There are two authentication methods quite popular in the cloud to secure APIs:
Let’s compare them.
By key-based we mean...
In a past article, we looked at Serverless compute in Azure in general and Azure Functions specifically.
In this article we wanted to focus on Azure Function triggered by HTTP requests and the different options we have to authenticate:
This entry is meant as a “getting started” entry with pointers to documentation and general discussion. We’ll dive deeper in future articles.
What is serverless computing?...
More precisely, if we put the gateway in a VNET and have scale sets in another, the usual integration, where the scale set registers its VM automatically as the size of the set...
Last year we posted an article about different options available in Azure to implement a disaster recovery strategy.
We strongly suggest to review that article as it gives good insights about what a disaster recovery strategy is within an already resilient Cloud Environment but also clear out a...