TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Secure
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Ziggy Rafiq (9)
Sarthak Varshney (5)
Shubhankar Banerjee (4)
CSharp TV (3)
Shanuka Maheshwaran (2)
Ayush Gupta (2)
Shilpa Tanwar (2)
Dharmeshwaran S (2)
Lalit Bansal (2)
Nitesh Jha (2)
Abdul Raheem (2)
Rohit Gupta (2)
Prathap Reddy (2)
Sagar Lad (2)
Tanuj Gyan (2)
Raveena Attri (1)
Pranshu Singhal (1)
Mohamed Shifan (1)
Jalpa Dhola (1)
Jithu Thomas (1)
Vijay Yadav (1)
Gajendra Jangid (1)
Chetan Sanghani (1)
Velladurai (1)
Tural Suleymani (1)
John Godel (1)
Harshit Pandey (1)
Lokendra Singh (1)
Thiago Vivas (1)
Punar Dutt Rajput (1)
Lalit Kumar (1)
Vikas Gupta (1)
Kaviya Balasubramanian (1)
Prasad Pathak (1)
Shenbagapandiyan P (1)
Sifad Hussain (1)
Jay Smith (1)
Habibul Rehman (1)
Nagaraj M (1)
Kisorjan Jakathiswaran (1)
Muzaffar Ur Rahman (1)
Mohit Mishra (1)
Hemant Mahajan (1)
Gowtham K (1)
Kirtesh Shah (1)
Ramawatar Bhakar (1)
Koshila Senadhira (1)
Sateesh Arveti (1)
Sardar Mudassar Ali Khan (1)
Cr Bhargavi (1)
Raja Msr (1)
Abhishek Yadav (1)
Mohammad Hussain (1)
Jay Pankhaniya (1)
Lovy Jain (1)
Konga Mounika (1)
Abdul Basith (1)
Abhishek Tiwari (1)
Nitin (1)
Ishoo Anyal (1)
Rajat Jaiswal (1)
Naimish Makwana (1)
Naveed Zaman (1)
Uday Dodiya (1)
Mahesh Chand (1)
Toufik El Azzaoui (1)
Virendra Gour (1)
Anupam Maiti (1)
Jay Krishnareddy (1)
Viknaraj Manogararajah (1)
Ojash Shrestha (1)
Tanima K (1)
Related resources for Secure
No resource found
How to Transfer Files or Folders from Local Machine to Remote in EC2
12/17/2024 9:32:02 AM.
This article explains how to transfer files or folders from your local computer to an Amazon EC2 instance using SSH and SCP. It covers the steps to connect to the EC2 instance, create a folder, and se
How to Use Self-Signed Certificates for Azure VPN
11/30/2024 6:07:37 AM.
Learn how to set up an Azure Point-to-Site (P2S) VPN with certificate-based authentication. Follow the steps to create, export, and upload certificates, configure the VPN gateway, and establish a secu
How to Hide Files on Windows?
11/29/2024 5:30:33 AM.
Learn how to hide files on Windows to protect your data and maintain privacy. This guide covers simple steps to conceal files or folders using built-in Windows features like File Explorer and hidden a
How to Install Ubuntu Server on VMware ESXi Using VMware Client Browser
11/18/2024 11:07:48 AM.
This guide explains how to install Ubuntu Server on VMware ESXi using the web client. It covers steps like creating a virtual machine, selecting storage, uploading the Ubuntu ISO, configuring network
OWASP TOP 10 Security Vulnerability and Remediation
11/13/2024 8:15:54 AM.
This session introduces OWASP's Top 10 vulnerabilities, emphasizing proactive security in web development. Covering each category, it promotes secure coding practices to prevent financial loss and
Fetch Document Versions in SharePoint using PowerShell
11/8/2024 4:24:10 AM.
This PowerShell script connects to a SharePoint site to retrieve document versions from a specified library. It gathers metadata, including version numbers, last modified dates, and user details, then
Secure Application Development
10/25/2024 11:50:28 AM.
This video aims to identify the tools that help us build secure applications and environments for Microsoft Azure during the development journey.
Implementing OAuth Authentication in Next.js
8/7/2024 10:57:14 AM.
OAuth allows users to log in via third-party providers like Google and GitHub. Here’s a streamlined guide to integrating OAuth with NextAuth.js in your Next.js application.
How to Implement Email Verification in Next.js?
