Introduction

Completed

A common challenge for developers is the management of secrets and credentials used to secure communication between different components making up a solution. Managed identities eliminate the need for developers to manage credentials.

After completing this module, you'll be able to:

  • Explain the differences between the two types of managed identities
  • Describe the flows for user- and system-assigned managed identities
  • Configure managed identities
  • Acquire access tokens by using REST and code