SSL Monitoring left navigation sidebar with Settings menu item highlighted in red&#34;&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Expand your subscription&amp;rsquo;s &lt;strong&gt;Advanced Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezmonitor/subscription-advanced-settings-dropdown.png&#34; alt=&#34;EZMonitor SSL Monitoring subscription settings page showing Advanced Settings collapsible section with expand arrow highlighted&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Export your RADIUS Logs to Huntress</title>
      <link>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/connect-cloud-radius-to-siem/export-logs-to-huntress/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/connect-cloud-radius-to-siem/export-logs-to-huntress/</guid>
      <description>&lt;h2 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#prerequisites&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/registering_app_in_tenant/&#34;&gt;The Keytos Entra applications are registered in your tenant&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/registering-a-new-tenant/selecting-a-plan/&#34;&gt;You have an active EZRADIUS plan&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 data-toc-text=&#34;Export to Huntress&#34; id=&#34;how-to-export-your-cloud-radius-audit-logs-to-huntress&#34;&gt;How To Export Your Cloud RADIUS Audit Logs To Huntress&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-export-your-cloud-radius-audit-logs-to-huntress&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 data-toc-text=&#34;Enable Log Export in EZRADIUS&#34; id=&#34;how-to-enable-log-export-in-ezradius-portal&#34;&gt;How To Enable Log Export in EZRADIUS Portal&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-enable-log-export-in-ezradius-portal&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&#xA;&#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#x9;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Go to your EZRADIUS Portal.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Click on &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://www.keytos.io/docs/images/ezradius/dashboard-select-settings.png&#34; alt=&#34;EZRADIUS Cloud RADIUS portal Radius Authentication Overview dashboard with Settings option highlighted in navigation&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How To Set Up 802.1X Network Authentication on Ubuntu</title>
      <link>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/in-device/how-to-setup-radius-authentication-ubuntu/</link>
      <pubDate>Wed, 25 Mar 2026 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/in-device/how-to-setup-radius-authentication-ubuntu/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: While this guide is written for Ubuntu, these set of instructions should be the same with any other Linux distribution that runs &lt;a href=&#34;https://wiki.archlinux.org/title/GNOME&#34;&gt;GNOME&lt;/a&gt; with &lt;a href=&#34;https://wiki.archlinux.org/title/NetworkManager&#34;&gt;NetworkManager&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: While you can manually configure your Ubuntu device to connect to an enterprise 802.1X network, we highly recommend using a &lt;a href=&#34;https://www.keytos.io/docs/cloud-radius/setup-radius-in-mdm/&#34;&gt;Mobile Device Management (MDM)&lt;/a&gt; solution like Microsoft Intune to push the necessary network profiles and certificates to your devices. This ensures that all devices are consistently configured and reduces the risk of misconfiguration.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How Do I Set Up MDM for RADIUS to Distribute Certificates and WiFi Profiles?</title>
      <link>https://www.keytos.io/docs/cloud-radius/radius-authentication-concepts/how-to-setup-mdm-distribution-for-radius/</link>
      <pubDate>Tue, 28 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/radius-authentication-concepts/how-to-setup-mdm-distribution-for-radius/</guid>
      <description>&lt;h2 id=&#34;how-do-i-push-certificates-and-wifi-profiles-to-devices-for-radius&#34;&gt;How Do I Push Certificates and WiFi Profiles to Devices for RADIUS?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-do-i-push-certificates-and-wifi-profiles-to-devices-for-radius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;When using certificate-based authentication with RADIUS, you&amp;rsquo;ll need a way to distribute the necessary certificates and WiFi profiles to your users&amp;rsquo; devices. These include laptops, smartphones, tablets, and other endpoints that will connect to your network. It&amp;rsquo;s a lot of work to have users do this manually or to have them visit an IT help desk, so organizations typically use a Mobile Device Management (MDM) solution to automate this process.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Issue X.509 Certificates via the EZCA API</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/create-new-certificate/how-to-create-certificate-via-api/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/create-new-certificate/how-to-create-certificate-via-api/</guid>