8/2/2024 6:12:03 AM.
Email verification is a crucial step in user registration processes, ensuring that users provide valid email addresses and confirming their identity. This guide demonstrates how to implement email ver
How to Use JWSHMAC in ASP.NET Web Application
7/29/2024 6:29:47 AM.
Learn how to implement JWSHMAC in an ASP.NET web application to secure JSON data using HMAC. This guide covers installing the JWT NuGet package, creating a JWT helper class for token generation and va
Understanding ngrok: Secure Tunneling to Localhost
7/25/2024 7:07:49 AM.
Learn how ngrok creates a secure, public URL for your local server, facilitating remote access and testing. Ideal for web development and debugging, ngrok bridges the gap between local and public envi
Two Factor Google Authenticator Using ASP.NET Core And Angular
7/18/2024 12:26:15 PM.
Implementing 2-Factor Google Authenticator with ASP.NET Core and Angular enhances security by requiring users to provide a time-based one-time password (TOTP) alongside their password.
Securing .NET Core Applications: Best Practices and Techniques
7/16/2024 7:27:47 PM.
In today's interconnected world, security is paramount for any application, especially those built on .NET Core. With its flexibility and scalability, .NET Core empowers developers to create robus
Creating a User Login System with SQL Server Stored Procedures
7/2/2024 7:12:28 AM.
Implementing secure user authentication in SQL Server involves creating a UsersDetails table for storing credentials and developing a LoginUser stored procedure. This procedure validates user inputs a
Configure SSL for Grafana on Azure
7/1/2024 7:07:46 AM.
Learn how to configure SSL for Grafana on Azure to secure your monitoring and analytics dashboard. Follow step-by-step instructions to set up HTTPS, manage certificates, and ensure data encryption for
Access Azure Storage Account Container from WinSCP Using SFTP
6/24/2024 11:31:18 AM.
Learn how to securely access Azure Storage Account containers via WinSCP using SFTP. Follow steps to enable SFTP on Azure, configure a local user for access, install WinSCP, and set up the connection.
How to Set Up Core Crypto Wallet?
6/14/2024 5:46:18 AM.
Discover Core Crypto Wallet: A secure, user-friendly solution to manage cryptocurrencies. Learn its features, benefits, and setup in this comprehensive guide.
Exploring the Multi-Faceted Architecture of AlbertAGPT: A Paradigm of Secure and Reliable AI by John Godel
6/11/2024 11:28:25 AM.
AlbertAGPT, a cutting-edge AI architecture, prioritizes security, safety, and reliability. With 190 trillion parameters, it integrates real-time knowledge acquisition, ensuring responsible and continu
How To Create JWT Token Authentication In Node.js Using Mysql?
6/4/2024 7:22:22 AM.
Learn how to establish JWT authentication in a Node.js application using MySQL and Express. This tutorial covers database setup, creating authentication routes, and managing token creation and validat
Secure Sensitive Files in Azure DevOps Pipelines with Secure Files
5/31/2024 5:47:47 AM.
Learn how to securely manage sensitive files in Azure DevOps pipelines using the Secure Files feature. This guide covers storing configuration files, certificates, and private keys securely, and demon
10 Best Crypto Wallets for Secure Storage of Your Digital Assets
5/27/2024 12:14:27 PM.
Explore the top 10 crypto wallets for secure storage of digital assets like Bitcoin and Ethereum. From hardware wallets like Ledger Nano X to user-friendly options like Coinbase Wallet and MetaMask, d
JWT (JSON Web Token): The Future Of Secure Data Transfer
5/24/2024 5:13:43 AM.
JSON Web Tokens (JWTs) are a compact, secure method for representing claims between parties, widely used for session management and data transfer since their introduction.
Securely Managing Secrets with Azure Key Vault and Python
5/15/2024 7:15:17 AM.
This article introduces leveraging Azure Key Vault with Python to securely store and retrieve secret values. It covers setup, installation, storing, and retrieving secrets, enhancing data protection i
Road To AZ-204 - Implement Secure Cloud Solutions
5/13/2024 4:43:47 AM.
This article's intention is to explain the main skills measured in this sub-topic of the AZ-204 Certification. Azure Key Vault, App Configuration, and Managed Identities are the main components th
A Guide to Secure Your Assets on Decentralized Exchanges (Dex)
5/8/2024 11:26:57 AM.
