Skip to main content

191 posts tagged with "Azure"

View All Tags

User-Assigned Managed Identity vs Service Principal (WIF)

· 9 min read

Service Principal vs User‑Assigned Managed Identity? This came up again for me recently while deciding what to standardise on for Infrastructure as Code deployments.

Now that Workload Identity Federation (WIF) is broadly supported, it’s pretty simple to move a traditional service principal off a client secret and onto federated credentials – or create it that way from day one. So why bother with a user‑assigned managed identity (UAMI)?

Because I've formed a preference over the last couple of years: for most DevOps / platform automation scenarios, I'll reach for a User‑Assigned Managed Identity with WIF before I create (yet another) service principal. This post walks through the why, plus where a service principal still makes sense.

MCP Server with Azure Functions & Communication Services

· 5 min read

Azure Communication Services can be used to add voice, video, chat, and SMS and email capabilities to applications. It is a fully managed communication platform that enables developers to build rich communication experiences. Today, we will explore the email capability through an MCP (Model Context Protocol) server hosted on Azure Functions, enabling us to send emails from any MCP client.

Azure Function App Host Runtime Error

· 2 min read

You might be deploying to Azure Functions or attempting to retrieve the Function App URL, and you may encounter errors like:

  • Encountered an error (BadGateway) from host runtime.
  • Encountered an error (InternalServerError) from host runtime.

Secure Isolated Recovery Environment in Azure

· 11 min read

Today, we are going to delve into the importance of a Secure Isolated Recovery Environment (SIRE) for Microsoft Azure and why organizations should consider implementing this pattern as a critical component of their cybersecurity and business continuity strategy.

A SIRE is designed to ensure that, even in the event of a severe cybersecurity incident-such as a ransomware attack-organizations have a secure, isolated space to recover essential systems and data. This approach is increasingly vital given the evolving threat landscape.