[ WebToolTip.com ] Dometrain - Mastering - Azure for Developers
File List
- ~Get Your Files Here !/25. Delegating Token Logic to APIM.mp4 94.9 MB
- ~Get Your Files Here !/95. Section Recap.mp4 84.6 MB
- ~Get Your Files Here !/26. Delegated Permissions, Application Roles, Access Control Lists and Authorized Client Applications.mp4 83.6 MB
- ~Get Your Files Here !/8. Delegating (C)IAM to Microsoft Entra ID.mp4 80.1 MB
- ~Get Your Files Here !/59. Section Recap.mp4 80.1 MB
- ~Get Your Files Here !/75. Creating a Custom Authentication Extension Endpoint.mp4 76.2 MB
- ~Get Your Files Here !/118. Section Recap.mp4 67.5 MB
- ~Get Your Files Here !/67. Supporting Social Providers.mp4 66.4 MB
- ~Get Your Files Here !/111. Creating our Azure Functions Infrastructure.mp4 66.1 MB
- ~Get Your Files Here !/14. Creating App Registrations for Machine to Machine Communication.mp4 62.6 MB
- ~Get Your Files Here !/23. Securing Frontend to Function Communication with Easy Auth- Setting Up Easy Auth.mp4 59.9 MB
- ~Get Your Files Here !/38. Section Recap.mp4 56.6 MB
- ~Get Your Files Here !/89. Using a Certificate from Key Vault for Signing.mp4 54.8 MB
- ~Get Your Files Here !/30. Managed Identities Beneath the Covers.mp4 53.4 MB
- ~Get Your Files Here !/100. Exporting and Deploying ARM Templates.mp4 51.3 MB
- ~Get Your Files Here !/90. Versioning Secrets.mp4 51.2 MB
- ~Get Your Files Here !/91. Rotating Secrets (and Keys).mp4 50.0 MB
- ~Get Your Files Here !/45. Reading Out and Manipulating User Information with Easy Auth.mp4 49.6 MB
- ~Get Your Files Here !/83. Provisioning a Key Vault.mp4 47.7 MB
- ~Get Your Files Here !/35. Hybrid Approach- Securing Downstream Access in APIM with a User-based Managed Identity.mp4 47.4 MB
- ~Get Your Files Here !/58. Role-based Access Control in Azure- Azure RBAC, Entra RBAC, and Application Roles.mp4 47.2 MB
- ~Get Your Files Here !/29. The Managed Identity.mp4 46.2 MB
- ~Get Your Files Here !/50. Gaining Long-lived Access with Easy Auth - Implementation.mp4 45.7 MB
- ~Get Your Files Here !/32. Using the DefaultAzureCredential for a Better Development Experience.mp4 45.6 MB
- ~Get Your Files Here !/31. Using a System-assigned Managed Identity to Secure Database Access.mp4 45.3 MB
- ~Get Your Files Here !/47. Configuring Easy Auth for Accessing an API on Behalf of the User - Configuring the Access Token.mp4 44.6 MB
- ~Get Your Files Here !/113. Modularization with Bicep Modules- The Basics.mp4 44.3 MB
- ~Get Your Files Here !/61. Introducing External Identities.mp4 41.7 MB
- ~Get Your Files Here !/40. Managing User Principals.mp4 41.3 MB
- ~Get Your Files Here !/68. Section Recap.mp4 41.0 MB
- ~Get Your Files Here !/13. The Application Service Principal.mp4 40.8 MB
- ~Get Your Files Here !/27. Section Recap.mp4 40.8 MB
- ~Get Your Files Here !/80. Section Recap.mp4 40.2 MB
- ~Get Your Files Here !/93. Auditing and Monitoring- Logs, Alerts, Access Control and Workbooks.mp4 39.7 MB
- ~Get Your Files Here !/48. Accessing an API on Behalf of the User with Easy Auth.mp4 39.4 MB
- ~Get Your Files Here !/88. What About Using Certificates for Encryption-Decryption.mp4 39.4 MB
- ~Get Your Files Here !/85. Using a Secret from Key Vault in a Web App.mp4 39.0 MB
- ~Get Your Files Here !/52. Implementing User-based Authentication with Microsoft.Identity.Web - Logging In.mp4 38.1 MB
- ~Get Your Files Here !/82. Introducing Azure Key Vault.mp4 36.9 MB