      <description>&lt;h2 id=&#34;introduction---how-can-i-issue-certificates-through-api&#34;&gt;Introduction - How Can I Issue Certificates Through API?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction---how-can-i-issue-certificates-through-api&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;EZCA is the first Cloud Certificate Authority build by developers for developers. We understand the importance of automation and have built our certificate authority API to be as simple as possible. To help you get started, other than supporting some usual PKI standards such as &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/&#34;&gt;SCEP&lt;/a&gt; &lt;a href=&#34;https://github.com/markeytos/Certificate-Renewal-Client/blob/c53de4282e3267f24f021e322e54f4d8f4a89dfd/DotNetCertAuthSample/DotNetCertAuthSample/Managers/CertificateManager.cs#L335&#34;&gt;(SCEP Sample Code)&lt;/a&gt;, &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/how-to-enable-acme-for-private-pki/&#34;&gt;ACME&lt;/a&gt;, and &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/how-to-create-est-certificates/&#34;&gt;EST&lt;/a&gt; &lt;a href=&#34;https://github.com/markeytos/EST-Certificate-Client&#34;&gt;(EST Sample code)&lt;/a&gt; we have also created a &lt;a href=&#34;https://portal.ezca.io/swagger/index.html&#34;&gt;swagger documentation&lt;/a&gt; that you can use to test our API, &lt;a href=&#34;https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/azure-iot-hub/&#34;&gt;full documentation for IoT Certificate Issuance&lt;/a&gt;, and even a &lt;a href=&#34;https://www.nuget.org/packages/EZCAClient&#34;&gt;NuGet Package&lt;/a&gt; with &lt;a href=&#34;https://github.com/markeytos/EZCAClient/blob/main/EZCAClient/SampleCode/Program.cs&#34;&gt;sample code&lt;/a&gt; to help you issue certificates as quickly as possible. In this page we will focus on our own API and how you can use it to issue certificates.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How Does Intune Issue SCEP Certificates with EZCA?</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/how-intune-scep-works/</link>
      <pubDate>Wed, 25 Feb 2026 08:30:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/how-intune-scep-works/</guid>
      <description>&lt;h2 id=&#34;what-is-scep&#34;&gt;What is SCEP?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-is-scep&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;SCEP, or &lt;a href=&#34;https://datatracker.ietf.org/doc/rfc8894/&#34;&gt;Simple Certificate Enrollment Protocol (SCEP)&lt;/a&gt;, is a certificate enrollment standard that enables devices to issue certificates by using a key provided by a 3rd party. The Certificate Authority (CA) must be able to communicate with this trusted third party (&lt;em&gt;in this case Intune&lt;/em&gt;) to validate that the key provided by the device is allowed to request a certificate.&lt;/p&gt;&#xA;&lt;h2 id=&#34;when-are-scep-certificates-used&#34;&gt;When are SCEP Certificates Used?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#when-are-scep-certificates-used&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;SCEP certificates are commonly used in scenarios where devices need to authenticate to a network or service without user interaction. For example, SCEP certificates can be used for:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How Can I Monitor My Network Using RADIUS Accounting Logs?</title>
      <link>https://www.keytos.io/docs/cloud-radius/radius-authentication-concepts/how-to-monitor-radius-accounting-logs/</link>
      <pubDate>Tue, 28 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/radius-authentication-concepts/how-to-monitor-radius-accounting-logs/</guid>
      <description>&lt;h2 id=&#34;what-are-radius-accounting-logs&#34;&gt;What are RADIUS Accounting Logs?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-are-radius-accounting-logs&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;It&amp;rsquo;s important to know what users and devices are connecting to your network, how long they&amp;rsquo;re connected, and how much data they&amp;rsquo;re using. RADIUS accounting logs provide this information by recording detailed records of user activity on your network.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-types-of-accounting-logs-are-available&#34;&gt;What Types of Accounting Logs Are Available?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-types-of-accounting-logs-are-available&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://datatracker.ietf.org/doc/html/rfc2866&#34;&gt;RFC 2866&lt;/a&gt; defines the standard RADIUS accounting attributes and log types.&lt;/p&gt;&#xA;&lt;p&gt;The main types of RADIUS accounting logs include:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Manage EZCA Resources with the .NET Nuget SDK</title>
      <link>https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-nuget-sdk/</link>
