Andrew Wilson's Blog

{ ... Plan - Architect - Develop - Reflect - Improve - Repeat ... }

Windows Terminal | Azure Customisation for PowerShell

If you haven’t already, placing a customisation on your command prompt for PowerShell is a great way to gain extra context in given activities. For example, if you would like to have a comprehensive overview of your Git status summary information, then posh-git is for you. Be Careful: Adding …


Azure RBAC Key Vault | Role Assignment for Specific Secret

Background Azure role-based access control (Azure RBAC) provides fine grained control over access to Azure resources. Azure RBAC is founded on top of the Azure Resource Manager which allows us to provide access authorisation at differing scope levels ranging from the Management Group through to …


Azure API Management | Unintentional Pass through of Subscription Key Header

Problem Space There is a potential unintentional side effect when you add a APIM subscription key as a header to an inbound request. The header is not stripped from the request prior to being sent to the configured backend service. Rather it is retained. If you manage the backing service and are not …


Desired State Configuration | Project DSC

Problem Space I have often found myself with a peeked interest into any method that will simplify both the on-boarding and return to a given project. Why the interest you may ask… Well, in most cases when working on a given project (Greenfield or Brownfield), one member of the team will scout …


BizTalk | Replacing Strong Name Keys

Background Strong Names provide .NET Framework assemblies with unique identities. When the .NET Framework loads a strong-named assembly for a referring assembly, it verifies the strong name signature. If the strong name signature of the assembly cannot be verified, the .NET Framework will not load …


Latest post: February 3, 2026
Latest post: December 3, 2025
Latest post: September 17, 2025
Latest post: November 26, 2024