In this post, Consultants Wael Kdouh and Marius Rochon shows how to secure Blazor WebAssembly Applications with Azure Active Directory.
When working with customers that are just starting their journey of converting to CI/CD pipelines within Azure DevOps, the initial focus is making sure their current manual build and release processes are automated. Can our pipeline do more? How do we build security steps into the process?
In this post, App Dev Manager Chris Hanna explains how to integrate Okta with Azure API Management for authentication.
In Azure DevOps, you can manage your security for a given team or group using the Permissions module. In this example, the API New Team has inherited and granted permissions. The “Allow permissions to view project level information” has been granted explicitly, while the permissions to delete, edit and manage projects has been inherited...
I created this post in response to questions from one of my customers which may be useful to others regarding Microsoft’s support plans around TLS 1.3 and upcoming releases.
We believe that Secure DevOps encompasses both a set of practices and a mindset shift to help customer adopt security principles and practices aligned with the culture shift and integrated with the practices, of DevOps. Secure DevOps practices include and build on those practices that are part of the Microsoft Security Development Lifecycle.
Beyond Lean, another important contributor to DevOps is the safety science movement. In this blog, Ron discusses this subject and show how important this is and how it changes the ways we think of the systems we build.
It is extremely difficult to find individuals with Security+ accreditation. Achieving this accreditation not only helps you but also helps defense contracting companies and the DoD community to fill in those national security related positions with those specialized needs.
When it comes to data, there is never a thing as too much security. With identify theft and breaches becoming a daily occurrence, ensuring sensitive information is protected is essential to business. Microsoft Azure has been designed from the ground-up to be one of the most secure places to store your information. Let me prove it!
Accessing Groups claims in Azure AD B2C requires adding some custom code through custom (IEF) policies. This post shows how to configure AD B2C IEF policies to access Groups in JWT Tokens.