Resources No resource found - Provide Security Role Access for D365 OutlookMar 14, 2024. In this article, we will customize permissions, manage user access, and enforce Role-Based Access Control (RBAC). Optimize Microsoft 365 settings to tailor access rights, enhancing data protection and organizational compliance.
- Renaming the Column in SQL ServerMar 06, 2024. Renaming columns in SQL Server is a fundamental task in database management. This comprehensive guide provides step-by-step instructions, syntax examples, and best practices to effectively rename columns, ensuring data integrity and maintaining database structures.
- Dynamically Alter Theme Across All Screens Within the Canvas AppFeb 13, 2024. Learn how to seamlessly adjust the theme across all screens within your Canvas app dynamically. Explore methods for real-time theme modification, ensuring consistent and adaptive UI theming for a cohesive user experience.
- How to Remove Server Roles and Features in ServerJan 23, 2024. To remove roles, role services, and features, you can use the Remove Roles and Features Wizard. Learn the proper and easiest method to remove server roles and features on Server 2019. Follow step-by-step instructions, including demoting a domain controller and handling restart.
- The Role of Packages in JavaDec 27, 2023. It is possible to runout of unique names for classes in a big programming environment. There may be situations when two or more persons use the same name of their classes.
- Manage Azure Subscription Owners: Add and Remove User AccessDec 22, 2023. Giving and taking away elevated privileges inside the Azure environment is what it means to designate and remove a user as an Owner of an Azure subscription. An owner has complete control over the subscription, including the ability to regulate resources, configurations, and user access.
- Securing Your .NET Core APIsNov 18, 2023. This article explains how you can secure your .NET Core APIs with essential practices. It covers JWT authentication, role-based authorization, HTTPS implementation, input validation, and rate limiting. By leveraging these techniques, you can ensure data integrity and prevent unauthorized access.
- Send Messages from Postman to Service BusNov 15, 2023. Learn to Send Messages from Postman to Service Bus
- Learn to Add Role Assignment to Service BusNov 09, 2023. Learn to Add Role Assignments to the Service Bus.
The steps you have provided seem to outline the process for adding roles to Azure Service. This can be a crucial aspect of managing access and permissions within the Azure environment, ensuring that the right users have the appropriate level of access to the required resources. Assigning roles helps in controlling the actions that users can perform within the service.
- Built-in Roles in Azure Synapse Analytics WorkspaceOct 29, 2023. Azure Synapse Analytics provides a range of built-in roles to manage access to Synapse resources, allowing administrators to control user and application actions within a workspace.
- How To integrate An Azure Storage Account With Azure Active Directory Oct 17, 2023. To integrate an Azure Storage Account with Azure Active Directory, you can use Azure AD authentication for your storage resources. This allows you to control access, implement role-based access control (RBAC), and monitor activities for your storage account within the Azure portal. By doing so, you enhance the security posture of your storage resources and simplify user access management.
- How To Activate Eligible Membership To A Privileged (PIM) Group?Oct 16, 2023. This article provides instructions on how to activate one’s eligible membership to a privileged (PIM) group.
- Custom JWT Token Authentication And Role Authorization Using .Net Core 6.0 Web APIsOct 03, 2023. In this post I specifically talk about Authentication for an ASP.NET Core Web API, Using JWT Tokens, Using Role Based Authorization, Using only ASP.NET's low level Auth features - not using ASP.NET Core Identity.
- KAFKA for Mere Mortals : Topics and partitions in PracticeSep 21, 2023. The main focus in this article is to create, list, describe and delete topics and partitions in KAFKA
- Securing ASP.NET Core Web API with JWT Authentication and Role-Based AuthorizationSep 09, 2023. Securing APIs in an ASP.NET Core Web API involves implementing authentication and authorization mechanisms to protect your resources and ensure that only authorized users can access them. In this example, I'll provide a step-by-step guide on how to secure an ASP.NET Core Web API using JWT (JSON Web Tokens) authentication and role-based authorization.
- Best Practices for Maintaining Security and Preventing Vulnerabilities in C#Sep 01, 2023. This article will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to prevent injection attacks, using parameterized SQL queries, using cryptography to protect sensitive data, using HTTPS to protect data in transit, avoiding hardcoding secrets in code, and keeping code up to date with the latest security patches and updates.