- ~Get Your Files Here !/76. Configuring and Linking Custom Authentication Extensions.mp4 36.3 MB
- ~Get Your Files Here !/34. Using a User-assigned Managed Identity for Application Insights.mp4 36.3 MB
- ~Get Your Files Here !/17. Securing App Service to App Service Access (Frontend to API)- Regaining Access.mp4 35.8 MB
- ~Get Your Files Here !/102. Section Recap.mp4 34.3 MB
- ~Get Your Files Here !/19. Configuring and Using Token Content.mp4 34.1 MB
- ~Get Your Files Here !/63. Categorizing Users in a Workforce Tenant.mp4 33.4 MB
- ~Get Your Files Here !/84. Managing Secrets, Keys, and Certificates.mp4 31.9 MB
- ~Get Your Files Here !/54. Accessing an API on Behalf of the User with Microsoft.Identity.Web.mp4 31.6 MB
- ~Get Your Files Here !/87. Using a Key from Key Vault For Encryption-Decryption.mp4 31.2 MB
- ~Get Your Files Here !/9. App Registrations and Enterprise Apps.mp4 31.1 MB
- ~Get Your Files Here !/73. Testing a Self-service Sign-up-Sign-in User Flow.mp4 30.4 MB
- ~Get Your Files Here !/62. B2B Collaboration with External Identities in a Workforce Tenant.mp4 30.2 MB
- ~Get Your Files Here !/108. Working with Bicep Parameters, Variables, and Outputs- Putting It All Together.mp4 30.0 MB
- ~Get Your Files Here !/96. Introduction.mp4 28.9 MB
- ~Get Your Files Here !/16. Securing App Service to App Service Access (Frontend to API)- Blocking Access.mp4 28.3 MB
- ~Get Your Files Here !/24. Securing Frontend to Function Communication with Easy Auth- Updating the Client.mp4 27.7 MB
- ~Get Your Files Here !/114. Modularization with Bicep Modules- Scopes and Structure.mp4 26.6 MB
- ~Get Your Files Here !/71. Categorizing Users in an External Tenant.mp4 26.2 MB
- ~Get Your Files Here !/12. Introduction.mp4 26.1 MB
- ~Get Your Files Here !/79. What About Native Authentication.mp4 25.9 MB
- ~Get Your Files Here !/36. Hybrid Approach- Securing Downstream Access in APIM with a User-based Managed Identity and Easy Auth.mp4 25.1 MB
- ~Get Your Files Here !/43. Authenticating with Easy Auth - Logging In.mp4 25.0 MB
- ~Get Your Files Here !/46. Configuring Easy Auth for Accessing an API on Behalf of the User - The Basics.mp4 24.9 MB
- ~Get Your Files Here !/37. User-Assigned vs System-Assigned- What to Use When.mp4 24.4 MB
- ~Get Your Files Here !/53. Implementing User-based Authentication with Microsoft.Identity.Web - Logging Out.mp4 24.0 MB
- ~Get Your Files Here !/57. Configuring Token Lifetime with Conditional Access.mp4 23.8 MB
- ~Get Your Files Here !/49. Gaining Long-lived Access with Easy Auth - The Basics.mp4 23.7 MB
- ~Get Your Files Here !/107. Working with Bicep Parameters, Variables, and Outputs- The Basics.mp4 23.5 MB
- ~Get Your Files Here !/81. Introduction.mp4 23.3 MB
- ~Get Your Files Here !/41. User-based Authentication with Easy Auth.mp4 23.3 MB
- ~Get Your Files Here !/64. Inviting Guest Users.mp4 23.1 MB
- ~Get Your Files Here !/22. Publishing The Secured Components.mp4 22.9 MB
- ~Get Your Files Here !/11. Section Recap.mp4 22.5 MB
- ~Get Your Files Here !/56. How Single Sign-on Works on Entra ID.mp4 22.2 MB
- ~Get Your Files Here !/72. Enabling a Self-service Sign-up-Sign-in User Flow.mp4 22.1 MB
- ~Get Your Files Here !/78. Federating with an OpenID Connect Identity Provider.mp4 21.9 MB
- ~Get Your Files Here !/77. Improving Custom Authentication Extension Security.mp4 21.6 MB
- ~Get Your Files Here !/39. Introduction.mp4 21.0 MB
- ~Get Your Files Here !/92. Rotating Certificates.mp4 21.0 MB
- ~Get Your Files Here !/69. Introduction.mp4 20.5 MB
- ~Get Your Files Here !/110. Working with Bicep Deployment Scope.mp4 20.0 MB
- ~Get Your Files Here !/2. What will you learn in this course.mp4 19.8 MB
- ~Get Your Files Here !/97. Introduction and Fundamentals.mp4 19.2 MB
- ~Get Your Files Here !/6. Inspecting and Deploying the Demo Code.mp4 18.6 MB
- ~Get Your Files Here !/7. What IS Azure Security.mp4 18.5 MB
- ~Get Your Files Here !/18. Manually Acquiring a Token with ITokenAcquisition.mp4 18.2 MB
- ~Get Your Files Here !/65. Enabling a Self-service Sign-up-Sign-in User Flow.mp4 17.9 MB
- ~Get Your Files Here !/15. The Microsoft Identity Platform, MSAL and Microsoft.Identity.Web.mp4 17.7 MB
- ~Get Your Files Here !/105. Inspecting a Bicep File.mp4 17.1 MB
- ~Get Your Files Here !/3. Who is the course for and prerequisites.mp4 17.1 MB
- ~Get Your Files Here !/112. Understanding Dependencies.mp4 17.0 MB
- ~Get Your Files Here !/86. Loading a Connection String from Key Vault in an Azure Function.mp4 16.9 MB
- ~Get Your Files Here !/115. Using Parameter Files for Multiple Environments.mp4 16.8 MB
- ~Get Your Files Here !/20. Testing Entra ID Integration From Your Favorite Tool.mp4 16.7 MB
- ~Get Your Files Here !/10. Security Principals are Key.mp4 16.1 MB
- ~Get Your Files Here !/5. Getting Your Environment Ready and Creating the Infrastructure.mp4 15.3 MB
- ~Get Your Files Here !/101. Dry-running ARM Deployments.mp4 15.3 MB
- ~Get Your Files Here !/4. Introduction.mp4 15.1 MB
- ~Get Your Files Here !/106. Dry-running Bicep Deployments.mp4 14.7 MB
- ~Get Your Files Here !/44. Authenticating with Easy Auth - Logging Out.mp4 14.1 MB
- ~Get Your Files Here !/60. Introduction.mp4 14.0 MB
- ~Get Your Files Here !/33. Creating and Assigning Permissions to User-assigned Managed Identities.mp4 13.2 MB
- ~Get Your Files Here !/28. Introduction.mp4 12.8 MB
- ~Get Your Files Here !/103. Introduction.mp4 12.1 MB
- ~Get Your Files Here !/109. Decompiling ARM Templates to Bicep.mp4 11.7 MB
- ~Get Your Files Here !/117. Overall Best Practices.mp4 11.6 MB
- ~Get Your Files Here !/70. Creating and Inspecting an External Tenant.mp4 10.0 MB
- ~Get Your Files Here !/116. Secrets Management with Key Vault References.mp4 9.7 MB
- ~Get Your Files Here !/98. What Tool Should You Use When.mp4 9.2 MB
- ~Get Your Files Here !/74. Customizing Flows and Applications with Custom Authentication Extensions.mp4 8.1 MB
- ~Get Your Files Here !/99. ARM Template Basic Structure.mp4 7.4 MB
- ~Get Your Files Here !/21. Managing System-based Access Tokens.mp4 7.1 MB
- ~Get Your Files Here !/1. Welcome.mp4 6.5 MB
- ~Get Your Files Here !/94. Auditing and Monitoring- Best Practices.mp4 6.5 MB
- ~Get Your Files Here !/51. User-based Authentication with Microsoft.Identity.Web.mp4 6.3 MB
- ~Get Your Files Here !/104. Getting Our Environment Ready for Bicep.mp4 5.3 MB
- ~Get Your Files Here !/42. Microsoft.Identity.Web and Easy Auth.mp4 5.3 MB
- ~Get Your Files Here !/55. Gaining Long-lived Access with Microsoft.Identity.Web.mp4 4.6 MB
- ~Get Your Files Here !/66. Creating and Using Custom Attributes.mp4 3.7 MB
- Get Bonus Downloads Here.url 180 bytes
- ~Get Your Files Here !/Bonus Resources.txt 70 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.