Secure Azure VM Access: How We Eliminated Public IPs with Bastion and Entra IDThe Challenge: Securing Production VMs Without Exposing Attack SurfacesNov 1Nov 1
Solving Azure Conditional Access Policy Limitations with Custom Security AttributesThe Enterprise-Scale Challenge: Managing Conditional Access at 2,500+ ApplicationsOct 22Oct 22
Solving the Azure AD B2C Infinite Redirect Loop with App Service AuthenticationThe Problem That Keeps You SpinningOct 19Oct 19
Mastering HttpClient in .NET: A Deep Dive into Resilient API CommunicationWhen building enterprise applications that communicate with external APIs like Microsoft Graph, one of the most critical decisions you’ll…Sep 4Sep 4
How to host Open API spec via Container and Azure App ServiceRecently I worked on hosting Open API spec for some of my custom-built APIs. I used a container-based approach and finally hosted…Oct 29, 2024Oct 29, 2024
How to assign managed identity to Azure App Gateway and access certificate from Key Vault via RBACAzure application gateway is one odd resource in a sense that it does not support system-assigned managed identity. Now almost always…Mar 11, 2024Mar 11, 2024
How to add Legacy Graph api Roles to Managed IdentityI penned down a story some months back covering how to add Microsoft Graph API roles to a service principal/ managed identity. Recently I…Feb 9, 2024Feb 9, 2024
How to use private networking for securely communicating with an Azure Storage — Part 1Recently I was working on an Azure Data Factory which will need to read and write to/ from an Azure Data Lake. I configured private…Feb 4, 2024Feb 4, 2024
How to use self-hosted runtime to read and write resources within private network using Azure Data…In this story of this data factory series, we’ll see see how we can read data from a storage account protected by a network perimeter…Jan 15, 2024A response icon2Jan 15, 2024A response icon2
How to get app role claims from App Reg in Access Token (format: JWT)Often we may need to get app roles as claims within an access token for processing downstream authorization. One convenient approach is to…Oct 19, 2023A response icon1Oct 19, 2023A response icon1