Module 4 Summary
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
What was this last model about
in this model?
We went through the following.
We configured our Asher function to require user authentication.
We didn't test this flow completely because it requires implementation of the client floor, which is beyond the scope of this course.
Then we configured the eyepiece that can access our function.
We used different VPN connections to verify that our configuration works.
And at the end, we saw how can we configure secrets and read them from azure key vote and use them in our functions.
Keep in mind that all these configurations are out. The function up level in all the functions that are in this function up will
need to comply with these configurations.
This was our last model for rational functions. Let's wrap our course.