Using Azure Key Vault to manage your secrets

Using Azure Key Vault to manage your secrets

This article is contributed. See the original author and article here.

TLDR; this article tells you why you should use Azure KeyVault to store and manage your secrets. Furthermore, it takes you all the way from local development to deployed on Azure (there are some differences in how to authenticate).


 


pexels-pixabay-39389.jpg


 


Azure Key Vault service is a service on Azure. It’s a vault for your secrets that is encrypted. It solves the following problems:



  • Secrets Management – Azure Key Vault can be used to Securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets.

  • Key Management – Azure Key Vault can also be used as a Key Management solution. Azure Key Vault makes it easy to create and control the encryption keys used to encrypt your data.

  • Certificate Management – Azure Key Vault is also a service that lets you easily provision, manage, and deploy public and private Transport Layer Security/Secure Sockets Layer (TLS/SSL) certificates for use with Azure and your internal connected resources.


 


Why use it


Key Vault greatly reduces the chances that secrets may be accidentally leaked. There are also some additional benefits such as:




  • Secrets are separate from code Application developers no longer need to store security information in their application.




  • Access via URIs. Your applications can securely access the information they need by using URIs. These URIs allow the applications to retrieve specific versions of a secret.




  • No need for custom code. There is no need to write custom code to protect any of the secret information stored in Key Vault.




  • Monitoring, you can enable logging for your Vaults. You can configure the monitoring to:



    • Archive to a storage account.

    • Stream to an event hub.

    • Send the logs to Azure Monitor logs




  • Authentication via AAD, Azure active directory. Access to a Key Vault requires proper authentication and authorization. Authentication is done via Azure Active Directory.




  • Two ways to authorize. Authorization may be done via Azure role-based access control (Azure RBAC) or Key Vault access policy




References




  • Learn module Azure Key Vault. If you are completely new to Key Vault this is the best place to start. It takes you through explaining what Key Vault is, what to use it for. How to run something locally and how to deploy it to the cloud.




  • More on auth




  • Quickstart Node.js This is a quickstartt that tells you how to work with secrets locally using Node.js. Great no-nonsense guide if you want to get started quickly.




  • Quickstart .NET A good quick start article showing how to create a Key Vault, use the .NET SDK and a service principal to authenticate.




  • KeyVault secrets. Good page that gives more ooof an understanding of how secrets are stored and what different permission levels exist among other things.




 


Authenticating to Key Vault


An important thing to realize when you want to read from the Key Vault within an app is that you need two different approaches depending on whether you are developing locally, or you have deployed the app to Azure. Why is that?


Let’s explain the two different situations:




  • In development locally, you can be authenticated by using either Azure CLI and the az login command. You can also use the Azure extension for VS Code and log in to Azure that way. What happens when you use either of those methods a credential is created on your machine. If you then use the official SDKs for your chosen platform, it will be able to authenticate using said credential.




  • When deployed on Azure. To reiterate, your code will most likely use an SDK for a supported language platform like .NET, Node.js, Python etc. Now, the SDK works for you in both when developing locally and deployed to Azure. It looks for credentials in many places like Az CLI and Visual Studio Code as we’ve already mentioned. However, once deployed, your app has access to neither of those two, so what does it do? It uses either environment variables (in App Settings for example) or it uses a so called managed identity to authenticate.




A managed identity is an impersonated identity you can create, either based on your service (a web app for example) or based on your user. What you do is to run a command, with either your user or your app as an argument, and back comes an identity and a secret. Here’s an example of how you can create such an identity:



   az webapp identity assign 
–resource-group “<resource group name>”
–name “<your-unique-app-name>”


 



The above command returns a principal id that you will use as an argument in the next command. Once you have that identity created you need to assign it to the Key Vault using az keyvault set policy:



   az keyvault set-policy 
–secret-permissions get list
–name “<your-unique-vault-name>”
–object-id “<your-managed-identity-principalid>”


 



After that, you are ready to deploy your app to Azure and Azure Active Directory will authenticate your app and let you read from the Key Vault. This will all be shown in detail further down in the article, but now you know roughly what goes on.


Permissions


The set-policy command above not only associates your identity to the KeyVault, it also sets permissions. The argument –secret-permissions contains a list of permissions that determines if you are able to read, write and manage secrets. Be as restrictive as you can who can do what with your Key Vault. In general, I reason like this when it comes to permissions:



  • Read, for most apps. Most apps only needs to read a secret.

  • Write, only when absolutely needed. Apps or users that needs this access is some kind of admin. Either the app manages secrets via a web API for example or there’s an admin user that some other way needs to do something advanced to the secrets.


Have a safe behavior


Even though Key Vault helps you keep your secrets secure, it can still leak if you’re not careful. You don’t want to ever show the value of a secret on a web page or as part of an error. What you can do, is to have a safe behavior and ensure you do things such as:



  • Be restrictive with permissions, if your app only needs to read a secret, don’t give it permission to SET, DELETE or do something else.

  • Rotate keys, you can change the values of the keys/secrets. The apps using those keys won’t be affected as they only operate on they keys name, not its value.


 


DEMO, create a Key Vault store and read a secret


Next, you will be taken through a series of steps where you will get to do the following:



  • Create a KeyVault, you will create a Key Vault from the command line using Azure CLI

  • You will add secrets, to the Key Vault and ensure you can read back the value using Node.js and some SDK libraries.

  • Create an assign identity, you will then create a managed identity, using your web app as an argument and assign to the Key Vault

  • Deploy app, once you have all these parts in place, you will deploy the app and see that it can still read secrets from the Key Vault.


To create a Key Vault, follow these steps:



  1. Login to Azure. In a terminal type az login:



   az login


 



Select the user you want to login with.



  1. Create a resource group. You may use an existing resource group at this point, but if you want to create a new one, type the following:



   az group create –name “<a name for resource group>” -l “EastUS”


 




  1. Create the Key Vault. Run the az keyvault command below:



   az keyvault create –name “<unique vault name>” –resource-group “keyvaultrg” –location “EastUS”


 




  1. Create a secret, using the following command az keyvault secret set:



   az keyvault secret set –vault-name “<unique vault name>” –name “mySecret” –value “abc123”


 




  1. Read the secret, from the vault by running this command az keyvault secret show:



   az keyvault secret show –vault-name=“<unique vault name>” –name=“mySecret”


 



DEMO, reading a secret from your code, when developing


There’s SDKs for most major platforms. I’ll be selecting the Node.js one for this demo. If you want the C# one you can select this language pivot:



C# KeyVault SDK




  1. Run the command az login to ensure you are logged into Azure before proceeding. This will place a credential on your machine that the SDK will be able to pick up.



   az login


 



Select the Azure user that you want and then close the browser windows when asked.



  1. Create a file app.js

  2. Instantiate a Node.js project by running the npm init command like so:



   npm init y


 




  1. Download the needed SDK libraries from npm using the npm install command like so:



   npm install @azure/identity @azure/keyvaultsecrets dotenv


 



dotenv is not part of the SDK, it just let’s us define some environment variables in a .env file and they get read to the env variables at initialization.



  1. Add imports. Open app.js and add the following two lines at the top:



   require(dotenv).config()

const { DefaultAzureCredential } = require(@azure/identity);
const { SecretClient } = require(@azure/keyvault-secrets);



 



The first line ensures values from the .env file is read in. Given the upcoming code the content of .env file should look something like this:



   VAULT_NAME=<key vault value, change me>


 




  1. Instantiate a client. We do that with the following lines of code:



   const secretName = mySecret;
const keyVaultName = process.env[VAULT_NAME];
const KVUri = https:// + keyVaultName + .vault.azure.net;

const credential = new DefaultAzureCredential();
const client = new SecretClient(KVUri, credential);



 



Note how the first two lines help construct the URL to the Key Vault given it’s name, that it reads from VAULT_NAME variable from our .env file. Next an instantiation of DefaultAzureCredential is done. This instance will find the credential produced by az login.



NOTE, we will need to change how this authentication happens once we deploy the app, but this works for now.




  1. Retrieve secrets value. Lastly, we add code retrieve the value of the secret:



   async function main() {
const retrievedSecret = await
client.getSecret(secretName);
console.log(retrievedSecret);
}

main();



 




  1. Add npm “start” command. Add an entry to package.json and the script section:



   “start”: “node app.js”


 




  1. Run the app, by typing the following in the console:



   npm start


 



This should give you a response looking something like this:



   {
value: abc123,
name: mySecret,
properties: {
expiresOn: undefined,
createdOn: 20210111T18:06:19.000Z,
updatedOn: 20210111T18:06:19.000Z,
value: abc123,
id: https://<key vault name>.vault.azure.net/secrets/mySecret/<the secret>,
tags: { file-encoding: utf-8 },
vaultUrl: https://<key vault name>.vault.azure.net,
name: mySecret,
version: <version>,
enabled: true,
recoverableDays: 90,
recoveryLevel: Recoverable+Purgeable
}


 



You can see that you are able to successfully retrieve the value of your secret from the Key Vault and via code. Great, congrats.


 


DEMO, reading a secret from code, when deployed


As we are looking to deploy our app next, there are two things we need to do:



  • Rebuild to an API. Ensure we rebuild the app to a web API, we will use Express framework for this

  • Authenticate via a principal. We will need to perform the following steps for that:

    1. Create a webapp on Azure.

    2. Create a principal, using the name of the app as an arg.

    3. Associate the principal to the Key Vault.



  • Deploy the app. That’s something we can do via the command line.


Rebuild to an API


First, we will need to rebuild the app to Express. We do this just so we can interact with the app once deployed. We will display the value of the secret.



Don’t do this in a real scenario, this is just to show that we have the proper access to the Key Vault.




  1. Install web framework. Install express using npm install



   npm install express


 




  1. Add route. Ensure you have app.js open and change the code to the following:



   // this is not needed when deployed
// require(‘dotenv’).config()

const { DefaultAzureCredential } = require(@azure/identity);
const { SecretClient } = require(@azure/keyvault-secrets);

const app = require(express)();
const port = process.env.PORT || 3000;

const keyVaultName = process.env[VAULT_NAME];
const KVUri = https:// + keyVaultName + .vault.azure.net;

const credential = new DefaultAzureCredential();
const client = new SecretClient(KVUri, credential);

const secretName = mySecret;

app.get(/api/test, async(req, res) => {
const secret = await getSecret();

res.type(text);
res.send(secret);
});

async function getSecret() {
const retrievedSecret = await client.getSecret(secretName);
return retrievedSecret;
}

app.listen(port, () => {
console.log(server running);
})



 



What we have now is an express app with a route to /api/test.



  1. Test your program, by running npm start in the console. In the browser, navigate to http://localhost:3000/api/test. It should show your secret as a JSON response.


Create the web app


Because we plan to deploy this on Azure we need to make sure our app properly authenticates to Azure AD and that the Key Vault is ok with us reading from it. There’s just a few steps to make that happen:



  1. Create a service plan, first need a service plan. Run the command az appservice plan create, like so:



   az appservice plan create 
–name “<unique service plan name for your subscription>”
–sku FREE
–location centralus
–resource-group “<existing resource group>”


 




  1. Create a web app, we need to create web app first as we will use it’s name as an argument when we create a so-called principal. Run az webapp create:



   az webapp create 
–plan “<unique service plan name for your subscription>”
–runtime “node|10.6”
–resource-group “<existing resource group>”
–name “<unique app name>”


 




  1. Create the app settings, next configure the app setting on the web app by calling az webapp config appsettings set:



   az webapp config appsettings set 
–resource-group “<existing resource group>”
–name “<unique app name>”
–settings ‘VAULT_NAME=<your-unique-vault-name>’ ‘SCM_DO_BUILD_DURING_DEPLOYMENT=true’


 



The command above will ensure that process.env[‘VAULT_NAME’] will get populated once deployed. Also we no longer need the dotenv lib to read from the .env file.


