Module 4 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour
Difficulty
Beginner
Video Transcription
00:01
What was this last model about
00:05
in this model?
00:06
We went through the following.
00:09
We configured our Asher function to require user authentication.
00:15
We didn't test this flow completely because it requires implementation of the client floor, which is beyond the scope of this course.
00:25
Then we configured the eyepiece that can access our function.
00:30
We used different VPN connections to verify that our configuration works.
00:36
And at the end, we saw how can we configure secrets and read them from azure key vote and use them in our functions.
00:46
Keep in mind that all these configurations are out. The function up level in all the functions that are in this function up will
00:56
need to comply with these configurations.
01:00
This was our last model for rational functions. Let's wrap our course.
Up Next