It seems like only yesterday it was the last Microsoft Ignite, but it has been 11 months since we last connected! For the first time in a couple of years, there is an in-person event for Ignite, though for our list here I'm only listing sessions you can attend from the comfort of your home. … Continue reading Microsoft Ignite 2022 – Best Sessions for Australian and New Zealand Developers
Here we are again - it's almost time for the annual Microsoft Ignite conference. This edition is virtual again, so it's a great chance to hear the latest news while being able to sit at home on your sofa! Microsoft Ignite tends to be more an IT Pro and Microsoft 365 event, but there are … Continue reading Microsoft Ignite 2021 – Best Sessions for Aussie Developers
As of February 1, 2022, the Meetup REST API has been retired and no longer functions. I am leaving this post up for learning purposes, but the API Custom Connector no longer works. You can find out how I solved the shift from REST to GraphQL in my April 2022 post. In May 2019 I … Continue reading Adding OAuth2 support to your Meetup API Custom Connector for Azure Logic Apps
It feels like only yesterday I read through the session list for Microsoft Build 2020 and pulled out what I thought were the best sessions to attend. Here we are in September and it's now time for Microsoft Ignite 2020 which kicks off tomorrow! Microsoft Ignite tends to be much more of an IT Pro … Continue reading Microsoft Ignite 2020 – Recommended Sessions for Australian Developers
Phew! I just trawled through all 600+ sessions for this year's online Microsoft Build 2020 and pulled out what I think are the not-to-miss sessions for developers. I've put together the following list which encompasses the smaller, sometimes interactive sessions that will be on offer. You will be able to catch big keynote moments elsewhere … Continue reading Build 2020 – Recommended Sessions for Australian Developers
I've blogged in the past about Azure Active Directory B2C and how you can use it as a secure turnkey consumer identity platform for your business. In this post I'm going to walk through how you can debug JWT-protected APIs where those JWTs are being issued by AAD B2C. Note that a lot of what … Continue reading Developer toolkit for working with Azure AD B2C JWT-protected APIs
Note: since originally authoring this piece Microsoft has built secure deployments into the platform using Deployment Groups which you should go and read about. Read on if you're interested in how you can do this without that feature. One of the neat features of Azure Pipelines Release capability is the ability to deploy to Virtual … Continue reading Secure your Azure DevOps Release Management Azure VM deployments with NSGs and PowerShell
Azure Functions is one of those services in Azure that is seeing a massive amount of uptake. People are using it for so many things, some of which require access to sensitive information at runtime. At time of writing this post there is a pending Feature Request for Functions to support storing configuration items in … Continue reading Azure Functions: Access KeyVault Secrets with a Cert-secured Service Principal
If you've ever worked in any form of systems administrator role then you will be familiar with process automation, even only for simple tasks like automating backups. You will also be familiar with the pain of configuring and managing identities for these automated processes (expired password or disabled/deleted account ever caused you any pain?!) While … Continue reading Azure Automation Runbooks with Azure AD Service Principals and Custom RBAC Roles
The introduction of the Azure Resource Manager platform in Azure continues to expose new possibilities for managing your deployed resources.
One scenario that you may not be aware of is the ability to use scoped RBAC role assignments to grant limited rights to Azure AD-based users and groups.
We know Azure provides us with many built-in RBAC roles, but it may not be immediately obvious that you can control their assignment scope.
What do I mean by this?
Simply that each RBAC role (including custom ones you create) can be used at various levels within Azure starting at the Subscription level (i.e. applies to anything in the Subscription) down to a Resource (i.e. applies just to one particular resource such as a Storage Account). Role assignments are also cascading – if I assign “Owner” rights to a User or Group at the Subscription level then they have that role…
View original post 731 more words