What was this last model about
in this model?
We went through the following.
We configured our Asher function to require user authentication.
We didn't test this flow completely because it requires implementation of the client floor, which is beyond the scope of this course.
Then we configured the eyepiece that can access our function.
We used different VPN connections to verify that our configuration works.
And at the end, we saw how can we configure secrets and read them from azure key vote and use them in our functions.
Keep in mind that all these configurations are out. The function up level in all the functions that are in this function up will
need to comply with these configurations.
This was our last model for rational functions. Let's wrap our course.
Create a Serverless API using Azure Functions
Azure in a public cloud computing platform. Azure gives users options for serverless computing ...
Learn On Demand
AZ-301 Microsoft Azure Architect Design
This AZ-301 training covers the skills that are measured in the Microsoft Azure Architect Design ...
15 CEU/CPE Hours Available
Certificate of Completion Offered