Architectural work often isn’t assigned to sprints. It’s better to put epics, features and user stories on the backlog and leave it there. No rocket science, but it saves you a lot of work.
Example of how to validate a Json Web Token (JWT) and retrieve a value from that JWT via an API Management policy.
To parameterize a logic app with a secret value, you can use a parameter of type securestring in your logic app. In the parameter file, when specifying the value for the securestring parameter, you can refer to your keyvault instance and secretname.
The CIA triad is a widely used information security model. It’s an acronym for Confidentiality, Integrity, Availability. The Dutch equivalent is BIV, which stands for: Beschikbaarheid, Integriteit, Vertrouwelijkheid.
To deploy an ARM template for an API Management service without using a storage account, you can use so called nested templates in your orchestrator file.
To get authorization working with an OAuth2 token v2.0 using the ValidateJWT policy in API Management, call the token endpoint with scope api://[ClientId Service]/.default.
While multidimensional models are still prevalent in many BI solutions, tabular models are now more widely accepted as the standard enterprise-grade BI modeling solution on Azure.
SAFe stands for scaled agile framework. In SAFe we can actually have two or three hundred scrum teams. But what if we only have two or three teams?
Can we tailor SAFe to be used at a smaller scale?
Activity diagrams depict the workflow of activities. Sequence diagrams depict the sequence of calls to perform a specific functionality. Swimlane diagrams are no UML diagrams, but BPMN diagrams that show the organisational responsibility for parts of the process.
The correct keyboard combination for CTRL-ALT-DEL on your virtual machine is: CTRL-ALT-End.