Azure Key Vault Logging

This post goes with the series of my posts under the Azure Key Vault. I assume that you know about Azure Key Vault and have used it, and continue this article. If you're new to Azure Key Vault, please review the below links. You can read more about Azure Key Vault and how to use... Continue Reading →


SQL Server 2016 Always Encrypted

Introduction SQL Server 2016 is yet to be released, but you can download the CTP versions. The mostly anticipated and marveled feature is Always Encrypted. Let me discuss few bits of this feature before getting into the technical side of it. I got to know this right after reading an article about Microsoft had applied... Continue Reading →


Automatically Configure Azure AD in your Web Applications using VS 2015

Some of you might have noticed that in the project context menu, Visual Studio 2015 gives the option 'Configure Azure AD Authentication' When you click on this, a wizard will open up and it will do most of the heavy lifting for you in configuring the Azure AD for your application. Though the wizard is... Continue Reading →


Azure Active Directory (AAD): Common Application Development Scenarios

Azure Active Directory is a cloud identity management solution, but not limited to cloud identity alone. In this post let's discuss about how AAD can be used in designing multi-tenant applications in cloud. As usual consider that MassRover is an ISV. MassRover got this great idea of developing a document management application named 'Minion Docs'... Continue Reading →


Azure Key Vault Manager

Azure Key Vault is generally available. If you use Azure Key Vault in your projects, then there's a high probability that you felt the need of a handy dev tool to manage your Vault. Here it is. GitHub: More about Azure Key Vault:


Azure Key Vault setup and usage scenarios

Introduction At the time of this writing Azure Key Vault is in preview.  Azure Key Vault is a secure store solution for storing string based confidential information. The reason I’ve mentioned that the string based confidential information is that you can store a key used for encrypting a file, but you cannot store the encrypted... Continue Reading →


AWS Best login practice – IAM Policies

This post explains the best practice that highly recommended to be followed in AWS account and the Identity Access Management (IAM) policies in login process. First the user account that is used to create the AWS account is the Root Account. (the composite credential of email address and password). For example if I go to... Continue Reading →


Azure Blob Storage Data Security

The question of security and cloud computing is one of the very well argued discussed and debated topic. It’s also one of the very common question I get in my sessions. What ever said and done I personally believe that talking about security regardless of in the cloud or not it has 2 major characteristics.... Continue Reading →


Powered by

Up ↑

%d bloggers like this: