Endjin - Home

Security

NDC London 2020 – My highlights

by Ed Freeman

A couple of weeks back, along with a rabble of other endjineers, I was fortunate enough to attend NDC London. This wasn’t my first time at an NDC conference – in fact, my previous outing was to Oslo to experience the “original” flavour of NDC back in 2018. That was extremely fun and packed with […]


Building a secure solution on Azure can be a daunting task. Using Azure Functions and Managed Identities, we have built up a pattern for giving services access to one another, woithout the need to store credentials. These managed identities can be given access to necessary resources. For example, they can be granted roles and added to access control lists in ADLS Gen2 accounts, or the ability to access keys in key vault. This means that data can be securely accessed without needing to store connection strings or app passwords.


The complexities around Azure Active Directory can be difficult to understand. This post runs through some of the key concepts – AAD apps, service principles, managed identities, and walks through an example of how to set some of this up!


Cloud Adoption: Risks & Mitigations Analysis

by Howard van Rooijen

Guest Blogger – Barry Smart IT Director & Partner, Hymans Robertson Barry is IT Director at Hymans Robertson, the largest independent firm of consultants and actuaries in the UK. He is responsible for leading the firm’s technology strategy. The firm is turning increasingly to technology to enhance and extend the services it provides to clients. […]