We've all been using online video conferencing tools over the past few months. Some of us use Teams, others use Zoom.
Many of these platforms are built on WebRTC, even though we might not realize it, nor do we know how it works.
In this session I'll introduce you to WebRTC, how it can be used and show you how to use it in a browser.
Passionate programmer, currently working as a .NET developer at Axxes.
There are multiple options in Azure to create your resources like VMs, databases or Web Apps. The Azure Resource Manager is one of them and ideal for infrastructure as code scenarios. In this session we will spend a few minutes on the basics of ARM and then quickly go into more depth on the advanced ARM-template topics! First, we will talk about how to organize your templates. As with normal code, we will try to create nicely structured and reusable templates. Linked templates can help tremendously with that so we will dive in those as well. We will look at quite some interesting template functions because they will make our templates more powerful and reusable. KeyVault comes in to play to show you how we can store our secrets or certificates there and have them available during deployment of our infrastructure. Last but not least I will show you how to use the array and object parameters to handle input in more complex scenarios and deploy your templates using Azure DevOps.
Erwin Staal is a Azure Architect and DevOps Consultant at 4DotNet (Meppel, the Netherlands). He has over more than 10 years of experience with both small and large organizations. He likes to immerse himself in the latest technologies. Currently he is working a lot with ASP.NET Core, Docker and Kubernetes. As a DevOps Consultant he helps companies with the implementation of DevOps and Continuous Delivery.
Compared to a decade ago, the meaning of authentication has changed significantly. Modern applications not only authenticate users but also rely on authentication for API access and inter-service communication. Authentication mechanisms still include passwords, but also rely on API keys, signed JWT tokens, and cryptographic authenticators. With so many options to choose from, making the right choice becomes a difficult challenge.
In this session, we explore several authentication recipes for different scenarios. We will discuss authentication in API-based applications, microservice architectures, and, of course, modern user authentication scenarios. At the end of this session, you will be able to choose the right authentication mechanism for your application according to current best practices.