You are here |
damienbod.com | ||
| | | |
az-liftshift.com
|
|
| | | | This article shows how an ASP.NET Core Razor Page application could implement an automatic sign-out when a user does not use the application for n-minutes. The application is secured using Azure AD B2C. To remove the session, the client must sign-out both on the ASP.NET Core application and the Azure AD B2C identity provider or | |
| | | |
abhijitjana.net
|
|
| | | | Azure DevOps has everything you need to build your software product from envisioning to put in into end-users' hands. The Azure-hosted DevOps services can enable your end to end product delivery with excellent traceability across the teams. Azure DevOps provides you the ability to plan your project using agile tools, manage your source code using... | |
| | | |
svrooij.io
|
|
| | | | I'm super enthusiastic about managed identities, because it allows you to deploy your application without having to worry about credentials. Federated credentials are a way to accomplish the same for none Azure resources. You can use federated credentials to authenticate several tasks inside Github Actions, and thus securely deploy your app to Azure without the need of a secret configured in GitHub. As the regular readers might expect this post will explain how federated credentials actually work inside GitHub Actions, a deep dive into the techniques that are actually driving this feature. Get a federation token from GitHub | |
| | | |
jhannes.github.io
|
|
| | This blog post is dedicated to my colleague Seminda who has been experimenting with how to create simple and powerful web applications. Thank you for showing me your ideas and discussing improvements with me, Seminda. I find many C# applications have much unnecessary code. This is especially true as the weight of the business logic of many applications are shifting from the backend to JavaScript code in the web pages. When the job of your application is to provide data to a front-end, it's important to keep it slim. |