Authenticate via a principal


There are two things that needs doing. Creating the impersonated identity and assigning the identity to the Key Vault, and in doing so give the needed permissions to be able to read the secrets values.



  1. Create a service principal, run the command az webapp identity assign:



   az webapp identity assign 
–resource-group “<existing resource group>”
–name “<unique app name>”


 



This will produce a JSON response that contains a field principalId. You will use that in the next command to associate an identity with a Key Vault, while adding a set of permissions.



  1. Grant permission to the Key Vault, run the command az keyvault set-policy:



   az keyvault set-policy 
–secret-permissions get list
–name “<your-unique-vault-name>”
–object-id “<principalId>”


 



Here we can see how we assign get and list as permissions for our identity, when it gets associated to the Key Vault. That’s what’s needed for the app to be able to read from the Key Vault.



We would have needed another set of permissions if we wanted to create or delete a secret for example.



Deploy the app


To deploy the app, there’s only one command we need to run. All that’s needed is to compress the application and deploy it.



  • Deploy the app. As a final step, deploy the app using the command:



   zip site.zip * -x node_modules/

az webapp deployment source config-zip
–src site.zip
–resource-group “<existing resource group>”
–name “<unique app name>”



 



The above command will pack up all your files, node_modules excluded, into a file site.zip. Then the files are deployed. A few minutes later you will app your app up and running and your Key Vault showing the value of your secret mySecret if you navigate to deployedUrl/api/test


 


Summary


This article was somewhat long, but it did tell you why you should use the Azure Key Vault service. It also told you how to work with the Key Vault in local development and finally how you needed to change your source code and thereby prepare it for deployment. I hope it was helpful.

Does your health app protect your sensitive info?

Does your health app protect your sensitive info?

This article was originally posted by the FTC. See the original article here.

New health apps are popping up every day, promising to help you track your health conditions, count your calories, manage your medications, or predict your ovulation. These apps often ask for some of your most sensitive personal information, like your health history, medication list, or whether you have ever suffered a miscarriage.

Some apps use that sensitive information only to give you services. But others may use it for their own research, to target you with ads, or disclose — or even sell — your data to other companies. And, unlike your doctor, these apps may not be covered by health privacy laws like HIPAA.

For example, Flo is a health app that functions as an ovulation calendar, period tracker, and pregnancy guide. In a settlement announced today, the FTC said that the makers of the Flo app shared users’ personal health information with marketing and analytics companies like Facebook and Google — even though it had promised users to keep this sensitive information private. As part of the settlement, Flo Health, Inc. has agreed to get users’ consent before it can share their information in the future. The settlement also requires Flo to get an outside review of the honesty of its privacy promises.

How can you avoid the risks associated with these types of health apps? Here are some things to consider:

  • Compare privacy protections. Many competing health apps offer similar services. When choosing between apps, compare their privacy protections. Look for a privacy notice that explains in simple terms what health information the app collects from you, as well as how it uses and shares your information with other companies and users. If the app shares your information, does it tell you why, and does it limit what others can do with it?
  • Take control of your sensitive information. Take a look at the app’s settings to see if it gives you control over what health information it collects and shares. An app’s default settings often encourage sharing, so it can be useful to select more protective options.
  • Keep your app up to date. App updates sometimes include important fixes for privacy or security glitches. One of the best ways to protect your information is to keep your app (and your phone’s operating system) up to date.
  • Recognize the risks. What sensitive information will the app have access to? Are the app’s services worth the risk of someone else getting hold of that? Some companies don’t uphold their privacy promises. In this case, we said that even if you reviewed Flo’s privacy promises and looked at the settings, your information could still have been disclosed to other companies. Sharing sensitive information always carries risks, so be sure you’re comfortable with what you’ve shared, in case privacy promises aren’t kept.
  • Report your concerns. If you think a health app isn’t keeping up its end of the bargain, let the FTC know. The FTC regularly brings enforcement actions against companies that misrepresent how they use or disclose people’s sensitive health information.Image of Using a Health App Infographic