- The Role of Java Standard Tag Library- EL (JSTL-EL) in JSPAug 23, 2023. The JSTL EL or JSTL Expression Language is used by JSP Programmer in order to avoid the usage of Java Code for accessing data.
- Role of AI in Cybersecurity: Safeguarding the FutureJul 20, 2023. As technology advances at an unprecedented pace, so does the sophistication of cyber threats. In this digital age, where data breaches and cyberattacks are prevalent, the role of Artificial Intelligence (AI) in cybersecurity is becoming increasingly vital. AI has the potential to revolutionize the way we defend against evolving threats by detecting anomalies, automating threat response, and enhancing overall security posture. In this article, we will explore the role of AI in cybersecurity and how it can safeguard our digital future.
- Client Credentials Flow - Call Web API to API without user interactionJul 18, 2023. This article shows the way to call API to API with user interaction by using Client Credentials Flow.
- Calling Web API to Web API without User Interaction by using Azure Managed IdentityJun 30, 2023. This article will walk you through connecting two web APIs without any login or user interaction. It is referred to as "Server-to-Server" or "Service-to-Service" communication. You may securely authenticate and authorize the caller web API to access the target web API using Azure Managed Identity, allowing for smooth interaction between the two services. When a Web API with Managed Identity needs to call another Web API, it can use its Managed Identity to authenticate and authorize the request without requiring explicit credentials.
- How Process Models Play a Key Role in Software Development?Jun 28, 2023. The software process model plays a key role in software development. Some of the key roles are given below.
- Roles and Responsibilities of Product OwnerMay 25, 2023. The Product Owner is responsible for defining the product vision, managing requirements, prioritizing the product backlog, collaborating with stakeholders, and making informed decisions to deliver a valuable and successful product.
- Understanding the Role of Metadata in HTMLMay 01, 2023. In this article, you will learn about Metadata Element in HTML5.
- Scrum - Roles, Events And Artifacts Apr 21, 2023. This is an article on Scrum Roles, Events, & Artifacts.
- The Role of Interfaces in JavaApr 21, 2023. Although Java Possesses most of the features of C++, multiple inheritance is not supported by Java.
- Enterprise Architecture And The Role Of Enterprise Architect In The Software WorldApr 04, 2023. As the business landscape continues to evolve, organizations are rapidly adapting to remain competitive in their industries. In the software world, this adaptation necessitates strategic planning and effective management of business processes, technology, and information resources. This is where Enterprise Architecture (EA) and Enterprise Architects come into play. In this article, we will delve into the concept of Enterprise Architecture and explore the role of an Enterprise Architect in the software world.
- The Role Of Datagram In Java NetworkingMar 31, 2023. Datagram is a type of packet that represents an entire communication. There is no necessity to have a connection/disconnection stages when communication using datagrams
- Require Multifactor Authentication For Administrative RolesMar 13, 2023. We learn how to setup multifactor authentication for administrative roles in this tutorial.
- How To Create Model Driven Apps With Security Role RestrictionFeb 08, 2023. How to Create Model Driven Apps With Security Role Restriction.
- AWS - Identity Access ManagementFeb 06, 2023. A guidewire for AWS IAM.
- Datasourceinfo Function In Power Apps And Displaying Forms Dynamically Based On User RoleJan 30, 2023. This article talks about the datasourceinfo function of PowerApps and how it can be leveraged to control the accessibility of forms and other controls to the end users in a PowerApps canvas application
- Role Of Map Interface And Iterator Interface In JavaAug 29, 2022. A map is a special kind of set with no duplicates. In the Collections API, java.util.Map defines this interface.
- How To Check Access On Model Driven Apps For A User In Dynamics 365 CE OnlineJul 21, 2022. In this article, you will learn about Model Driven Apps - Access Checker related to User in Dynamics 365 Online.
- Get User Roles With Webresource In Dynamics CRMJun 15, 2022. In Dynamics 365 CRM, for certain requirements we need to get user roles so that based on those roles we can show or hide few fields or some other core logic. As an example, on selected contact record client api user settings present in Xrm.Utility namespace was used.
- How Can Metaverse Play A Huge Role In The FutureApr 01, 2022. In this article, you will learn why can metaverse play a huge role in the future.
