Skip to content
Company name
  • Solutions
    • Identity Security Developer​
    • Software Supply Chain Security​
    • Zero Trust Security​
    • Cloud Security​
  • Use Cases
    • Secrets Management ​
    • Secure CI/CD Pipelines​
    • Kubernetes Security​
    • Security Automation​
    • CIAM
  • Products
    • Customer Access
    • Secrets Manager
    • Project Anun​
    • Cloud Privilege Security​
    • Endpoint Privilege Security
  • Community
  • Docs & Resources
  • Developer Blog
  • Solutions
    • Identity Security Developer​
    • Software Supply Chain Security​
    • Zero Trust Security​
    • Cloud Security​
  • Use Cases
    • Secrets Management ​
    • Secure CI/CD Pipelines​
    • Kubernetes Security​
    • Security Automation​
    • CIAM
  • Products
    • Customer Access
    • Secrets Manager
    • Project Anun​
    • Cloud Privilege Security​
    • Endpoint Privilege Security
  • Community
  • Docs & Resources
  • Developer Blog

Author: Jeff Griffith

Profile picture of Jeff Griffith
About Jeff Griffith
Jeff Griffith initially thought he was interested in building computers but discovered that he greatly preferred using computers to solve problems. As a result, three years into a career in Digital System Design, he began developing desktop applications with Graphical User Interfaces before Windows was developed. From there, he worked on ultrasound machines, automatic test equipment and related data analysis applications, robot control systems, workflow applications, air traffic control systems, and a wide variety of web sites and web-based applications. Some systems have been very small, single user monolithic applications, and some have been enterprise-scale systems. He has worked with almost every design methodology and has been engaged in every step of the development of software systems from inception through to delivery and training (he has even written the manuals and test plans). When he is not developing solutions, Mr. Griffith enjoys amateur radio (he holds an Extra class license), film photography and he even plays a few online games.

Posts by Jeff Griffith

Using CyberArk Conjur with Azure Serverless Functions and Managed Identities

Posted on February 23, 2022 (February 23, 2022)

Businesses need to provide flexible access to services that scale efficiently while always protecting customer data. Technologies like microservices and…

Posted in Secretless Broker, Secrets, Security, UncategorizedTagged authentication, azure, Container, CyberArk Conjur, secretless Broker

Secrets Management Deployment Tips & Tricks

Posted on June 27, 2021 (June 30, 2021)

Conjur provides excellent policy and command examples. The Getting Started with Conjur guides and Conjur Documentation should be your first…

Posted in Secrets Management, SecurityTagged CyberArk Conjur, Secrets management

Secrets Management RBAC Policy Example

Posted on March 3, 2021 (March 5, 2021)

Conjur controls access to secrets using role-based access control (RBAC). We cover this in detail in Policy Concepts, but, to…

Posted in DevOps, Secrets Management, SecurityTagged CyberArk Conjur, DevOps, DevSecOps, Secrets management
  • Solutions
    • Identity Security Developer​
    • Software Supply Chain Security​
    • Zero Trust Security​
    • Cloud Security​
  • Uses Cases
    • Secrets Management ​
    • Secure CI/CD Pipelines​
    • Kubernetes Security​
    • Security Automation​
    • CIAM
  • Developer Community​
    • Developer Security Blog​
    • Developer Newsletter
    • Developer Community Forum​
    • Open-source Projects​
  • Resources
    • Tutorials
    • Docs​
    • YouTube​

Copyright © 2025 CyberArk Software Ltd. All rights reserved. Terms and Conditions | Privacy Policy |