Managing Secrets

Managing the secrets must be considered at different levels: Source Code Level for example hard coded in source code. Repository Level for example Git/ Git Hub. Infrastructure Level for example for developing the infrastructure as code. Source Code Level To prevent to have secrects at code level, it’s enough not to write the users, passwords,Continue reading “Managing Secrets”

Azure API Management

Export API definition for developers The developers can export the API definition in OpenAPI JSON format and WADL from API Management Developer Portal. And the developers can use these files to generate client-side code by using the tools, which is adequate for them such Swagger codegen or Postman to start calling the API in aContinue reading “Azure API Management”

Azure Service Fabric

Related words for the Service Fabric in Microservice Architecture: Dockre DC/OS Mesos Kubernetes Microservices Development possibilities on Azure Cloud: Azure function Kubernetes Service Service Fabric Azure Function Kubernetes Service Azure Service Fabric – They are micro-microservices.– reactes to an external change & event arrived on service bus. E.g. Blob created, message arrived on a queueContinue reading “Azure Service Fabric”

Security aspects in code

There are different aspects which must be considered in source code for a better code quality and security. Some of them from the past time that we didn’t upload our source code in GitHub or other code repositories like: Data injection Database connection string Some other aspects belong to nowadays that we upload code toContinue reading “Security aspects in code”

Fluent Interface

In software engineering, a fluent interface is a method for designing object oriented APIs based extensively on method chaining with the goal of making the readability of the source code close to that of ordinary written prose, essentially creating a domain-specific language within the interface [Wiki]. For example for Stablishing a connection to a databaseContinue reading “Fluent Interface”

DevOps Built-in Access Levels, Security Groups and AAD Groups

Scenario: in large organizations it’s so important that not all the colleagues who are working together on a project to be able to release/ deploy the product in production environment. There must be always a check list to get ready for deploying in production. Nowadays this check list is called continuous integration/deploy (CI/CD). Therefore theContinue reading “DevOps Built-in Access Levels, Security Groups and AAD Groups”