      <pubDate>Tue, 03 Mar 2026 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-nuget-sdk/</guid>
      <description>&lt;h2 id=&#34;introduction-to-the-net-nuget-sdk&#34;&gt;Introduction to the .NET Nuget SDK&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction-to-the-net-nuget-sdk&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The .NET Nuget SDK allows you to write your own automation, applications, and tooling in .NET on top of the EZCA platform. It provides a way to programmatically manage your EZCA resources and integrate with other systems in your environment using .NET.&lt;/p&gt;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&lt;a class=&#34;btn  btn-primary&#34; href=&#34;https://www.nuget.org/packages/EZCAClient/&#34; role=&#34;button&#34;target=&#34;_blank&#34;&gt;🌐 EZCA .NET Nuget SDK&lt;/a&gt;&lt;br /&gt;&#xA;&lt;br /&gt;&#xA;&lt;h2 id=&#34;code-samples-for-using-the-net-nuget-sdk&#34;&gt;Code Samples for Using the .NET Nuget SDK&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#code-samples-for-using-the-net-nuget-sdk&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Want to see examples of how to use the .NET Nuget SDK to manage your EZCA resources? Check out the &lt;a href=&#34;https://github.com/markeytos/EZCAClient&#34;&gt;EZCA Cert Client&lt;/a&gt; which is built on top of the EZCA API and the .NET Nuget SDK to manage EZCA resources. The Cert Client is an open source project, so feel free to explore the codebase and see how the SDK is used to call the EZCA API and manage EZCA resources.&lt;/p&gt;</description>
    </item>
    <item>
      <title>EZCA Frequently Asked Questions</title>
      <link>https://www.keytos.io/docs/azure-pki/cloud-certificate-authority-frequently-asked-questions/</link>
      <pubDate>Fri, 13 Mar 2026 08:45:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/cloud-certificate-authority-frequently-asked-questions/</guid>
      <description>&lt;h2 id=&#34;ezca-plans-and-pricing&#34;&gt;EZCA Plans and Pricing&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#ezca-plans-and-pricing&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;how-am-i-billed-for-ezca&#34;&gt;How Am I Billed for EZCA?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-am-i-billed-for-ezca&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;Only your Certificate Authorities (CAs) are billed in EZCA at a flat fee per month. Once you create a CA, you can create unlimited certificates (&lt;em&gt;within the rate limits of your CA tier&lt;/em&gt;) at no additional cost. There are no additional costs for features such as SCEP, ACME, OCSP, or CRL hosting. All these features are included in the monthly cost of the CA. The only time you will incur additional costs is if you create multiple CAs or geo-redundant CAs in different regions, as those are separate CAs that each have their own monthly cost.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Manage EZCA Resources with the EZCA API</title>
      <link>https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-swagger-api/</link>
      <pubDate>Tue, 03 Mar 2026 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-swagger-api/</guid>
      <description>&lt;h2 id=&#34;introduction-to-the-ezca-api&#34;&gt;Introduction to the EZCA API&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#introduction-to-the-ezca-api&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;The EZCA API allows you to write your own automation, applications, and tooling on top of the EZCA platform. It provides a way to programmatically manage your EZCA resources and integrate with other systems in your environment.&lt;/p&gt;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&lt;a class=&#34;btn  btn-primary&#34; href=&#34;https://portal.ezca.io/swagger/index.html&#34; role=&#34;button&#34;target=&#34;_blank&#34;&gt;🌐 EZCA API Swagger Reference&lt;/a&gt;&lt;br /&gt;&#xA;&lt;br /&gt;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &lt;img src=&#34;https://www.keytos.io/docs/azure-pki/pki-tooling/ezca-swagger-api/swagger.png&#34; width=&#34;900px&#34; alt=&#34;EZCA API Swagger Reference&#34;&gt;&#xA;&#xA;&#xA;&lt;h2 id=&#34;code-samples-for-using-the-ezca-api&#34;&gt;Code Samples for Using the EZCA API&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#code-samples-for-using-the-ezca-api&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Want to see examples of how to use the API to manage your EZCA resources? Check out the &lt;a href=&#34;https://github.com/markeytos/EZCAClient&#34;&gt;EZCA Cert Client&lt;/a&gt; which calls the EZCA API to manage EZCA resources.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cloud RADIUS Frequently Asked Questions</title>
      <link>https://www.keytos.io/docs/cloud-radius/cloud-radius-frequently-asked-questions/</link>
      <pubDate>Fri, 13 Mar 2026 08:45:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/cloud-radius-frequently-asked-questions/</guid>