Decentralized exchanges (DEXs) revolutionize cryptocurrency trading, enabling peer-to-peer transactions without intermediaries. Using smart contracts and blockchain technology, DEXs offer transparency
Top Wallets for Securely Managing Your Solana Assets
5/8/2024 9:15:54 AM.
In this article, we will explore the crypto wallets that support the Solana blockchain. This article explores the best wallets tailored for Solana tokens, aiding users in making informed decisions for
How To Enable HTTPS In ASP.NET Web API
5/7/2024 11:23:49 AM.
In this article, you will see How we can enable https in ASP.Net Web API. We will start by discussing all the steps required to enable https in asp.net web API. And then we will discuss all the steps
How Secure Sockets Layer (SSL) Protects Data Online?
5/7/2024 5:53:30 AM.
Learn how SSL works in a step-by-step guide for beginners and professionals, ensuring secure internet communication and data protection.
Encryption for Data Security: Creating Digital Certificates
5/6/2024 6:15:44 AM.
Encryption secures data by converting it into unreadable ciphertext using algorithms and keys, preventing unauthorized access. SSL/TLS certificates enable secure communication between websites and use
Create Secure Store Application In SharePoint O365
5/2/2024 9:51:15 AM.
Learn how to enhance security in SharePoint Online (O365) by creating a secure store application. Explore secure credential management, authentication, and integration with Azure Active Directory for
What is a Virtual Private Cloud (VPC) in Alibaba Cloud ?
4/25/2024 4:13:28 AM.
Unleash the power of a private cloud within Alibaba Cloud's infrastructure. Explore VPC for secure resource management, network customization, and hybrid cloud integration.
🔒 Azure Key Vault Certificate Validation with C#
4/16/2024 10:58:22 AM.
In this informative article, we will delve into the world of secure certificate validation in the Azure Key Vault environment using C#. By leveraging the power of the X509Certificate2 class, we can im
A Comprehensive Guide to Secure Coding in C#
4/16/2024 10:56:29 AM.
A Comprehensive Guide to Secure Coding in C# by Ziggy Rafiq. Learn how to write robust and secure C# applications by implementing input validation, encryption, authentication, and error handling. This
Fix Visual Studio Load Test Error: Request Failed - SSL/TLS Issue
4/12/2024 6:21:12 AM.
In this article you will learn about the Visual Studio load test error - request failed - the request was aborted - could not create ssl/tls secure channel.
VMware Private AI Foundation with NVIDIA Now Available
4/12/2024 6:02:07 AM.
VMware and NVIDIA collaborate on Private AI Foundation, leveraging VMware Cloud Foundation and NVIDIA AI Enterprise for secure, private Gen AI models.
Best Practices for Maintaining Security and Preventing Vulnerabilities in C#
4/9/2024 5:54:03 PM.
Explore essential security practices in C# programming with Ziggy Rafiq, covering password hashing, input validation, SQL injection prevention, cryptography, HTTPS, secret management, and staying upda
How Secure Sockets Layer Works?
4/8/2024 4:49:33 AM.
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols establish encrypted connections between clients and servers, ensuring secure online communication by encrypting data and verifyi
Microsoft Entra ID: Implementing Global Secure Access
4/6/2024 6:11:00 AM.
Safeguarding internet access is vital for businesses. Microsoft Entra ID offers a robust solution for global secure access, ensuring protection against cyber threats while enabling seamless connectivi
Easy Password Generator: Create Secure Passwords in ASP.NET
4/5/2024 5:39:03 AM.
Discover a powerful Password Generator tool designed to enhance your online security. Our innovative solution creates strong and unique passwords with customizable length and complexity.
Ensuring Secure Coding in C#: Maintaining Security
3/22/2024 10:11:52 AM.
The article on secure coding in C# applications, written by Ziggy Rafiq, is a must-read for developers who want to fortify their applications against potential vulnerabilities and security threats. By
Secure Coding in C# - Protecting Applications and User Data
3/20/2024 4:27:46 PM.
Protecting applications and user data is crucial in today's digital age. Secure coding practices play a vital role in ensuring the security of the code written in C# on the Microsoft.net Framework
How To Secure PII Data In SQL Server Using .NET Assembly
3/6/2024 10:46:18 AM.
In this article, we will learn PII (Personally Identifiable Information) is used to identify individual identity markers such as SSN, DOB, Bank Account Number, etc. When you are working with financial
How To Secure PII Data In SQL Server Using CLE (Column Level Encryption)
3/6/2024 10:45:53 AM.
