Further reading
For additional information on the topics covered in this chapter, you may find the following resources helpful:
- Connecting from your application to resources without handling credentials (https://learn.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview-for-developers?tabs=portal%2Cdotnet)
- How managed identities for Azure resources work with Azure virtual machines (https://learn.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/how-managed-identities-work-vm)
- Authentication in Azure Key Vault (https://learn.microsoft.com/en-us/azure/key-vault/general/authentication)
- Manage Key Vault using the Azure CLI (https://learn.microsoft.com/en-us/azure/key-vault/general/manage-with-cli2)
- Best practices for using Azure Key Vault (https://learn.microsoft.com/en-us/azure/key-vault/general/best-practices)
- Metasploitable 2 Exploitability Guide (https://docs.rapid7.com/metasploit/metasploitable...