      <description>&lt;h2 id=&#34;ezradius-plans-and-pricing&#34;&gt;EZRADIUS Plans and Pricing&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#ezradius-plans-and-pricing&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;how-does-radius-billing-work&#34;&gt;How Does RADIUS Billing Work?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-does-radius-billing-work&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;We bill based on the number of unique identities (&lt;em&gt;users or devices&lt;/em&gt;) that authenticate to EZRADIUS each month. For example, if you have 100 users in your organization but only 50 of them authenticate in a given month, you will be billed for 50 unique identities for that month. This billing model allows you to scale your RADIUS usage based on actual authentication activity, providing flexibility and cost-effectiveness for your organization.&lt;/p&gt;</description>
    </item>
    <item>
      <title>SSL Monitoring Frequently Asked Questions</title>
      <link>https://www.keytos.io/docs/ssl-monitoring/ssl-monitoring-frequently-asked-questions/</link>
      <pubDate>Fri, 13 Mar 2026 08:45:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/ssl-monitoring/ssl-monitoring-frequently-asked-questions/</guid>
      <description>&lt;h2 id=&#34;integrations-and-partnerships&#34;&gt;Integrations and Partnerships&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#integrations-and-partnerships&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;do-i-need-an-entra-id-tenant-to-use-ezmonitor&#34;&gt;Do I Need an Entra ID Tenant to Use EZMonitor?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#do-i-need-an-entra-id-tenant-to-use-ezmonitor&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;&lt;strong&gt;Yes&lt;/strong&gt;, an Entra ID (formerly Azure AD) tenant is currently required to create an EZMonitor subscription. This allows you to sign in to the EZMonitor portal using your Entra ID credentials and manage your SSL monitoring policies and settings.&lt;/p&gt;&#xA;&lt;h3 id=&#34;does-ezmonitor-integrate-with-other-identity-providers-like-okta-or-ping-identity&#34;&gt;Does EZMonitor Integrate with Other Identity Providers Like Okta or Ping Identity?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#does-ezmonitor-integrate-with-other-identity-providers-like-okta-or-ping-identity&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;&lt;strong&gt;Not yet&lt;/strong&gt;, currently EZMonitor is designed to work specifically with Entra ID (formerly Azure AD) as the identity provider. We do not currently support other identity providers such as Okta, Ping Identity, or others. However, we are constantly exploring new integrations and partnerships to expand our offerings and provide more options for our customers. If you have a specific identity provider in mind, please reach out to our sales team to discuss potential future integrations.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Zero Trust SSH Frequently Asked Questions</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/zero-trust-ssh-frequently-asked-questions/</link>
      <pubDate>Fri, 13 Mar 2026 08:45:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/zero-trust-ssh-frequently-asked-questions/</guid>
      <description>&lt;h2 id=&#34;ezssh-plans-and-pricing&#34;&gt;EZSSH Plans and Pricing&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#ezssh-plans-and-pricing&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;how-does-ezssh-pricing-work&#34;&gt;How Does EZSSH Pricing Work?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-does-ezssh-pricing-work&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;We bill based on the number of users who use EZSSH to access your infrastructure. For example, if you have 100 users in your organization but only 20 of them use EZSSH to access your servers, you will only be billed for those 20 users. This allows you to scale your usage and costs based on actual demand.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Passwordless Onboarding Frequently Asked Questions</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/passwordless-onboarding-frequently-asked-questions/</link>
      <pubDate>Tue, 03 Mar 2026 08:45:00 -0800</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/passwordless-onboarding-frequently-asked-questions/</guid>
      <description>&lt;h2 id=&#34;product-information&#34;&gt;Product Information&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#product-information&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;what-operating-systems-does-ezcms-support&#34;&gt;What Operating Systems Does EZCMS Support?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#what-operating-systems-does-ezcms-support&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;EZCMS supports &lt;strong&gt;Windows, Linux, and macOS&lt;/strong&gt; operating systems. This means that users can onboard themselves to unphishable credentials regardless of their device and operating system.&lt;/p&gt;&#xA;&lt;h3 id=&#34;does-ezcms-support-elliptic-curve-cryptography-ecc-keys&#34;&gt;Does EZCMS Support Elliptic Curve Cryptography (ECC) Keys?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#does-ezcms-support-elliptic-curve-cryptography-ecc-keys&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;&lt;strong&gt;Yes&lt;/strong&gt;. EZCMS supports Elliptic Curve Cryptography (ECC) keys, which are an alternative to traditional RSA keys. ECC keys provide strong security with smaller key sizes, making them more efficient and faster to use.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Support Options for EZRADIUS</title>