PII (personally identifiable information) which is used to identify individual identity such as SSN, DOB, Bank Account Number etc. When you are working with financial application you face the scenario
Cloud Security: Secure Access from your Applications to Azure SQL
2/19/2024 4:47:28 AM.
In this session, you will discover the differences between authentication on-premises and in the cloud and learn how to go way beyond the basic user/password for authentication.
Secure Facebook Webhook Payloads in ASP.NET Core 8 with HMAC256 Verification
2/8/2024 8:15:07 AM.
In the realm of web development, integrating with platforms like Meta Facebook is common. This article guides us through verifying Facebook webhook payload signatures in ASP.NET Core 8, which is cruci
BlockChain Supports CR from CRUD
2/6/2024 5:11:44 AM.
Blockchain, designed for cryptocurrency transactions, emphasizes immutability. Unlike traditional data frameworks, it allows only create and read operations. Explore its potential beyond crypto in sup
Building a Secure PHP MySQL Signup/Login Website with Email Verification
1/15/2024 8:48:49 AM.
Creating a secure signup/login system is essential for any web application that involves user authentication. In this article, I'll guide you through building a PHP MySQL login/signup website with
How to Create Login page in PowerApps using SharePoint
12/27/2023 6:58:21 AM.
PowerApps with a secure login screen. Learn the step-by-step process, from designing the interface to connecting to data sources, validating user credentials, handling navigation, and ensuring applica
Scaling Azure Databricks Secure Network Access to Azure Data Lake Storage
12/13/2023 1:36:49 PM.
Explore secure network access in Azure Databricks to Azure Data Lake Storage. Learn setup, RBAC, and secure coding with practical examples.
How to Configure Microsoft Entra Application Proxy?
12/12/2023 8:24:29 AM.
Learn how Azure Application Proxy facilitates secure remote access to on-premises applications without a VPN. From prerequisites to step-by-step guidance on setting up and configuring the App Proxy co
Secure Password Hashing with SHA-256 and Salt in Python
12/7/2023 5:46:50 AM.
In this article, we have discussed SHA-256 and salt. In this article, we unravel the intricacies of a clever strategy to fortify passwords—SHA-256 with salt. SHA-256, part of the SHA-2 family, transfo
What is Windows App?
11/17/2023 6:37:45 AM.
Windows App is a centralized hub that provides users with a unified experience across their Windows devices, cloud PCs, and remote applications
How to Secure your .Net Core API Through Identity Server 4
11/9/2023 5:08:59 AM.
A brief description of how to implement Identity Server 4. This article explains that setting up and configuring IdentityServer4 in a .NET application is comprehensive and provides a clear step-by-ste
SecureString Class In .Net
10/30/2023 10:52:02 AM.
This article focuses on the very special class in .NET, the SecureString class, and its uses.
How to Make .Net Core App Secure Through Identity Core?
10/25/2023 9:54:39 AM.
Converting a complex structure like the one you provided into a table format involves splitting the content into multiple tables due to its length. Below is the first part of the content formatted int
Using API Key Authentication To Secure ASP.NET Core Web API
10/13/2023 8:46:44 AM.
In this article, you will learn how to secure ASP.NET Core Web API using API Key authentication.
MPC Wallets: The Future of Secure Asset Management
10/11/2023 8:39:30 AM.
In this article, I will discuss Multi-Party Computation wallets, how to create them, etc
How to Set-up Trezor Hadware Wallet?
10/9/2023 8:54:42 AM.
Secure your cryptocurrencies with Trezor Hardware Wallet - the ultimate shield against cyber threats and unauthorized access.
ASP.NET Core 7 - Introduction of Rate Limiting middleware
10/5/2023 8:22:02 AM.
This article is an Introduction of Rate Limiting middleware in ASP.NET Core 7.
How Can You Ensure Secure Smart Contract Development?
9/26/2023 4:51:14 AM.
Learn essential Solidity best practices for writing secure, efficient, and reliable smart contracts on the Ethereum blockchain.
How to Transfer Tokens using Safe{Wallet}?
9/22/2023 4:03:42 AM.
Explore Safe{Wallet}'s multi-signature security for seamless token transfers. Learn the step-by-step process to manage digital assets securely and efficiently.
How to Write Secure Code in C#?
