In the first part, we look at the architecture for the sample application.
How to offload cryptographic operations to Azure Key Vault such that your application never has to handle the private keys.
In the third part we look at how the orchestrator function triggers activity functions and handles their results
In the second part we take a look at what Durable Functions does under the hood when you tell it to start an orchestration
In the first part we will look at what happens during the startup process of an instance in Durable Functions
Attempt to build something similar to .NET Fiddle, running untrusted C# code in a container sandbox
The new isolated process model for .NET Azure Functions allows usage of middleware, which we can use to implement authentication and authorization
How to add existing users with social accounts to Azure AD B2C using the Microsoft Graph API
How to bind multiple values from a URL to an array parameter
Azure AD authentication for Cosmos DB data plane is now in preview, so let's see how we can access it with no keys