8. Working with VM Role
Image Preparation
Install integration components
Install software applications
Build adapter Upload Image to
Configure firewall Repository
Generalize image
Define VM role
Deploy
Design Service Model
Reference image
Specify certificates and
destination store Upload Service
Configure number of server Package and
instances Configuration File
Configure certificate
thumbprints
Specify configuration settings
Upload Certificates
to Certificate Store
OCT
19-21
9. Managing Azure Solutions
Packaged Infrastructure Platform Software
(as a Service) (as a Service)
Software (as a Service)
Applications Applications Applications Applications
You manage
Data You manage Data Data Data
Runtime Runtime Runtime Runtime
Managed by vendor
Middleware Middleware Middleware Middleware
Managed by vendor
You manage
O/S O/S O/S O/S
Managed by vendor
Virtualization Virtualization Virtualization Virtualization
Servers Servers Servers Servers
Storage Storage Storage Storage
Networking Networking Networking Networking
OCT
19-21
15. Windows Azure Monitoring MP for
SCOM
Discovers Windows Azure Provides status of each Collects and monitors
applications. role instances performance information.
Grooms
Collects and monitors the
performance, event, and
Collects and monitors .NET Framework trace
the .NET Framework trace
Windows events. messages from each role
data from Windows Azure
instance.
storage account.
Changes the number of
role instances via a task
OCT
19-21
16. Using RDP
• IIS Manager
• Windows Explorer
• Performance and Reliability Monitor
• Event Viewer
OCT
19-21
17. Extending to and from Azure
• Challenges
• Access Control
OCT
19-21
18. Challenges
• How do you integrate with components outside your corporate
network?
• How do you expose your software to users outside of your
organization?
– Can they use their existing identities? Social identities?
– What about smaller, non-enterprise customers?
• How do you reduce latency and increase performance?
• <the list goes on…>
Access Control Service Bus Caching*
OCT
19-21
20. Identity Federation - ACS
• Used to authenticate and authorize users
• Integration Single Sign On and centralized authorization
into your web applications
• Standards-based identity providers
– Enterprise directories (e.g. Active Directory Federation
Server v2.0)
– Web identities (e.g. Windows Live
ID, Google, Yahoo!, and Facebook)
OCT
19-21