9/13/2023 10:24:13 AM.
Secure coding in C# is essential for safeguarding sensitive information and preventing security breaches. Follow these best practices to enhance your application's security. Protecting Your C# App
How to Create a Key Vault Using the Microsoft Azure portal
9/11/2023 11:42:38 AM.
To create a Key Vault in the Microsoft Azure portal, first, log in to the Azure Portal at portal.azure.com. Then, click "Create a resource" and search for "Key Vault." Select Key V
Secured Intranet Messenger using MSMQ in C#
9/11/2023 4:44:24 AM.
This application will allows us to send,receive messages securely using MSMQ service present in windows OS.
Keeping Secrets Safe in .NET/ASP.NET Core Applications with Azure Key Vault
9/7/2023 11:06:27 AM.
Securing secrets in .NET/ASP.NET Core applications using Azure Key Vault is crucial for maintaining the confidentiality and integrity of sensitive information such as API keys, connection strings, and
Empowering Secure Collaboration with Azure Shared Access Policies
9/2/2023 6:22:39 AM.
Empowering Secure Collaboration with Azure Shared Access Policies
C# Security: Best Practices for Secure Coding
8/31/2023 5:05:34 PM.
In this article, we will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to
Top 13 JavaScript Secure Coding Best Practices
8/29/2023 8:38:35 AM.
Learn how to write secure and robust JavaScript code with these best practices. Avoid common pitfalls and prevent vulnerabilities in your web applications.
Setting Up a VPS on Azure
8/24/2023 8:36:43 AM.
A Step-by-Step Guide to Setting Up a VPS on Azure" is a resource that provides a detailed and sequential walkthrough of creating and configuring a Virtual Private Server (VPS) on the Microsoft Az
Data Gateway in Power BI
8/7/2023 6:57:07 AM.
Unlock the potential of on-premises data with the Power BI Data Gateway. This comprehensive guide explores its core capabilities, installation, security, troubleshooting, and future roadmap for hybrid
Building a Secure .NET Core Web API for Azure AD Integration with SharePoint Online SPFx
8/5/2023 10:24:51 AM.
Learn how to build a secure .NET Core Web API integrated with Azure AD for seamless authentication and authorization with SharePoint Online SPFx web parts. Enhance your application's security and
Secure User Authentication in Azure Using Microsoft.Identity.Client
7/14/2023 7:21:24 AM.
The process of authenticating users securely is essential in Azure applications. Microsoft.Identity.Client (MSAL) is a C# library that simplifies the implementation of secure user authentication in Az
Azure Functions Security Best Practices
7/13/2023 12:58:40 PM.
Azure Functions Security Best Practices Ensuring a Secure Serverless Environment
How to Maintain Application Security and Prevent Vulnerabilities in C#?
7/12/2023 6:33:15 AM.
This article provides essential best practices for ensuring secure coding in C#. By implementing these practices, developers can maintain the security of their applications and mitigate vulnerabilitie
Secure Shell (SSH): A Comprehensive Guide to Secure Login
6/19/2023 8:08:59 AM.
In this comprehensive guide, you will delve into the world of Secure Shell (SSH) and its usage.
Architecting Secure-First Software for Developers
6/5/2023 5:54:07 PM.
In this session, software developers will learn what and how to architect software apps that are secure and hack-proof.
Azure Arc Private Link Scope: How to Securely Connect Azure Arc-enabled Servers to Azure Services
5/22/2023 7:13:49 AM.
Azure Arc Private Link Scope: How to Securely Connect Azure Arc-enabled Servers to Azure Services.
Azure Data Box: A Secure and Cost-Effective Way to Move Large Amounts of Data to Azure
5/18/2023 11:03:23 AM.
Azure Data Box is a powerful tool that can help you move large amounts of data to and from Azure. Data Box is easy to use, secure, and cost-effective. If you need to move large amounts of data to Azur
Enhancing Security with Microsoft 365 Secure Score
5/18/2023 8:17:29 AM.
By identifying opportunities to strengthen security throughout your organization, Identity Secure Score gives organizations greater insight and control over their security posture.
iOS App Security: Best Practices for Protecting User Data
5/12/2023 6:39:13 AM.
This article discusses best practices for iOS app security, including encryption, user authentication, secure network communications, code signing, app sandboxing, two-factor authentication, anti-jail
"Building a Scalable and Secure IoT Solution with Azure IoT Hub"
4/22/2023 11:19:29 AM.