- Assigning A Built-in Role To A User At Resource And Resource Group Scope Using ARM Template Mar 20, 2022. This article is focused on creating an ARM template which will create a storage account resource in the resource group and will assign role at both RG (Resource Group) scope and created storage account resource level
- Assigning A Built-In Role To The Group At Resource Group Scope Level Using PowerShell ScriptsMar 04, 2022. In this article, you will learn how to assign a built-in role to the group at resource group scope level using PowerShell scripts.
- DeFi And Its Role In Revolutionizing The Financial IndustryFeb 08, 2022. DeFi and its role in Revolutionizing the Financial Industry
- SQL Commands : DDL, DQL, DML, DCL, TCL with Examples Jan 27, 2022. Master the art of SQL DDL commands, DCL commands, DQL commands, DML commands, TCL commands for effective database management.
- Jenkins - Role Based Strategy SetupJan 07, 2022. Step by Step Role Based Strategy Plugins implementation in Jenkins
- Restrict Stage Movement Based On Roles Using JavaScript In BPFDec 15, 2021. In certain implementations, BPF Stage movement to be done based on roles. So, this can be achieved by writing custom JavaScript and logic to capture roles of the logged in user. As an example, we consider here same vaccination BPF on Contact record , where for users with role sales man will be restricted for stage movement.
- Prevent Tables From Being Created, Dropped, Or Altered In SQL ServerOct 21, 2021. This tutorial will show you, how to prevent tables from being created, dropped, or altered in SQL Server.
- What is a Chief Technical Officer (CTO)? What is the Role and Responsibilities of a CTO?Sep 07, 2021. In this article, you will learn about Chief Technology Officer (CTO) roles and responsibilities, what a CTO does and how to become a CTO.
- Azure Data Factory - Implement UpSert Using Dataflow Alter Row TransformationJun 18, 2021. In this article, we will learn how to implement UpSert using Dataflow Alter Row Transformation.
- Share Dataverse For Teams Apps And Add Security To Associated TableMay 21, 2021. In this article, you will learn how to grant role based access in Dataverse table which is part of the app.
- Altering Item Insights Security In Microsoft Graph Using REST APIApr 26, 2021. Item insights protection settings give the capacity to arrange the permeability of bits of insights obtained from Microsoft Graph
- Altering Item Insights Security In Microsoft Graph Using PowerShell CommandsApr 23, 2021. Item experiences security settings give the capacity to arrange the perceivability of insights which is got from Microsoft Graph
- Azure RBAC Role Based Access Control Demonstration With Azure App ServiceApr 10, 2021. In this article, you will learn about Azure RBAC Role Based Access Control Demonstration with Azure App Service.
- The Role Of Binding Class In .NETApr 04, 2021. In this article, you will learn about the role of Binding Class in .NET.
- What Is Azure Role-Based Access Control (RBAC)Mar 30, 2021. In this article, you will learn what is Azure Role-Based Access Control (RBAC).
- The Role Of Blockchain In Supply Chain ManagementMar 15, 2021. In this article, you will learn about the role of blockchain in supply chain management.
- Break And Change List Item Permission Using PnP JS In SPFxMar 10, 2021. In this article, we will see how we can break and change the list item permission for particular users using PNP js in SPFx
- Role Of ADO.NETMar 08, 2021. In this article, you will learn about role of ADO.NET.
- The Role Of Blockchain In Voting - Everything You Should KnowDec 23, 2020. In this article you will learn about the Role of Blockchain in Voting: Everything You Should Know.
- The Role Of Low-Code No-Code In The App Development IndustryDec 22, 2020. In this article, you will learn about the Role of Low-Code No-Code in the App Development Industry.
- The Role Of AI, AR, And VR In The Food IndustryDec 21, 2020. In this article, you will learn about the role of AI, AR, and VR in the food industry.
- The Role Of Mobile Responsive Designs In The M-Commerce IndustryDec 18, 2020. In this article, you will learn about the role of mobile responsive designs in the m-commerce industry.
- The Role Of Blockchain As A Service In The Tech IndustryDec 08, 2020. In this article, you will learn about the role of Blockchain as a service in the tech Industry.
- Set Up IAM User And Alert For Budget In AWSOct 14, 2020. This article will discuss IAM users, groups, roles, and policies and also teach how you can set the monthly budget.