      <link>https://www.keytos.io/docs/cloud-radius/ezradius-support/</link>
      <pubDate>Thu, 04 Dec 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/ezradius-support/</guid>
      <description>&lt;p&gt;We offer a variety of support channels to help you learn about EZRADIUS and get it up and running in your environment as quickly and smoothly as possible.&lt;/p&gt;&#xA;&lt;h2 id=&#34;interested-in-ezradius&#34;&gt;Interested in EZRADIUS?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#interested-in-ezradius&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Considering EZRADIUS for your organization? We&amp;rsquo;re here to help you understand its features and how it can fit into your network infrastructure.&lt;/p&gt;&#xA;&lt;div class=&#34;td-card-group card-group p-0 mb-4&#34;&gt;&#xA;&#xA;&lt;div class=&#34;td-card card border me-4&#34;&gt;&#xA;&lt;div class=&#34;card-header&#34;&gt;&#xA;      &lt;i class=&#34;fa-solid fa-phone&#34;&gt;&lt;/i&gt; Free Demo with a Keytos Engineer&#xA;    &lt;/div&gt;&#xA;&lt;div class=&#34;card-body&#34;&gt;&#xA;    &lt;p class=&#34;card-text&#34;&gt;&#xA;        &lt;p&gt;Interested in learning more about EZRADIUS and want to learn more from a Keytos engineer? Schedule a free call with our engineering team to discuss product capabilities and integration scenarios.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Troubleshoot Azure Key Vault Certificate Issues</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/give-access-to-key-vault-for-automated-certificate-rotation/azure-keyvault-troubleshooting/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/give-access-to-key-vault-for-automated-certificate-rotation/azure-keyvault-troubleshooting/</guid>
      <description>&lt;h2 id=&#34;how-to-delete-azure-key-vault-pending-csr&#34;&gt;How to Delete Azure Key Vault Pending CSR&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-delete-azure-key-vault-pending-csr&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If you are on this page you, got an email of a very rare error: EZCA created a CSR in your Azure Key Vault to request a certificate on your behalf, something happened and EZCA was not able to remove this request from your key vault. This causes the Key Vault to stay in a pending state blocking the issuance of new Certificates for that specific certificate, Fortunately it is very easy to fix just follow these steps:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Troubleshoot SSL/Issuing Certificate Authorities in EZCA</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/troubleshooting-issuing-ca/</link>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-issuing-ca-in-azure/troubleshooting-issuing-ca/</guid>
      <description>&lt;h2 data-toc-text=&#34;Awaiting CA Certificate&#34; id=&#34;i-created-a-new-intermediatesubordinate-ca-in-ezca-but-i-see-awaiting-ca-certificate&#34;&gt;I Created a New Intermediate/Subordinate CA in EZCA But I See &amp;ldquo;Awaiting CA Certificate&amp;rdquo;&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#i-created-a-new-intermediatesubordinate-ca-in-ezca-but-i-see-awaiting-ca-certificate&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If you have created your intermediate/subordinate CA in EZCA but you get to the point where you see &amp;ldquo;Awaiting CA Certificate&amp;rdquo; in EZCA, it means that the CA has been created in EZCA but the certificate has not been signed by your Root CA. Follow these steps to complete the process.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How-To: Troubleshoot Intune SCEP Certificate Issues</title>
      <link>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/how-to-troubleshoot-intune-scep/</link>
      <pubDate>Sun, 30 Nov 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/how-to-create-scep-ca-in-azure/how-to-issue-certificates-with-mdm/intune-certificate-authority/how-to-troubleshoot-intune-scep/</guid>
