NETWORK · ISOLATION
VNet-locked data plane
Azure SQL is reachable only via private endpoint. No public surface for the data store, ensuring only Container Apps inside the VNet can connect.
Secure cloud architectures on Azure: VNet-isolated data plane, Managed Identity for service-to-service authentication, and stateless containers shipped from ACR. The diagram below illustrates the live topology of FideliCards.
Mobile
Android / iOS
Azure Container Registry
ACR
Microsoft Entra ID
Azure Active Directory
AZURE VIRTUAL NETWORK · VNet
Validate
JWT middleware
API Endpoint
Minimal API · Protected
Managed Identity
System-assigned · no secrets stored
✓ scoped per resource to SQL
Azure SQL
VNet-private
REQUEST FLOW
auto-advancing · click any step to pin
Azure SQL is reachable only via private endpoint. No public surface for the data store, ensuring only Container Apps inside the VNet can connect.
Container Apps authenticate to Azure SQL with their own identity. Tokens are rotated by Azure and scoped per resource, keeping the codebase credential-free.
Docker images pushed to ACR, pulled by Container Apps revisions. Scale to zero when idle; new revisions go live with traffic split for instant rollback.
JWTs issued by Entra ID are validated at the API boundary. Both social and enterprise logins follow a unified authentication flow.
Source of truth on Azure SQL with VNet-locked access, daily PITR-backed backups, and EF Core migrations applied at deploy time.
Pipelines build, push to ACR by digest, then promote revisions. No re-tagging, ensuring the exact tested artifact is deployed.
STACK