Module 4 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour
Difficulty
Beginner
CEU/CPE
1
Video Transcription
00:01
What was this last model about
00:05
in this model?
00:06
We went through the following.
00:09
We configured our Asher function to require user authentication.
00:15
We didn't test this flow completely because it requires implementation of the client floor, which is beyond the scope of this course.
00:25
Then we configured the eyepiece that can access our function.
00:30
We used different VPN connections to verify that our configuration works.
00:36
And at the end, we saw how can we configure secrets and read them from azure key vote and use them in our functions.
00:46
Keep in mind that all these configurations are out. The function up level in all the functions that are in this function up will
00:56
need to comply with these configurations.
01:00
This was our last model for rational functions. Let's wrap our course.
Up Next
Azure Functions

This Azure Functions course explains the core concepts of serverless services in Azure, how to develop functions that use different triggers and how to secure access of Azure Functions and manage configuration secrets.

Instructed By