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

NRF 2021: enabling retailers to reimagine the road ahead with Microsoft Business Applications

NRF 2021: enabling retailers to reimagine the road ahead with Microsoft Business Applications

This article is contributed. See the original author and article here.

Truly engaged, always connected

The past year has brought complex challenges for retailers of every size, and in response many have quickly pivoted their businesses to adjust.

With store closures during lockdown, retailers leveraged Microsoft Dynamics 365 to facilitate new purchasing options for their customers, such as shipping from stores and click and collect. Once stores reopened, Dynamics 365 helped retailers realize the vitality of mobile point of sale solutions and contactless payment options to ensure safe and secure shopping experiences for both customers and sellers alike.

It’s clear that resilience and agility will be the key drivers of success for retailers moving forward, as customer demands change and new challenges emerge, and Microsoft is dedicated to empowering these organizations with the technology solutions they need.

Today at NRF 2021: Retail’s Big Show, we are introducing the private preview of Microsoft Cloud for Retail, as well as updates to Dynamics 365 that help retailers better engage both B2B and B2C customers. These new capabilities join Dynamics 365 and Microsoft Power Platform solutions that work together to help brands deliver personalized and meaningful customer experiences across physical and digital channels, uniquely connecting the end-to-end shopper journey.

We are excited to continue partnering with retailers leveraging Dynamics 365 and Power Platform solutions, including the new capabilities we’re announcing today, to drive their success in 2021. Take a look at how a few leading retailers around the world are looking to Dynamics 365 and Power Platform to build resilience, increase agility, and ultimately accelerate business outcomes.

Unify your e-commerce capabilities

With disparate retail systems, it’s difficult for retailers to scale across both traditional e-commerce and emerging channels for a truly seamless customer experience.

At NRF 2021, we are announcing the preview of B2B e-commerce functionality for Microsoft Dynamics 365 Commerceone of the solution’s most requested features. This new capability makes Dynamics 365 Commerce the optimal solution for B2B and B2C e-commerce on a single, holistic retail and commerce platform. By building on our consumer capabilities and bringing together B2B and B2C e-commerce, businesses can deliver consistent, personalized, and user-friendly purchasing options for all their customers. Combine this with close integration to Microsoft Dynamics 365 Sales and Microsoft Dynamics 365 Customer Service, retailers can enable curated self-service buying options for business accounts, along with increasing the productivity of their sales reps and empower them to provide informed and relevant offers to their buyers.

Kent Watersports is one of the largest sellers of watersports equipment globally. With a range of brands including O’Brien, Hyperlite, Connelly, Liquid Force, and more, Kent Watersports chose to work with Microsoft to help expand their e-commerce capabilities and sales capacity amidst increased online demand in 2020 and deliver a connected and user-friendly experience for both B2C and B2B customers.

“Our business customers want to be able to connect to our site and place their orders themselves. Historically, they were sharing Excel spreadsheets or calling a sales rep. We really appreciate the ability of the buyer to place the order electronically. It saves us a lot of time, and in fact it’s a better experience for the customers, and the sales reps, to actually be using our B2B e-commerce solution.”Rhett Thompson, Director of IT, Kent Watersports

Along with Kent Watersports, Columbia Sportswear also worked with Microsoft to rapidly adjust to market changes amid temporary store closures by the pandemic in early 2020. Columbia Sportswear leveraged Dynamics 365 Commerce to facilitate shipping from stores to meet customer demand and also started converting their store experiences to be compliant with local regulations. Once stores reopened, mobile point of sale solutions and contactless payment options became broadly adopted and ensured safe and secure shopping experience for both customers and sellers alike. Russel Anderson, Sr. Director Retail Operations, Columbia Sportswear shared how Dynamics 365 reduces time to value: “With Dynamics 365 Commerce we have realized that technology does not need to move as slowly as we previously thought it did, it can move faster.”

