article thumbnail

Publish Azure DevOps Extensions using Azure Workload Identity

Xebia

As you may know, I maintain several Azure DevOps Extensions. To publish them I use the Azure DevOps extension tasks. And to authenticate you must provide a Personal Access Token. If you need help configuring a basic CI/CD pipeline for an Azure DevOps Extension, check out the guidance on Microsoft Learn ). Learn more.

Azure 130
article thumbnail

Authentication in Serverless Apps—What Are the Options?

DevOps.com

Serverless applications are growing in popularity among DevOps engineers. However, serverless applications present unique security challenges, one of them being authentication. The post Authentication in Serverless Apps—What Are the Options? They are also commonly used to deploy microservices. How can you […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Scaling up: bringing your Azure Devops CI/CD setup to the next level ?

Xebia

Introduction Azure DevOps pipelines are a great way to automate your CI/CD process. In this blog post, we will show you how you can scale up your Azure DevOps CI/CD setup for reusability and easy maintenance. Your typical DevOps pipeline A typical DevOps pipeline is placed inside the project repository.

Azure 162
article thumbnail

Using IAM Authentication for Redis on AWS

Dzone - DevOps

Amazon MemoryDB for Redis has supported username/password-based authentication using Access Control Lists since the very beginning. But you can also use IAM-based authentication that allows you to associate IAM users and roles with MemoryDB users so that applications can use IAM credentials to authenticate to the MemoryDB cluster.

article thumbnail

Request-Level Authentication and Authorization With Istio and Keycloak

Dzone - DevOps

Standards-based identity and access management (IAM) for user authentication, such as SAML, WS-Fed, or the OpenID Connect/OAuth2 standards, have to be used to ensure secure access to the application. Multi-factor authentication (MFA) can also be implemented as an additional security measure.

article thumbnail

The Missing Link in DevOps Cloud Security

DevOps.com

It’s clear that credential compromise is an epidemic in cybersecurity and can be largely avoided with multifactor authentication and least-privilege policies. The post The Missing Link in DevOps Cloud Security appeared first on DevOps.com. Misused credentials have shot up by almost 30% over the last […].

DevOps 98
article thumbnail

How to Provision an Azure SQL Database With Active Directory Authentication

Dzone - DevOps

In this article, we will talk about how to provision an Azure SQL Database with authentication restricted to Active Directory users/groups/applications. In a previous article , I already talked about connecting to an Azure SQL Database using Azure Active Directory authentication. We will use Pulumi to do that. Why This Article?