Azure - Temporary e-mail blog !

Dive into the world of knowledge without taking yourself too seriously. From the demystification of complex subjects to jokes that defy convention, we're here to rattle your brain and bring a wry smile to your face. 🤓🤣

Limiting User Access to Data in Azure Tenants
Alice Dupont
6 April 2024
Limiting User Access to Data in Azure Tenants

Managing Azure tenant security entails putting plans in place to stop illegal access to user information. Administrators can restrict users' or groups' access to critical information by creating custom roles and assigning them to users or groups using the Azure CLI and PowerShell scripts.

Retrieving User Account Data from Azure Application Insights
Gerald Girard
4 April 2024
Retrieving User Account Data from Azure Application Insights

To extract user details, e.g., firstname, lastname, and contact details from Azure Application Insights, direct queries in Kusto Query Language (KQL) are utilized, together with JavaScript and Azure SDK for backend service integration. The methods include using Azure Identity for authentication, integrating request data with custom event data, and gaining programmatic access through the MonitorQueryClient.

Email Distribution Optimization in C# Using Azure Communication Services
Gerald Girard
1 April 2024
Email Distribution Optimization in C# Using Azure Communication Services

To maintain efficiency and compliance, managing outbound communications in software applications—especially those that depend on Azure Services for sending notifications—requires a balanced strategy. By limiting the volume of messages, the solutions under discussion seek to improve user experience while preserving system integrity.

Maintaining Constant Email Automation in Shared Mailbox Azure Logic Applications
Daniel Marino
26 March 2024
Maintaining Constant Email Automation in Shared Mailbox Azure Logic Applications

Handling Office 365 To avoid token expiration problems, Azure Logic Apps API connections—especially for actions containing shared mailboxes—need to be handled carefully. The reliability and security of these connections can be greatly improved by adopting secure techniques like the principle of least privilege and using Azure Functions for token refresh.

Custom MailFrom Address Enablement in Azure Email Communication Service
Gabriel Martim
25 March 2024
Custom MailFrom Address Enablement in Azure Email Communication Service

Configuring MailFrom addresses to improve brand exposure and credibility among receivers is a common part of managing Azure Email Communication Services. A validated domain with the appropriate SPF, DKIM, and perhaps DMARC configurations is needed in order to successfully create a custom MailFrom address. Users might, however, run across problems like a disabled "Add" button that keeps them from changing their MailFrom preferences.

Adding HTML and Links to Customize Azure AD Invitation Emails
Daniel Marino
22 March 2024
Adding HTML and Links to Customize Azure AD Invitation Emails

Enhancing the onboarding experience involves tailoring the Azure AD user invitation process to incorporate HTML material and hyperlinks. Organizations can provide prospective users a more interesting and educational introduction to their systems by including more dynamic features in the welcome emails.

Python Apps: Using Azure B2C Authentication to Retrieve User Emails
Gerald Girard
19 March 2024
Python Apps: Using Azure B2C Authentication to Retrieve User Emails

Combining Azure AD B2C with a Flask web application written in Python offers a strong way to handle user authentication and safely handle user data. To retrieve user emails, the procedure makes use of the Microsoft Graph API. Token acquisition is handled efficiently in order to authenticate requests.

Extracting Phone Recovery Email from Azure AD B2C: A Guide
Gerald Girard
10 March 2024
Extracting Phone Recovery Email from Azure AD B2C: A Guide

User data migration within Azure Active Directory B2C (AAD B2C) poses a number of difficulties because of the platform's security and privacy policies, particularly with regard to unique qualities like the Phone Recovery Email.