Throughout the NRF 2021 digital event, we will also showcase how retailers are using Dynamics 365 and Power Platform solutions to understand and engage customers, reduce fraud risk, and build resilient and agile supply chains.

Know your customer like never before

Providing personalized experiences at scale requires deep insights into customer needs and buying behavior. Microsoft Dynamics 365 Customer Insightsbrings together transactional, behavioral, and demographic data in real time to create a complete view of your customers and unlock insights to drive informed decisions, automate processes, and personalize customer engagement across channels.

Chipotle Mexican Grill is using Dynamics 365 Customer Insights to organize, analyze, and enrich its customer data to target marketing efforts so they’re as meaningful and effective as possible. With multiple sources of customer data but no comprehensive customer data platform, they couldn’t use that data to drive business insights or improve marketing efforts. Now, having chosen Microsoft to help navigate its customer data journey, Chipotle can understand customer preferences and customize relevant marketing messages, boosting revenue for the company and increasing personalization for customers.

Protect your customers and your bottom line

As more businesses turn to e-commerce, it also increases the exposure to fraud and abuse: a majority of fraud is committed during card-not-present transactions. Fraud is not only a burden for customers with stolen identities, account takeover, and more, but it represents a serious operational hazard for merchants. Microsoft Dynamics 365 Fraud Protection is a cloud-based SaaS solution designed to help e-commerce, brick-and-mortar, and omnichannel merchants decrease fraud costs and improve profitability. We are helping merchants globally to protect their revenue and reputation with tools and capabilities to decrease fraud and abuse, reduce operational expenses, and increase acceptance rates, while safeguarding user accounts from fraud exposure.

Darden Restaurants, operating some of the most recognizable brands in full-service dining including Olive Garden and LongHorn Steakhouse, needed to move swiftly to address a growing fraud issue during the COVID-19 pandemic. With the shift to an online-only model, Darden started noticing some fraudulent payments and looked to Microsoft for help. Darden Restaurants deployed Dynamics 365 Fraud Protection to combat purchase fraud at LongHorn Steakhouse, and together with Microsoft they had the solution quickly up and runningprotecting the restaurants and customers against fraud.

Build a supply chain that can handle any challenge

Another major repercussion of the COVID-19 outbreak has been the exposure of global supply chain vulnerabilities. Merchants need real-time visibility into their inventory to drive demand for overstock products and expedite replenishment of out-of-stock items cost effectively. Microsoft Dynamics 365 Supply Chain Management helps businesses build a resilient supply chain and agility to rapidly re-plan supply and distribution of products in near real-time with in-memory microservice to adapt to shifting customer demand. Dynamics 365 Supply Chain Management enables businesses to accomplish this in a matter of minutes, instead of days. Businesses can also seamlessly scale distribution and warehouse operations with edge computing during peaks. This capability, combined with an intelligent distributed order management system, provides businesses with a single global view of their inventory, to intelligently manage, automate, and optimize order fulfillment to ensure on-time delivery in a cost-effective manner.

One of our customers, Mobilezone, simplified the solutions landscape by choosing Dynamics 365 to get a better view of their customers and omnichannel sales capabilities for operating online, company-owned, and partner stores. Mobilezone consolidated its customer information within a single platform for heightened security, greater ease of use, and vastly improved inventory management. Mobilezone uses the synergy between Dynamics 365 Supply Chain Management and Dynamics 365 Commerce to analyze and satisfy demand.

