If you find yourself struggling with SNAT ports using Azure App Services and your destination is an Azure service that supports service endpoints, regional VNET integration with Service Endpoints or Private Endpoints can provide a fairly simple way to allow these requests to use an internal, optimized route and avoid SNAT port limitations.
In this post we were able to demonstrate how to maintain different components as separate libraries which could be imported into the main shell in order to allow modular distributed development.
The SharePoint Workflow transformation to Power Automate workshop is targeted toward a Business and IT audience and focuses on workflow assessment and migration guidance to Power Automate in a discovery and hands-on learning event.
Power Platform is incredibly powerful and capable. If you are new to Power Platform, there are a lot of great reasons to check it out, but if you are already an organization using Office 365, you may be missing out.
Once you sign in and consent, you should see TokenEncryption API in your Enterprise Apps. You will then be able to register your own client applications (recipients of encrypted tokens), set their API Permission to access the Token Encryption API with decrypt application permission, and use client credentials to request a token.
This is a simple script that transforms SPMT reports into folders, broken out by website so people working on specific pages can easily see which action items pertain to them.
This article covers the process of generating a service bus token using PowerShell, using an azure runbook to cover token generation and renewal, and the how process can be automated and managed with a CI/CD pipeline.
Microsoft Identity Platform: which OAuth2 flow should I use? My non-prescriptive one-page guide in choosing the right auth flow for every situation.
This post will go over how to surface a classic SharePoint HTML/JS/CSS solution in a modern page or teams tab.
Troubleshooting production systems is often a balance between restoring services quickly and trying to collect enough information to isolate what caused the issue. For complex application issues, it’s almost always helpful to capture a memory dump.