Module 4 Introduction
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
Welcome back to the Azure functions Training.
This is our last model where we will talk about some security features in natural functions.
In this model will them how to set up user authentication for azure functions.
Then we will see how we can restrict the access to actual functions using I P white listing
and at the end will discuss how to read configuration secrets from Azure Key vote.
Let's get started.
Setting Up User Authentication
Restricting IP Access to Azure Functions
Reading Secrets from Key Vault
Module 4 Summary