less than 1 minute read

This is a long overdue article (probably a series) about how corporate IT security is often forcing “security through obscurity” and how it is not helping anyone. The first in the series is going to address deployments and authentication - and the things we encountered while deploying Power Platform solutions in customer tenants.


To submit comments, go to GitHub Discussions.