- How IT Professionals Must Adjust To Azure Certification ChangesOct 09, 2020. Microsoft Azure is an in-demand cloud platform, and out of all cloud service providers, it is the fastest-growing one, with a 154% YOY growth rate.
- Azure AD Roles Vs Role-Based Access Control (RBAC)Sep 13, 2020. In this article, you will learn about the Difference between Azure AD Roles and Role-Based Access Control (RBAC).
- Login And Role Based Custom Authentication In ASP.NET Core 3.1Sep 11, 2020. In this article, you will learn about login, logout, and role-based Custom Authentication in ASP.NET Core 3.1.
- Implementing An Azure Custom Role Using Azure PowerShellSep 06, 2020. In this article, you will learn how to implement an Azure Custom Role using Azure PowerShell.
- Role Of JSF In A UI FrameworkAug 11, 2020. The evolution of web development began with Servlet technology, which was used to directly generate HTML pages for displaying them on a web browser. Next, came JSP, which is a hybrid between an HTML page and a Servlet. JSP pages enforced the separation of view and application logic.
- Get SharePoint Role Definition ID'sAug 06, 2020. To change SharePoint permission with rest call we need role definition ids. This article is about how to get the SharePoint out of the box and custom role definition ids with example.
- Adding Role Authorization to a ASP.NET MVC Core ApplicationMay 06, 2020. Today, we will look at one of the most important aspects of any application, and that is security. The two main methods to ensure security in an application is using Authentication and Authorization. Authentication can be defined as confirming the user’s identity. That is to confirm the user is who he/she claims to be. The next step is Authorization, where we ensure that the user only has access to functionality that his/her role in the application permits. We will build a sample in an ASP.NET MVC Core application and apply Authentication and Authorization to it.
- Business Analyst and the Scope of the Business Analyst RoleApr 26, 2020. In this article, I explain the roles and scopes of a Business Analyst in an organization.
- DHCP Role On Windows 2019 CoreApr 20, 2020. In this article, I will cover step by step process to install and configure the DHCP server on windows 2019 core server using PowerShell and windows admin center.
- Adding Roles to Registration Razor Page in ASP.NET CoreMar 28, 2020. In this article, we will be creating different roles for our application.
- Scrum Master - Role And ResponsibilitiesFeb 10, 2020. In this article, we will understand What a Scrum Master is and what his/her role is all about, and the responsibilities associated with this role.
- Product Owner - Role And ResponsibilitiesFeb 07, 2020. In this article, we will understand what are the roles and responsibilities of Product Owner and we will do a comparison between similar roles.
- Policy-Based And Role-Based Authorization In ASP.NET Core 3.0 Using Custom HandlerFeb 04, 2020. Authentication is the process of determining or giving an individual access to system or user based on their identity. This article demonstrates how to add custom Policy-based & Role-based Authorization in ASP.NET Core 3.0.
- Authorize ASP.NET Core App By Azure AD Groups Using Graph APIJan 06, 2020. In this article, you will learn how to authorize asp.net core app by Azure ad groups using graph API.
- Roles In Extreme Programming (XP)Dec 31, 2019. In this article, we will learn roles in Extreme Programming (XP).
- What Are Scrum Values and How Do They Help Create a Self-Organized Scrum Team🎎🎎Dec 16, 2019. In this article, we will look at 5 scrum values and how they help create a self-organized scrum team.
- Who is a Product Owner, and What Are The Product Owner's Roles And Responsibilities?💰🤵Dec 03, 2019. In this article, we will learn the role of the product owner in agile project management.
- Role Based Authorization In Blazor Nov 30, 2019. In this post, we will see how to add authentication and role-based authorization using identity framework in Blazor application.
- Manage An Access Review Of Azure Active Directory (Azure AD) Roles In Privileged Identity Management (PIM)Sep 19, 2019. In this article, you will learn how to manage an access review of Azure Active Directory (Azure AD) Roles in Privileged Identity Management (PIM).
- Security Alerts Configuration For Azure Active Directory (Azure AD) Roles In Privileged Identity Management (PIM)Sep 11, 2019. In this article, you will learn about security alerts configuration for Azure Active Directory (Azure AD) roles in privileged identity management (PIM).
