Cloud is the new normal; almost, all the enterprises have been going through or at least planning their cloud adoption. Gone are the days, enterprise IT deals with big chunks of metal. Though the cloud adoption is at its peak, I rarely see democratized cloud adoption in enterprises. Cloud is often used as a centralized IT … Continue reading Democratizing Enterprise Cloud in Azure
Cloud has the proven promise of great opportunities for organizations & ISVs. Modern cloud platforms have low entry barriers and huge array service offerings beyond traditional enterprise application requirements. Cloud and the services provide intact environment to SaaS application providers with cutting edge innovation, agility and computational and storage scale for the global reach.
We keep the credentials and other secrets of the application in the source files. These secrets are visible to developers and being pushed to the source control. In order to avoid this, we can keep the secrets in centralized key management systems - but the credentials of the centralized key management system should be kept in the source files, resulting that at least one credential being placed in the source files. Let's see how to overcome this using Azure Managed Service Identity
General Data Protection Regulation (GDPR) the law imposes new rules on companies, government agencies, non-profits, and other organizations that offer goods and services to people in the European Union (EU), or that collect and analyze data tied to EU residents. The GDPR applies no matter where you are located. I have been reading the key … Continue reading Understanding GDPR and personal data
Azure B2C is a large membership database which also provides the features of tokens, sessions and membership/authentication experience (sign-up, sign-in, forget password and etc). But there are some scenarios which are little tricky based on how the entire solution is handled. Let me explain such a use case and describe different ways to handle that … Continue reading Azure B2C with custom attributes with predetermined values
Being part of a software services company, customers often ask the question how to restrict access to Azure resources. It is understandable that any organization wouldn’t prefer to give all the rights of the organizational Azure subscription to a person. In the classic Azure model the only way to give access to Azure portal is, … Continue reading Controlling access to your Azure resources using RBAC
This article focuses on the steps on how to configure the Always Encrypted (AE) feature for SQL Databases using Azure Key Vault as the key store provider; which is still in preview at the time of this writing. In order to try out what I have explained here you should have January 2016 preview or … Continue reading Provisioning Always Encrypted in SQL Databases with Azure Key Vault, using SSMS 2016.
This post summarizes and lists down the information you need to solve the specific error which occurs when you try to delete a AAD. There are plenty of articles for this and I recommend to read the link below which explains very frequent error messages of AAD and the fixes. https://support.microsoft.com/en-us/kb/2967860 Also read this blog … Continue reading Directory contains one or more applications that were added by a user or administrator.