<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Why Not Secure Your Keys and Secrets? Asp Net Core with Azure Key Vault Integration	</title>
	<atom:link href="https://sibeeshpassion.com/why-not-secure-your-keys-and-secrets-asp-net-core-with-azure-key-vault-integration/feed/" rel="self" type="application/rss+xml" />
	<link>https://sibeeshpassion.com/why-not-secure-your-keys-and-secrets-asp-net-core-with-azure-key-vault-integration/</link>
	<description>My passion towards life</description>
	<lastBuildDate>Sat, 01 Oct 2022 14:34:41 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		By: Post Messages to Microsoft Teams Using Python &#8211; Sibeesh Passion		</title>
		<link>https://sibeeshpassion.com/why-not-secure-your-keys-and-secrets-asp-net-core-with-azure-key-vault-integration/#comment-4899</link>

		<dc:creator><![CDATA[Post Messages to Microsoft Teams Using Python &#8211; Sibeesh Passion]]></dc:creator>
		<pubDate>Sat, 01 Oct 2022 14:34:41 +0000</pubDate>
		<guid isPermaLink="false">https://sibeeshpassion.com/?p=14244#comment-4899</guid>

					<description><![CDATA[[&#8230;] Key Vault is as easy as you set up any other Azure Resource. You may get the steps required from this post or this. Add a new secret and paste the Webhook Url value you copied [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Key Vault is as easy as you set up any other Azure Resource. You may get the steps required from this post or this. Add a new secret and paste the Webhook Url value you copied [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Get Users From Different Tenants Using Azure AD Application Permission &#124; by Sibeesh Venu &#124; Feb, 2021 - YTC		</title>
		<link>https://sibeeshpassion.com/why-not-secure-your-keys-and-secrets-asp-net-core-with-azure-key-vault-integration/#comment-4685</link>

		<dc:creator><![CDATA[Get Users From Different Tenants Using Azure AD Application Permission &#124; by Sibeesh Venu &#124; Feb, 2021 - YTC]]></dc:creator>
		<pubDate>Wed, 03 Feb 2021 00:38:22 +0000</pubDate>
		<guid isPermaLink="false">https://sibeeshpassion.com/?p=14244#comment-4685</guid>

					<description><![CDATA[[&#8230;] Here we are creating a client credential provider with our tenant given and then create a graph client using that provider. Sounds good? We are getting all the other values from our configuration. In the non-development environment, I am loading the secret from a Key Vault, and for the development environment I load them using the secret.json file, I have already written a blog post about this, you can read it here. [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Here we are creating a client credential provider with our tenant given and then create a graph client using that provider. Sounds good? We are getting all the other values from our configuration. In the non-development environment, I am loading the secret from a Key Vault, and for the development environment I load them using the secret.json file, I have already written a blog post about this, you can read it here. [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Get Users From Different Tenants Using Azure AD Application Permission &#8211; Sibeesh Passion		</title>
		<link>https://sibeeshpassion.com/why-not-secure-your-keys-and-secrets-asp-net-core-with-azure-key-vault-integration/#comment-4684</link>

		<dc:creator><![CDATA[Get Users From Different Tenants Using Azure AD Application Permission &#8211; Sibeesh Passion]]></dc:creator>
		<pubDate>Tue, 02 Feb 2021 17:39:06 +0000</pubDate>
		<guid isPermaLink="false">https://sibeeshpassion.com/?p=14244#comment-4684</guid>

					<description><![CDATA[[&#8230;] Here we are creating a client credential provider with our tenant given and then create a graph client using that provider. Sounds good? We are getting all the other values from our configuration. In the non-development environment, I am loading the secret from a Key Vault, and for the development environment I load them using the secret.json file, I have already written a blog post about this, you can read it here. [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Here we are creating a client credential provider with our tenant given and then create a graph client using that provider. Sounds good? We are getting all the other values from our configuration. In the non-development environment, I am loading the secret from a Key Vault, and for the development environment I load them using the secret.json file, I have already written a blog post about this, you can read it here. [&#8230;]</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
