Sadie  Ratke

Sadie Ratke


Overview of Microsoft Azure Services

As part of Highway to a 100 Unicorns initiative, Watch Vinayak Hegde -CTO-in-Residence at Microsoft for Startups, giving an overview of Azure services across IaaS, Databases and Data Stores, DevOps, Analytics, Security, Containers, IoT and Machine learning on #ScaleUpThursdays.


What is GEEK

Buddha Community

Overview of Microsoft Azure Services
Ssekidde  Nat

Ssekidde Nat


Developing Middleware With Microsoft Azure Service Bus And Functions


A middleware is a software service that glues together multiple services. In today’s business needs, multiple software services and technologies need to work together and communicate with each other. It is not necessary that these distributed software services are compatible with each other and will be able to communicate.

Example Business Case

We have to develop a software service in which we have geo-coordinates of a location and we need to get weather information of the city based on those coordinates. We have a system X that needs to communicate with another system Y. These are distributed systems. System X has information about geo coordinates and system Y will store weather information of the city based on those coordinates.


We will develop a middleware between system X and system Y.

Middleware Architecture

  1. System X will send geo coordinates to the receiver service (Http Triggered Azure Function) of the middleware in JSON format.
  2. Receiver service will call reverse geocoder API and will extract city name from the response and finally sends the city name to the Service Bus queue.
  3. Sender service will receive city name from service and call weather API and send weather data to System Y (Service Bus Queue Triggered Function).
  4. System Y will receive weather information from the sender service and store it (For sake of simplicity, we will log the information at Sender Service).


  1. Microsoft Azure Subscription.
  2. Deployed Service Bus resource on Microsoft Azure Portal.
  3. Postman for testing
  4. Visual Studio 2019
  5. .NET Core 3.1

#functions #microsoft azure service #microsoft azure #azure

Aisu  Joesph

Aisu Joesph


Securing Microsoft Active Directory


K-means is one of the simplest unsupervised machine learning algorithms that solve the well-known data clustering problem. Clustering is one of the most common data analysis tasks used to get an intuition about data structure. It is defined as finding the subgroups in the data such that each data points in different clusters are very different. We are trying to find the homogeneous subgroups within the data. Each group’s data points are similarly based on similarity metrics like a Euclidean-based distance or correlation-based distance.

The algorithm can do clustering analysis based on features or samples. We try to find the subcategory of sampling based on attributes or try to find the subcategory of parts based on samples. The practical applications of such a procedure are many: the best use of clustering in amazon and Netflix recommended system, given a medical image of a group of cells, a clustering algorithm could aid in identifying the centers of the cells; looking at the GPS data of a user’s mobile device, their more frequently visited locations within a certain radius can be revealed; for any set of unlabeled observations, clustering helps establish the existence of some structure of data that might indicate that the data is separable.

What is K-Means Clustering?

K-means the clustering algorithm whose primary goal is to group similar elements or data points into a cluster.

K in k-means represents the number of clusters.

A cluster refers to a collection of data points aggregated together because of certain similarities.

K-means clustering is an iterative algorithm that starts with k random numbers used as mean values to define clusters. Data points belong to the group represented by the mean value to which they are closest. This mean value co-ordinates called the centroid.

Iteratively, the mean value of each cluster’s data points is computed, and the new mean values are used to restart the process till the mean stops changing. The disadvantage of k-means is that it a local search procedure and could miss global patterns.

The k initial centroids can be randomly selected. Another approach of determining k is to compute the entire dataset’s mean and add _k _random co-ordinates to it to make k initial points. Another method is to determine the principal component of the data and divide it into _k _equal partitions. The mean of each section can be used as initial centroids.

#ad #microsoft #microsoft-azure #azure #azure-functions #azure-security

Shawn  Durgan

Shawn Durgan


Implement Azure AD Client credentials flow using Client Certificates for service APIs

This post shows how to implement an Azure client credential flows to access an API for a service-to-service connection. No user is involved in this flow. A client certificate (Private Key JWT authentication) is used to get the access token and the token is used to access the API which is then used and validated in the API. Azure Key Vault is used to create and provide the client certificate.


Create a client certificate in Azure Key Vault

A self signed certificate with a key size of at least 2048 and key type RSA is used to validate the client requesting the access token. In your Azure Vault create a new certificate.

Download the .cer file which contains the public key. This will be uploaded to the Azure App Registration.

Setup the Azure App Registration for the Service API

A new Azure App Registration can be created for the Service API. This API will use a client certificate to request access tokens. The public key of the certificate needs to be added to the registration. In the Certificates & Secrets, upload the .cer file which was downloaded from the Key Vault.

No user is involved in the client credentials flow. In Azure, scopes cannot be used because consent is required to use scopes (Azure specific). Two roles are added to the access token for the application access and these roles can then be validated in the API. Open the **Manifest **and update the “appRoles” to include the required roles. The **allowedMemberTypes **should be Application.

#app service core #aspnet5 #azure key vault #7523 #azpacr #azure #azure app registration #client credentials #jwt #key vault #microsoft.identity.client #microsoft.identity.web #oauth #oauth2 #private key jwt authentication #rfc7523

What is Microsoft Azure?

It’s one of the leaders in the cloud computing space, but what is Azure cloud and what is it used for? This ACG Fundamentals episode will give you a high-level overview of Microsoft Azure cloud, so you can understand this cloud computing platform’s strengths and weaknesses, use cases, market share and competition, and how the Azure services all work together.

Introduction (0:00)
Azure Infrastructure (1:07)
Azure Competitors (3:43)
Azure Strengths and Weaknesses (4:18)
Azure Use Cases (6:12)
What’s Next? (7:39)

#microsoft azure #azure #what is microsoft azure?

Lindsey  Koepp

Lindsey Koepp


In-Depth Guide to Connecting your AWS and Microsoft Azure Virtual Private Networks (VPN)

Let’s say that you have spent the last 2 years developing your enterprise services in either of the two cloud providers and now you decide to start using the other one. A possible scenario that would bring about such a requirement could be a migration from one cloud service provided to the other.

Or maybe you’ve heard about that brand new AWS or Azure service that is not available in the competing provider and you want to integrate it into your workflow no matter what.

Another scenario could be if you would like to combine services between the providers, but still keep everything behind your well protected and highly secure private network gateway. For all of the above cases, you should consider establishing a secure link between your two private networks. There is a variety of options available to achieve that, but probably the most straightforward is to connect your AWS VPC with the Azure Virtual Network using a VPN Gateway and site-to-site connectivity.

Underlying infrastructure

This guide assumes that you have already setup correctly the following resources in the cloud providers:

  1. AWS VPC with a public and private subnet (default configuration)
  2. Azure Virtual Network
  3. Azure Virtual Network Gateway

If you haven’t yet created any of the previous resources, you may use the service provider’s documentation guides to do that.

For AWS VPC use this:

For Azure Virtual Network and VPN Gateway use this:

Note down the IP address range for each one of your cloud networks, you will need it later when setting up the routing table.

You can find AWS VPC network range if you open the VPC service under the Networking & Content Delivery category. Then from “Your VPCs” you can check the IPv4 CIDR column in screen 1. In our depicted example you can see that the IP range is

Screen 1: AWS VPC IPv4 CIDR

#aws #azure #vpn #cloud-computing #amazon #amazon-web-services #microsoft-azure #microsoft