“By using Supply Chain Management, we can automate alerts regarding inventory in specific locations, so we avoid the risks of out-of-stocks and overstocking.”Fritz Hauser, Director of IT and Logistics, Mobilezone

Another customer, Monogram Foods, is excited to enhance warehouse operations and create resiliency using edge scale units for Dynamics 365 Supply Chain Management. As Turner Foster, Senior Developer Manager, Monogram Foods explains: “Our frozen goods warehouse has a tight time constrained picking process, and it is critical for our warehouse team to have a consistent and reliably quick response throughout the entire picking operation. The architectural design of the solution ensures that these critical warehouse workloads are isolated from the rest of our operations, eliminating points of contention during these time sensitive processes.”

Retail solutions that are built to work together

Together, Dynamics 365 Commerce, Dynamics 365 Customer Insights, Dynamics 365 Supply Chain Management, and Dynamics 365 Fraud Protection help businesses streamline omnichannel operations, providing near real-time solutions for managing inventory, reducing fraud risk, and creating new customer services. Power Platform works together with Dynamics 365 to provide an additional layer of flexibility of adaptability, delivering low-code solutions to innovate with apps, automate processes, create virtual bots to improve service, and analyze data quickly to streamline reporting and gain insights across the organization, from the frontline to the supply chain, sales to service.

Get the full story

If you are registered for NRF 2021, we invite you to join Shelley Bransten, Microsoft’s Corporate Vice President, Consumer Goods and Retail Industries, to learn how Microsoft is empowering retailers from across the globe to build more intelligent, resilient, and sustainable retail operations. Tune in on Wednesday, January 13 at 1:00 PM Eastern Time.

Also, continue to visit the Dynamics 365 blog this week to learn more about how Dynamics 365 and Power Platform are helping retailers reimagine the road ahead with truly engaged, always connected solutions. Be sure to check out our new Business Applications retail industry webpage for more information.

The post NRF 2021: enabling retailers to reimagine the road ahead with Microsoft Business Applications appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

8 new productivity hacks for frontline workers, managers, and IT

8 new productivity hacks for frontline workers, managers, and IT

This article is contributed. See the original author and article here.

If there’s one thing we learned in 2020, it is that frontline workers are essential in today’s world. As companies realize how important they are, this time, they are bringing them along the digital transformation journey. There is no excuse for these workers to be left on the sidelines anymore.



Here are 8 new features that make frontline workers, managers, and IT’s jobs a little easier.


 


One tool to meet frontline worker needs


Whether working in back-to-back shifts where hand-offs cannot occur in person, connecting with corporate employees or consulting with remote company experts – Microsoft Teams has your frontline workers covered. In fact, Teams daily active usage more than doubled since March, primarily driven by chats/channels activity, which resembles frontline worker behavior.


 


1. Tasks Publishing – As the need for corporate offices to better communicate and work with their frontline workforce becomes top of mind, task publishing lets companies create tasks centrally at the corporate level and publish those tasks to different locations, specific store layouts or other customizable attributes of their frontline teams. For example, leadership for a nationwide retailer can create tasks for the reopening of their stores, attach relevant documents like a planogram, send that list to only the affected store locations, and then track progress against the assigned tasks. Managers can easily assign tasks to individual employees, while frontline workers can see a simple prioritized list of those tasks on their personal or company-issued mobile device. Task publishing is now generally available. Learn more about task publishing here




 


2. SMS sign-in – employees are able to sign in to their Azure Active Directory (Azure AD) account using one-time SMS codes—reducing the need to remember usernames and passwords. Once enrolled, the user is prompted to enter their phone number, which generates an SMS text with a one-time password. SMS sign-in is a single sign-on (SSO) experience, enabling frontline workers to seamlessly access all the apps they are authorized to use. This new sign-in method can be enabled for select groups and configured at the user level in the My Staff portal—helping to reduce the burden on IT. Click here to learn more.