- Getting Started With Ansible - Part TwelveSep 10, 2019. This is in continuation of the articles of the series “Learning Ansible”. Here, we will be learning the below topics - Roles in Ansible; Ansible Galaxy
- Azure Active Directory (Azure AD) Role Settings - Configuring Privileged Identity Management (PIM)Sep 03, 2019. In this article, you will learn about Azure Active Directory role settings to configure privileged identity management.
- Assign Eligibility Azure Active Directory (Azure AD) Roles In Privileged Identity Management (PIM)Aug 22, 2019. In this article, you will learn how to assign eligibility Azure Active Directory (Azure AD) roles in Privileged Identity Management (PIM).
- Activate My Azure Active Directory (Azure AD) Roles In Privileged Identity Management (PIM)Aug 19, 2019. In this article, you will learn how to activate my Azure Active Directory (Azure AD) roles in Privileged Identity Management (PIM).
- Role Of SQL Like And WildcardsAug 09, 2019. In this session, I will discuss SQL Like and wildcard characters in SQL Like. I will also discuss why and how to use SQL queries.
- Securing Access With Privileged Identity Management For Azure Active Directory RolesJul 27, 2019. In this article, you will learn how to secure access with privileged identity management for azure active directory roles.
- Role-Based Menus In ASP.NET MVCJul 23, 2019. In this article, you will learn about role-based menus in ASP.NET MVC.
- Role Based Authentication In ASP.NET MVCJul 22, 2019. Learn how to implement role based authentication in ASP.NET MVC Web app.
- Evolution Of Crypto Markets - Role Of IEOs And Futures ContractsJul 08, 2019. In this article, you will learn about the role of IEOs and Futures Contracts.
- Managing Roles And Permissions In Custom ApplicationsMar 05, 2019. In this article, we will learn different ways of defining user roles for a SaaS application along with the merits and demerits of each way.
- Access Entity Based On N:N Relationship For Dynamics 365 PortalSep 28, 2018. Securely access entities based on N: N relationships in Dynamics 365 Portals by configuring appropriate security roles and permissions. Customize relationship behavior to ensure efficient data management and user access within your portal environment.
- Publishing Azure Worker Role By Uploading Your PackageSep 13, 2018. In this article, I will be explaining how to publish an Azure Worker Role uploading your package to Azure portal.
- Creating Custom Role Manager In ASP.NET MVC 5Sep 06, 2018. In this article, we are going to learn how to create and use custom role manager in ASP.NET MVC in step by step way.
- Publishing Azure Worker Role Using The Publish WizardSep 05, 2018. This article provides a detailed guide on publishing an Azure Worker Role project to Azure using the Wizard mode in Visual Studio. It outlines the steps involved in setting up the project, selecting Azure subscription, configuring diagnostics preferences, reviewing settings, and completing the publishing process.
- Azure Worker Role With Quartz.NETAug 21, 2018. In this article, I will be explaining the usage of Azure Worker Role along with Quartz.Net and a practical example showing 3 differents jobs running under the same worker role.
- Role Base Authorization In ASP.NET Core 2.1Aug 18, 2018. Authorization is a process that determines what a user is able to do. For example, an Admin user is allowed to install/remove a software from a computer and a non-Admin user can use the software from the computer. It is independent and orthogonal from authentication. However, authorization requires an authentication mechanism. For applications, the first step is always authentication and then authorization.
- ASP.NET Core 2.0 User Role Base Menu Management Using Dependency InjectionApr 03, 2018. In this article we will see in detail how to display role based dynamic menu after user logs in. For this we will create a Menu Master table and insert few records to display the menu and URL to menu based on logged in user role.
- Getting Started With ASP.NET Core 2.0 Identity And Role ManagementMar 17, 2018. In this article, we will see in detail how to use ASP.NET Core Identity in MVC Application for creating user roles and displaying the menu depending on user roles.
- Worker Role In Azure Cloud ServiceJan 02, 2018. From this article, you will learn how to play with worker role in Azure cloud service
- Role And Responsibilities Of A Project ManagerDec 30, 2017. In this article, I have stated some key roles and responsibilities of a project manager.
- List Of Users With Roles In ASP.NET MVC IdentityDec 18, 2017. This article demonstrates how to list users with associated user roles using Identity in ASP.NEt MVC applications.