Course info
Apr 15, 2020
1h 31m
Your 10-day individual free trial includes:

Expert-led courses

Keep up with the pace of change with thousands of expert-led, in-depth courses.

Headless processes commonly referred to as daemons or services have no opportunity to present an authentication user interface. Yet they must be able to access Azure AD protected resources. In this course, Developing Daemons and Services Protected by Azure Active Directory, you’ll learn to securely call Azure AD protected APIs from headless processes. First, you’ll explore the flows available to headless applications and the basics of service principals. Next, you’ll discover how to perform client credential flow with both REST or APIs on .NET, NodeJS and Python. Finally, you’ll learn how to master managed identities when working in Azure. When you’re finished with this course, you’ll have the skills and knowledge of the various facilities Azure AD offers needed to author headless applications that need to call secure APIs in Azure.

About the author
About the author

Sahil Malik has been a Microsoft MVP for the past 8 years, author of several books and numerous articles in both the .NET and SharePoint space, consultant, and trainer who delivers talks at conferences internationally.

More from the author
More courses by Sahil Malik
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hello. My name is sorry, Mike, And welcome to my course. Developing demons and service is protected by azure Active Data Creek. Headless process is also known as service is. Our demons are an essential part ofit. Architecture in the cloud where the Layton Cesaire high and responsiveness is important, you will frequently use service is to do background tasks. These background tass frequently need to call a p I, such as Microsoft Draft or really any other AP I protected by Azure 80. In this course, I explain how you can offer service. Is that need to call azure 80 protected AP eyes. I explain the details off Klein credential flow at a political level and then using no jazz, python and dark net core. I don't explain a very exciting capability in Azure Carla's managed identities, which can also be used to call a P I securely and, yes, lots of architectural guidance and other details interspersed throughout this course. At the end of this course, she will be well equipped in using the facilities that Azure and Azure 80 offer in authoring service's and demons that called Azure Eddie protected AP eyes. I hope you find this course useful and thank you very much for watching