We keep the credentials and other secrets of the application in the source files. These secrets are visible to developers and being pushed to the source control. In order to avoid this, we can keep the secrets in centralized key management systems - but the credentials of the centralized key management system should be kept in the source files, resulting that at least one credential being placed in the source files. Let's see how to overcome this using Azure Managed Service Identity
Introduction First let me begin with 'What is meant by Shadow IT ?'. In a broader view shadow IT is, any sort of IT usage without the direct governance of IT department of your organization. Sometimes this remains as a violation of the company policies, but the proliferation of the cloud SaaS applications and BYOD … Continue reading Shadow IT – Tradeoff between frictionless user experience and being responsible with AAD V2
Part 1 of this series : Getting started with Azure Stream Analytics. In this post we will combine the reference data from Azure Storage and process the query and write the output events to the Service Bus. These events will be picked by the Azure Logic Apps and the responsible person to maintain the pipe … Continue reading Complex Event Processing (CEP) with Azure Stream Analytics : JOIN with Reference Data
Introduction Azure Stream Analytics is a Complex Event Processing (CEP) Platform as a Service (PaaS) in Azure. In the series of this blog posts we’ll examine a scenario which helps us understand the CEP capabilities of the Azure Stream Analytics. Before we begin, let’s have a basic understanding of what CEP is. CEP is any … Continue reading Complex Event Processing (CEP) with Azure Stream Analytics : Getting Started with Streaming Data
EF Core, support with the Elastic Client Library seems not actively available, and EF Core has its own differences compared to Entity Framework as well. This blog post addresses these issues.
Azure B2C is a large membership database which also provides the features of tokens, sessions and membership/authentication experience (sign-up, sign-in, forget password and etc). But there are some scenarios which are little tricky based on how the entire solution is handled. Let me explain such a use case and describe different ways to handle that … Continue reading Azure B2C with custom attributes with predetermined values
This is observed in Visual Studio Cloud Service Template (Environment VS 2015 Enterprise Update 3 and Azure SDK 2.9.6 with .NET 4.6). This could be observed in most of the other versions – probably in Azure SDK version 2.4 and above, but I stated my working environment as soon or later this issue will be … Continue reading WADLogsTable missing in Cloud Service project
Being part of a software services company, customers often ask the question how to restrict access to Azure resources. It is understandable that any organization wouldn’t prefer to give all the rights of the organizational Azure subscription to a person. In the classic Azure model the only way to give access to Azure portal is, … Continue reading Controlling access to your Azure resources using RBAC