In the previous post, we used ClientSecretCredential Token Credential to read the secret from the Key Vault. In this post, we’d use UsernamePasswordCredential class instead.
Keys – Encryption keys (asymmetric – public/private), can be created in Key Vault or imported, stored in software or HSD
Secrets – unstructured text, can be created or imported, stored in the software.
Certificates – can be created or imported, contains 3 part – cert metadata, key and secret
Key Vault provides data protection – at rest, in transit, and use.
Key Vault provides Application Security i.e. instead of saving secrets hardcoded in the application, or the configuration files, the secrets can be stored in Key Vault.
When I was writing this post, I felt the environment that I set up did not enhance my ability to write code. The reason for this is because I use jsdom, which is a mock object for the HTML component. Because it is not a real object of HTML, my focus has been changed to the test code instead of writing the implementation code.
I ask my friend about how it is hard to implement unit testing in PCF Development (I need to install various NPM Packages to do the testing only. Most of the time because standard HTML API is not there!). Then he replied that Node.Js is not the same as Javascript in HTML. It means that PCF runs in Node.js for development, but we rely on browsers instead of Node.js functions. So my focus is set once again to make it better. We…
Make sure the account (service principal) used has the Storage Blob Data Contributor or Storage Blog Data Owner role assigned required for uploading the files.
Run the command.
We can see the folder and files successfully transferred.
Check other posts –
Transfer files using – Azure Blob Upload task and Premium File transfer task using SSIS Package