This is the final post on our series of Azure Application objects and securing APIs secured with Azure AD. As we have seen throughout this series, the central point for authentication and permissions is the Azure AD Application Object. Microsoft has already provisioned and application object named SharePoint Online Client Extensibility in every Azure AD and Read
Take advantage of Azure AD to secure you Web APIs. Users with active accounts can seamlessly work with your applications that leverage API secured with Azure AD.
Understand how Azure AD OAuth authorization flows works. There are different types of OAuth flows depending on the kind of application.
Want to understand Application Objects and Service principals? This post will explain the differences between the two and how applications are added to Azure AD.
If you are new to Azure, or to some extent using Azure, you often here the terms Organizations, tenant, Accounts, Subscriptions and Licences used a lot. If you are little confused about the differences, you are not alone. In this post, I will try to explain these terms by using an analogy of renting an Read
A general guidelines in naming your Azure resources
In the past few years, the work/life paradigm has been blurred. We no longer the work and home separation, go to work, come back home and that is it.
We continue with our post on Azure CLI and JMESPath.
The Azure CLI command outputs a JSON. Even when an output format other than JSON is specified, CLI command results are first treated as JSON to enable queries to be performed, before outputted into the format specified. We can use the –query argument to execute a JMESPath query on the results of commands.
Protecting your infrastructure and data when you work in the cloud cannot be over emphasized. Every system, architecture, and application need to be designed with security in mind.