Beneath Abstraction

馃憢 Welcome to my blog!

  • Dive into the in web, cloud, AI and application development tools, techniques and technology.
  • The blog is packed with tips, guides, and the newest trends to keep you ahead.

Understanding and Mitigating Prompt Injection Attacks with Prompt Shield in Azure AI Studio

Understanding and Mitigating Prompt Injection Attacks with Prompt Shield in Azure AI Studio Introduction In the fast-changing landscape of Generative AI and its applications, keeping AI models secure and reliable is very important. Prompt injection is one of the prominent attack identified against AI Implementations. Azure AI Studio offers a solutions to tackle these threats and is called Prompt Shield. This blog will explain what prompt injection attacks are, their possible effects, and how Azure AI Studio鈥檚 Prompt Shield can protect against them....

July 13, 2024 路 4 min 路 685 words 路 Me

Enhancing Language Models Using RAG Architecture in Azure AI Studio

This guide will walk you through the process of enhancing language models using RAG architecture in Azure AI Studio. Retrieval-Augmented Generation (RAG) enhances Large Language Model (LLM) capabilities, like those of GPTs, by integrating an information retrieval system. This addition grounds data and controls the context for the LLM鈥檚 response generation.

June 21, 2024 路 5 min 路 970 words 路 Me

Configuring Azure Application Gateway for API Management Traffic Routing

Introduction Azure Application Gateway provides a powerful solution for load balancing, SSL termination, and URL-based routing. In this blog post, we will discuss a common scenario where we need to forward traffic to two different Azure API Management instances based on the incoming URL, distinguishing between non-production and production environments. Problem Statement Consider a scenario where you have two separate instances of Azure API Management (Sku: any non consumption tier): one for non-production/testing (nonprod) and the other for production (prod)....

December 2, 2023 路 3 min 路 454 words 路 Me

Dynamic Menu in MAUI

Context The requirement here is to be able to add dynamic menu items to a MAUI app. The use case chosen here is of selection of a font from a list of fonts installed on the machine. The list of fonts is shows under a menu item in the menu bar. More on menu bar from the Microsoft documentation Approach Step 1: Mark up The component to be used here is the MenuBarItem....

September 26, 2022 路 2 min 路 402 words 路 Me

Securely calling Azure API from PowerApp Portal

Context Powerapps Portal gives a quick and easy way to build public facing websites. Data in the portal is mostly fetched from Microsoft Dataverse using Powerplatform FetchXML or the portal鈥檚 Web API. These operations are secured using portal鈥檚 application session, as explained here. Often there are requirements to consume an externally hosted API, in this particular example an API hosted in Azure behind an API Management. With Javascript the only option to trigger an API, implementing a secret based authentication is out of scope....

June 19, 2022 路 3 min 路 594 words 路 Me

Exposing Azure Storage container via SFTP

Context While most of the application integration patterns are moving towards real-time, near-real-time and stream based solutions, there are still requirement to have batch file based data movement. These requirements are often for reporting or data warehousing scenario or while integrating with a legacy system. While there are many products that help setup SFTP server, Azure was missing a SaaS offering for hosted SFTP server, like Amazon鈥檚 AWS Transfer on top of S3....

June 13, 2022 路 3 min 路 585 words 路 Me

Client Certificate authentication using Azure API Management

Introduction APIs have become so popular that almost all websites and applications rely on APIs to get data from server. Often user impersonation is used to authenticate as well as authorize access to the resource exposed by an API, but there are also use cases where application itself needs data from an API for functioning. Currently the most used authentication mechanism is OAuth, where identity management is performed by a third provider and both the client and resource server trusts this identity provider....

February 27, 2022 路 6 min 路 1225 words 路 Me