      <description>&lt;h2 id=&#34;how-to-troubleshoot-intune-scep-certificate-error---overview&#34;&gt;How To Troubleshoot Intune SCEP Certificate Error - Overview&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#how-to-troubleshoot-intune-scep-certificate-error---overview&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;If you are having issues with Intune SCEP certificate issuance, and are confused by the &amp;ldquo;Error&amp;rdquo; with no additional information, this page will help you troubleshoot the most common issues with Intune SCEP Certificate Issuance.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/intune-scep-error.png&#34; alt=&#34;Intune SCEP Error&#34;&gt;&#xA;The first step to troubleshooting Intune SCEP if using EZCA is to go to EZCA and go to Certificate Authorities, if you have some misconfiguration in your CA you will see a red box with the error message.&#xA;&lt;img src=&#34;https://www.keytos.io/docs/images/ezca/intune-scep-error-ezca.png&#34; alt=&#34;How To Troubleshoot Intune SCEP Cloud PKI not working&#34;&gt;&#xA;The most two common issues that you will see in EZCA are &lt;strong&gt;Note the error message will display for 24 hour after it is fixed&lt;/strong&gt;:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Reference: EZRADIUS Swagger Documentation</title>
      <link>https://www.keytos.io/docs/cloud-radius/ezradius-swagger/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/ezradius-swagger/</guid>
      <description></description>
    </item>
    <item>
      <title>Reference: EZSSH Swagger Documentation</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/ezssh-swagger/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/ezssh-swagger/</guid>
      <description></description>
    </item>
    <item>
      <title>Reference: EZCMS Pricing Breakdown</title>
      <link>https://www.keytos.io/docs/passwordless-onboarding/ezsmartcard-pricing/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/passwordless-onboarding/ezsmartcard-pricing/</guid>
      <description>For the most up-to-date pricing information on EZSmartCard services, please visit [EZCMS Pricing](https://www.keytos.io/ezsmartcard_pricing.html).</description>
    </item>
    <item>
      <title>Reference: EZMonitor Pricing Breakdown</title>
      <link>https://www.keytos.io/docs/ssl-monitoring/ezmonitor-pricing/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/ssl-monitoring/ezmonitor-pricing/</guid>
      <description>For the most up-to-date pricing information on EZMonitor services, please visit [EZMonitor Pricing](https://www.keytos.io/ezmonitor_pricing.html).</description>
    </item>
    <item>
      <title>Reference: EZRADIUS Pricing Breakdown</title>
      <link>https://www.keytos.io/docs/cloud-radius/ezradius-pricing/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/cloud-radius/ezradius-pricing/</guid>
      <description></description>
    </item>
    <item>
      <title>Reference: EZSSH Pricing Breakdown</title>
      <link>https://www.keytos.io/docs/zero-trust-ssh/ezssh-pricing/</link>
      <pubDate>Sun, 05 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/zero-trust-ssh/ezssh-pricing/</guid>
      <description>For the most up-to-date pricing information on EZSSH services, please visit [EZSSH Pricing](https://www.keytos.io/ezssh_pricing.html).</description>
    </item>
    <item>
      <title>Keytos Frequently Asked Questions</title>
      <link>https://www.keytos.io/docs/keytos-faq/</link>
      <pubDate>Sun, 30 Nov 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/keytos-faq/</guid>
      <description>&lt;h2 id=&#34;about-the-company&#34;&gt;About the Company&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#about-the-company&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;when-was-keytos-founded&#34;&gt;When Was Keytos Founded?&lt;a class=&#34;td-heading-self-link&#34; href=&#34;#when-was-keytos-founded&#34; aria-label=&#34;Heading self-link&#34;&gt;&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;Keytos was founded by Marcos Flegmann and Igal Flegmann, two brothers who had a shared vision of creating tools that would help organizations improve their security in a stress-free way.&lt;/p&gt;&#xA;&lt;p&gt;They recognized that the problem with current security vulnerabilities wasn&amp;rsquo;t the lack of security protocols, but rather the complexity of following best practices. With more than 9 years of experience creating PKI (Public Key Infrastructure) and identity tools at Microsoft they were well-equipped to tackle this problem. They took their learnings from being world-class athletes and have made trust, persistence, and teamwork Keytos&amp;rsquo;s core values. These values have created a cohesive and high-performing team that, in a short time, has revolutionized the PKI and identity space.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Reference: EZCA Swagger Documentation</title>
      <link>https://www.keytos.io/docs/azure-pki/ezca-swagger/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/ezca-swagger/</guid>
      <description></description>
    </item>
    <item>
      <title>Reference: EZCA Pricing Breakdown</title>
      <link>https://www.keytos.io/docs/azure-pki/ezca-pricing/</link>
      <pubDate>Tue, 21 Oct 2025 01:22:09 -0500</pubDate>
      <guid>https://www.keytos.io/docs/azure-pki/ezca-pricing/</guid>
      <description>&lt;p&gt;Visit &lt;a href=&#34;https://www.keytos.io/ezca_pricing.html&#34;&gt;EZCA Pricing&lt;/a&gt; for the most up-to-date pricing information on EZCA services.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
