Passwords are like underwear – Keep them hidden using Azure MSI

We keep the credentials and other secrets of  the application in the source files. These secrets are visible to developers and being pushed to the source control. In order to avoid this, we can keep the secrets in centralized key management systems - but the credentials of the centralized key management system should be kept in the source files, resulting that at least one credential being placed in the source files. Let's see how to overcome this using Azure Managed Service Identity


Shadow IT – Tradeoff between frictionless user experience and being responsible with AAD V2

Introduction First let me begin with 'What is meant by Shadow IT ?'. In a broader view shadow IT is, any sort of IT usage without the direct governance of IT department of your organization. Sometimes this remains as a violation of the company policies, but the proliferation of the cloud SaaS applications and BYOD... Continue Reading →

Complex Event Processing (CEP) with Azure Stream Analytics : Getting Started with Streaming Data

Introduction Azure Stream Analytics is a Complex Event Processing (CEP) Platform as a Service (PaaS) in Azure. In the series of this blog posts we’ll examine a scenario which helps us understand the CEP capabilities of the Azure Stream Analytics. Before we begin, let’s have a basic understanding of what CEP is. CEP is any... Continue Reading →

Powered by

Up ↑

%d bloggers like this: