After the last two post, now we can focus on PKI implementation. The use case is software testing, where we need to create and recycle…
Following the last post on PKI, we’ll discuss automation of certificate issuance. Two key activities to automate are: validation of the requestor and issuance of…
Lola is a girl name, of Spanish origin meaning “sorrows.” She is 15 month old now, weighing around 30 pounds. She is a mini goldendoodle, an…
I discussed in my previous post on workload identity and dived into how it works in AKS (Azure Kubernetes Service). In this post I will…
As applications are moved to the cloud, the application workload hosted on virtual machines need to interact with cloud resources. For this, we need an…