SignIn.png


 


3. @mention by shift group – Tagging by shift connects you to the right people faster. This new feature enables teams to take the guesswork out of knowing the names of on-shift employees and automatically assigns users with tags matching their schedule in the Shifts app in Teams, backed by major workforce management systems like AMiON, BlueYonder, and Kronos. Use this @mention tag to start a chat or call, or to just notify everyone on a channel.


Tag by Shift Group.png


Tagging by shift is rolling out now and will be fully available by Jan 31. Learn more about how to start using @mention by shift group here.



Supporting frontline managers


4. Delegated user management through My Staff portal – Frontline managers can approve password resets and enable employees to use their phone numbers for SMS sign-in, all via a single customizable portal enabled by IT. With this tool, managers can unblock staff issues—reducing the burden of identity management on IT, and keeping employees connected to the apps they need on the job. Click here to learn more.


MyStaff.png



5. Digitize manual processes with the Power Platform – Power Apps allow you to create custom low code apps for your frontline workers. The relative simplicity of building these apps allow you to be responsive to the needs of your business, including many firstline scenarios that don’t have technology solutions today. And when combined with automated workflows built with Power Automate, you can digitize and streamline entire processes. For example, Power Apps and Power Automate can totally transform a customer service recall process by alerting store members on Teams via an automate workflow of an item that needs to be pulled from shelves. The frontline workers can then monitor recall alerts and flag new issues with products using a custom app built with Power Apps. Click here to learn more!


PowerApps.png


 


Simplifying IT
Bring time to value benefits by streamlining the deployment process and tailoring a frontline team’s collaboration experience. See what Teams templates and policy packages can do for you.



 


6. Policy Packages – With frontline worker and frontline manager policy packages, IT administrators can easily assign pre-defined policies and policy settings tailored for their frontline workforce. Policy packages create a simple, centralized, and consistent way to manage your Frontline workforce, no matter how big. This month, we are launching group assignment for policy packages via PowerShell and coming soon, group assignment via Teams Admin center.


Availability: These new policy packages are available by default in the IT Admin Center and in PowerShell. Learn more about setting up and customizing the policy packages for Firstline Workforce here.

 


7. Team Templates – With Teams templates, you can create effective teams faster and more easily than ever. Users can choose from common business scenarios, such as Employee Onboarding and/or industry-specific templates, like Retail – manager collaboration and Organize a store. Each team template comes with pre-defined channels, tabs, and apps. Coming soon are team template policies which allow IT administrators to hide/show specific team templates for users in their organization. This allows admins to tailor the content for business needs. For example the IT administrator could only show retail templates or only show a set of retail + custom team templates, etc.


Teams Templates.png


Custom team templates empower admins to create the right collaboration space for users in their organization. Learn more about creating a template from scratch, from an existing team, from an existing template, and team templates using Microsoft Graph. Teams templates policies will be rolling out soon.


 


8. Manage shared devices with Endpoint Manager – Microsoft Intune and Configuration Manager are now part of a unified management platform known as Microsoft Endpoint Manager. You can choose to enroll your Android Enterprise (AE) dedicated devices into Microsoft Intune with Azure AD shared mode automatically configured. For more information: Customize and configure shared devices for Firstline Workers at scale – Microsoft Tech Community


Customize.PNG



Looking ahead
We look forward to sharing the latest innovations as we approach Microsoft Ignite! This is just the beginning in our journey to empower every frontline worker in every organization to achieve more. We look forward to sharing more announcements in future blogs. Don’t forget to check out the newest Microsoft Mechanics video covering the latest frontline worker features in Teams!


3 ways retailers can shape the new normal with their frontline workforce

3 ways retailers can shape the new normal with their frontline workforce

This article is contributed. See the original author and article here.

People are at the heart of every organization’s success. The pandemic has brought into sharp focus just how truly essential the frontline retail workforce is to our lives and global economy. Learn how retailers can empower their frontline workforce with Microsoft Teams exceed customer expectations, make products and processes better, and create connections across the entire organization.

The post 3 ways retailers can shape the new normal with their frontline workforce appeared first on Microsoft 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.