Datacenter LOB web service LOB app Partner Mobile Device.

Slides:



Advertisements
Similar presentations
Active Directory Federation Services How does it really work?
Advertisements

Service Bus Service Bus Access Control.
steve plank “planky” microsoft Lest we forget windows azure appfab
John Shewchuk Dennis Pilarinos Microsoft Corporation.
 Rich Randall Development Lead Microsoft Corporation BB44.
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
SIM403. Claims Provider Trust Relying Party x Relying Party Trust Claims Provider Trust Your ADFS STS Partner ADFS STS & IP Relying Party Trust Partner.
Api Apps Easily build and consume APIs in the cloud Web Apps Web apps that scale with your business Logic Apps Automate business process across SaaS.
WSDL Homework - Plenio. WSDL - Structure Source: w3schools.com.
S A B D C T = 0 S gets message from above and sends messages to A, C and D S.
OpenID And the Future of Digital Identity Alicia Bozyk April 1, 2008.
New ETR actions configurable via UI or PowerShell.
Permissions model Restricted -> Read -> Write -> ReadWrite.
.Net services Azure Services Platform. Introduction to Microsoft.Net Services.Net Service Bus.Net Access Control Service.Net WorkFlow Service Tools.
COMPUTER NETWORKS.
4/25/ Application Server Issues for the Project CSEP 545 Transaction Processing for E-Commerce Philip A. Bernstein Copyright ©2003 Philip A. Bernstein.
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Troubleshooting Federation, AD FS 2.0, and More…
SIM402. Kerberos, NTLM, Basic, Digest, Forms?
CANbus Communication.
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
Solution SusQtech (Winchester, VA) SharePoint MVP since 2007 Working with SharePoint since 2001 Work on all types of deployments Dream about.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Troubleshooting Federation, AD FS 2.0, and More…
Datacenter LOB web service LOB app Partner Mobile Device.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Maggie Myslinska (Program Manager) Microsoft Corporation SESSION CODE: ASI204.
WS-Trust Joseph Calandrino Vincent Noël Department of Computer Science University of Virginia February 9, 2004.
Mdc Send me Feedback!
17 March 2008 © 2008 The University of Edinburgh, European Microsoft Innovation Center and University of Southampton IT Innovation Centre 1 NextGRID Security.
Networking Network Classification, by there: 3 The Rules they use to exchange data: Protocols.
DATA NOTIFICATIONS AUTH SERVER LOGIC LOGGING DIAGNOSTICS PLATFORMS: SCHEDULER SCALE.
WS-Trust “From each,according to his ability;to each, according to his need. “ Karl marx Ahmet Emre Naza Selçuk Durna
Aaron Skonnard & Keith Brown Cofounders, Pluralsight SESSION CODE: ASI308 Programming AppFabric: Moving.NET to the Cloud.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
 Justin Smith Sr. Program Manager Microsoft Corporation BB55.
Cloud Identity & Access Control Services Cloud Computing Soup to Nuts Mike Benkovich Microsoft Corporation btlod-74.
Browser Identity Provider Access Control Application.
We have a little game to play at the start Chris J.T. Auld Director, Intergen Limited New Zealand (Go All Blacks!)
 Justin Smith Sr. Program Manager Microsoft Corporation BB28.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Expenses Timesheets Approvals Expense capture Timesheets Expense capture Timesheets Expense capture Timesheets.
Linus Joyeux Valerie Alonso Managing consultantLead consultant blue-infinity (Switzerland) Active Directory Federation Services v2.
SAML Token Claims Based Identity SAML Token Claims Based Identity SPUser.
SAML Token Claims Based Identity SAML Token Claims Based Identity SPUser.
ADatum Assets ADatum REST Web Svc ADatum REST Web Svc.
LO2 Understand the key components used in networking.
1 WS-Security Yosi Taguri Microsoft Israel
Architectural Patterns For The Cloud Brian H. Prince | Microsoft.
Aaron Skonnard Cofounder, Pluralsight SOA316 .NET Services Extending.NET technologies to the cloud Open and accessible REST, SOAP, RSS, AtomPub, …
Simon Davies Microsoft Global reach Ease of provisioning Business agility Deployability & manageability Security & Privacy Customisability.
6. Application Server Issues for the Project
Introduction to Windows Azure AppFabric
3-D Secure 2.0 What Merchants Need to Know
Extending Your On-Premises Apps with the Windows Azure Platform
Windows Azure AppFabric
John Shewchuk Technical Fellow Microsoft Corporation
Muhammad Saif ur Rehman
This presentation has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational purposes.
ACS Functionality.

Facebook posting on your behalf
ACS Deployment Scenarios
AD FS Installation Active Directory Federation Services (AD FS) 7.1
Lecture 8 review Discuss programming assignment 1.
ACS and WIF.
BPOS to Office 365 Transition for Existing BPOS Customers
Functions What is a function? What are the different ways to represent a function?
BVM Web Solutions is a Leading Website and Mobile App Development Company Offering best Ecommerce website and app development services for Android and.
Presentation transcript:

Datacenter LOB web service LOB app Partner Mobile Device

Datacenter LOB web service LOB app Partner Mobile Device SB SB ACS

Datacenter LOB web service LOB app Partner Mobile Device SB SB ACS

Datacenter LOB web service LOB app Partner Mobile Device SB SB ACS

Datacenter LOB web service LOB app Partner Mobile Device SB SB ACS

Send Receive Service Bus App 1 App 2 Receive Send

Service Bus Service Bus Access Control

Service Bus Service Bus Access Control

Service Bus Service Bus Access Control Protocol Bridge

Access Control Service Your Service 2. Request token (pass input claims) 4. Return token (receive output claims) 5. Send message with token 0. Establish trust via key exchange Customer 1. Define access control rules for an identity provider 3. Map input claims to output claims based on access control rules 6. Process token