If someone asks me what the best and worst thing about SaaS software the answer is easy: it’s constantly changing. It’s great that we buy a subscription for service where customers and admins are consistently pushed features, enhancements, and fixes without any manual intervention needed by administrators. However, that benefit comes at the cost of navigating an ever-changing technological landscape. Often the changes introduced are beneficial, but some can be difficult to plan for and manage. That challenge is exacerbated […]

Deploying containerized apps to production in Kubernetes with rigorous security practices requires minimizing what is installed on a container image and what can be done in a running container. But doing so can make it challenging to diagnose elusive issues since the containers won’t have tools installed that could help diagnose the problem. This article demonstrates a technique for enabling diagnostics for a containerized .NET application while maintaining a high-security posture during normal operations. Deploying Securely to Kubernetes Standard practices […]

Why JWT Tokens? JSON Web Tokens (JWT) are an open, URL-safe & industry-standard method of representing claims securely between two parties. JWT Tokens are used for authorization and for exchanging information. JWT Token Structure The most commonly used JWT token consists of 3 parts separated by a dot (.). Header Payload Signature Example: The first two parts of a JWT token (header & payload) are Base64-URL encoded JSON, and the last part (signature) is a cryptographic signature. Header: metadata about […]

The cloud-oriented domain presents numerous styles of building automated solutions for various personal & business use cases. And there is no such thing as a correct or incorrect solution to these problems. It all depends on your requirement and any restraints in building the solution. The introduction of serverless solutions proved to be a perfect fit for scenarios where you must perform event-driven tasks cost-effectively and flexibly. Azure Functions Azure Functions are a lightweight serverless compute-on-demand, Platform-as-a-Service (PaaS) offering from […]

When running production workloads that leverage enterprise services, like DNS, we expect these services to be reliable, available, and responsive. It is assumed that when a client requests an enterprise service, it is logged and takes the most efficient and lowest latency route. In addition, a proper response is expected, successful or fail. What about when that enterprise service cannot handle the number of incoming requests and/or fails to send a proper response? In this blog, I walk through a […]

What is Managed Identity? The password lifecycle can be tedious. Between securely storing, rotating regularly, and ensuring their complexity, they add a hefty burden to IT teams. In comes the use of managed identities, a free feature that supports the ability to authenticate with resources that use Azure Active Directory (AAD). There are two types of managed identities: System-assigned: An identity is created within Azure AD and is tied to the lifecycle of that specific resource. Only that resource can […]

If you are familiar with Kubernetes, you must know Kubernetes installation is one of the challenging topics of Kubernetes. This challenge occurs because a multitude of installation methods exist. Practicing Kubernetes with a production-grade cluster with no or low cost is difficult, and many still doubt it. Let’s see a few methods of installing Kubernetes. Single-node Installation minikube is a single-node Kubernetes distribution that releases officially by the Kubernetes community. Manual Cluster Installation kubeadm is a tool used to deploy […]

Azure API Management (APIM) is a cloud service that allows organizations to manage and secure APIs (Application Programming Interfaces). It provides features that enable organizations to securely expose their APIs to external developers and partners, resulting in accelerated development and collaboration while improving security and governance. Managing how different APIs communicate within environments is a critical task. It depends on various fundamental factors, including client access management, latency optimization, keeping a check on bandwidth costs, and, most importantly – creating […]

In Dynamics 365, it is common to extend the application’s capabilities to perform specific actions based on complex business logic. The most common way to do this is by utilizing JavaScript Functions in a web resource file. Let us look at how we can develop custom JavaScript code to navigate between different forms in Dynamics 365 based on certain conditions. Using JavaScript on Dynamics 365 Forms In our scenario, we want Dynamics 365 to display a specific Form based on […]

Introduction Purchasing a new (or updated) website that requires directly editing HTML code to create (or update) content can be a daunting process for a client. After selecting a company for the project at the budgeted price, the client must undergo intensive collaboration to facilitate user interviews and focus groups on completing the site’s content. After endless hours, days, months, and potentially years of working with the delivery company, the website is handed over. Now what? Who will update a […]