The Internet of Things (IoT) has become an integral part of our daily lives, and its application in various industries has become a game-changer. However, with the growth of IoT devices and sensors, m
Artificial Intelligence (AI) Makes The Metaverse More Secure And Inclusive
4/19/2023 12:53:40 PM.
AI is becoming more prevalent in emerging technologies, and one co-founder of The Sandbox believes it will make digital spaces more inclusive.
Secure Resources Using Azure Managed Identities
4/19/2023 6:42:27 AM.
In this article, we will learn how to secure resources on azure platform without using any type of security key of connection string.
Securely Set Up Your Algorand Account on Ledger Nano
4/18/2023 12:58:55 PM.
Using this guide you will learn how you can set up an algorand account on the ledger Nano
SQL Security Tips - Dynamic Data Masking To Secure Data Access
3/9/2023 5:22:36 AM.
There are various aspects of security, and Dynamic Data Masking is one of the important concepts to know. We will describe here what is Dynamic masking and how to implement it with step-by-step exampl
Various Ways To Secure Sensitive Data In C#
2/13/2023 5:43:29 AM.
In this article we will see Various ways to secure sensitive data in C# with example.
Secured Connection Between SQL Server and C# Using Specific Port
2/1/2023 9:08:19 AM.
In this article, we will discuss how to get the port no of our own SQL Server instance and how to use that port in the SQL Server setting, and at the end how to use that port in your C Sharp applicati
Best Practices And Techniques For Building Secure Android Apps With Examples
1/23/2023 5:26:24 AM.
The article provides examples of Best Practices and Techniques for Developing Secure Android Apps.
10 Must Tips to Build Secure Websites for Software Developers
12/2/2022 11:35:01 AM.
Here are the 10 tips for Web developers and administrators on how to build and maintain secure websites.
Generate A Strongly Secured Encrypted PDF File Using PDFFileEcrypter
10/19/2022 5:35:48 AM.
The purpose of this article is to present an effective approach for strong encryption of PDF files using a password and a complicated algorithm.
OAuth2.0 Authorization With The Azure AD Client Credentials FLow To Secure APIs Of Azure API Management
5/25/2022 1:00:31 PM.
In this article, we learn how you can protect your APIs using OAuth2.0 Authorization with the Azure AD Client Credentials flow. When APIs on API Management consumed by other application(End User), we
Introduction To Delta Sharing For Secure Data Sharing
5/13/2022 4:16:01 PM.
Introduction to Delta Sharing for Secure Data Sharing
Data Engineering And Secure Coding With A Vulnerability Database
4/12/2022 3:16:03 PM.
In this article, you will learn about data engineering and secure coding with a vulnerability database.
How To Secure Private Docker Registry
2/2/2022 2:20:02 PM.
This article demonstrates how to secure a private docker registry by implementing the basic authentication. Here we will add username and password to our hosting server so that it will secure with cre
Secure Serverless Azure Functions Using JWT Auth And C# (.Net 6)
2/1/2022 10:32:53 AM.
A guide to secure the Azure Functions using .Net 6 and JWT Authentication.
Build A Secure Angular App Using MSAL And Azure Active Directory
1/15/2022 10:53:29 AM.
In the previous article, we will learn how to create an Angular 11 app with .NET 5 API that can do CRUD operations on Azure Cosmos DB using EF Core. We will continue this article add authentication to
Deploy .NET Core API To Azure Cloud And Secure It Using Facebook Authentication
12/14/2021 6:09:14 PM.
In this article series, we will learn how to create a .NET Core API that can do CRUD operations on Azure Cosmos DB and then publish it to Azure Cloud. After that, we will secure the API with Easy Auth
How To Secure Our Azure Web App Services Using A Private Endpoints
10/21/2021 1:10:15 PM.
In this article, you will learn how to secure our azure web app services using a private endpoints.
How To Secure Azure Web App Using Private Endpoints
8/5/2021 6:16:55 AM.
In this article, we’ll learn the about Private Endpoint, various aspect about it, its pros and the way to configure DNS to reach web app privately. This will make the web app secure with private conne
Building Secure REST API
8/4/2021 5:49:55 AM.
A Secure REST APi created in .Net Core using JWT Authentication and Entity Framework Code first approach. JWT Authentication is used for securing API requests. Each token generated by API for logged i