SlideShare a Scribd company logo
1 of 1
Download to read offline
Microsoft Business Connectivity Services Model
                                       What are Business Connectivity Services?                                                                                                                                                                                                                                 Business Connectivity Services                                                                                                                                                                      Elements of Business Connectivity
                                                                                                                                                                                                                                                                                                                                   H
                                                                                                                                                                                                                                                                                                                         architecture                                                                                                                                                                                           Services
        Introducing the Microsoft                                                                                   Typical solutions based on                                                                                                                                                                                    Web browser
                                                                                                                                                                                                                                                              Office clients
      Business Connectivity Services                                                                              Business Connectivity Services
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              The illustration to the left shows the elements of         H. Using Web Parts and SharePoint external lists,
Microsoft SharePoint Server 2010 and the Microsoft Office 2010 suites include                                 Solutions based on Business Connectivity Services can take advantage of the                                                 J
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              the Business Connectivity Services:                        back-end data exposed by the Business Data
Microsoft Business Connectivity Services, which are a set of services and features that                       integration of client applications, servers, services, and tools in the Microsoft Office
provide a way to connect solutions based on SharePoint Server 2010 to sources of                              2010 suites. Information workers typically perform much of their work outside the formal
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         Connectivity service is made available in
external data and to define external content types based on that external data. External                      processes of a business system. For example, they collaborate by phone or e-mail                                                                                                                                                                                                                                                                                                A. The Business Data Connectivity service                  SharePoint Web sites and available from the Web
                                                                                                                                                                                                                                                     Office Integration Client runtime
content types are similar to content types and allow the presentation of and interaction                      messages, use documents and spreadsheets from multiple sources, and switch                                                                                                                                                                                             Front-end                                                                                                provides a means for creating external content             browser.
with data from external systems in SharePoint lists (called external lists), Web Parts,                       between being online and offline. Solutions based on Business Connectivity Services                                                                                                                                                                                     servers                                                                                                 types.
and in Microsoft Outlook 2010, Microsoft SharePoint Workspace 2010, and Microsoft                             can be designed to fit within these informal processes that information workers use:
Word 2010 clients.
                                                                                                                                                                                                                                                                               Office Business
                                                                                                                                                                                                                                                                                                                                                                                           Web                            External                                                                                                                       I. The BDC Server Runtime on the server provides
                                                                                                                                                                                                                                                                               Part
                                                                                                              ·   They can be built by combining multiple services and features from external systems                                                                                                                                                                                      Parts                            lists                                                             B. External content types are stored in a dedicated        access to Business Data Connectivity service data
Sources of external data that Business Connectivity Services can connect to include                               and from the Office 2010 suites to deliver solutions targeted to specific roles.                                                                                                                                                                                                                                                                                            database.                                                  from Office client applications.
SQL Server databases, SAP applications, Web services (including Windows
Communication Foundation Web services), custom applications, and Web sites based                              ·   They support informal interactions and target activities and processes that occur
on SharePoint products. By using Business Connectivity Services, you can design and                               mostly outside formal enterprise systems. Because they are built by using
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              C. The Secure Store Service provides the                   J. On supported Office 2010 clients (SharePoint
build solutions that extend SharePoint collaboration capabilities and the Office user                             SharePoint 2010 products, solutions based on Business Connectivity Services                                                                                   K                                                                                                                                                                                                             capability of securely storing credential sets and         Workspace, Outlook, and Word) the Office
experience to include external business data and the processes that are associated
                                                                                                                                                                                                                                                                                           BCS                                                                                         E                                                                                                      associating them to identities or group of identities.     Integration Client Runtime acts as a connector
                                                                                                                  promote collaboration.                                                                                                                     BDC Runtime
with that data.                                                                                                                                                                                                                                                                          Service                                                                                           BDC Server Runtime
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              A common scenario for the Secure Store Service             between the BDC runtime and Office applications.
                                                                                                              ·   They help users perform tasks within the familiar user interface of Office applications                                                                                   host                                                                                               F
Business Connectivity Services solutions use a set of standardized interfaces to provide
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              is an application that authenticates against a




                                                                                                                                                                                                                                      Client SSS
                                                                                                                  and SharePoint 2010 products.                                                                                                                                                                                                                                                     Metadata cache
access to business data. As a result, solution developers do not have to learn
                                                                                                                                                                                                                                                                                                                                    I                                                                                                                                                         system in which the current user is known                  K. The BDC Client Runtime uses the Business
                                                                                                                                                                                                                                                                        L
programming practices that apply to a specific system or adapter for each external                            Examples of solutions based on Business Connectivity Services include the following:                                                                                                                                                                                                                                                                                            differently or has a different account for                 Data Connectivity service data to connect to and
                                                                                                                                                                                                                                                       Client cache
system. Business Connectivity Services also provide the run-time environment in which                                                                                                                                                                                                                                                      M                                                                                         G                                                        authentication. When used with the Business Data           execute operations on external data sources for
solutions that include external data are loaded, integrated, and executed in supported                        ·   Help Desk – An enterprise implements its help desk, which provides internal
Office client applications and on the Web server.                                                                 technical support, as a solution based on Business Connectivity Services. Support                               O                                                                                                                                                                                                                                                           Connectivity service, the Secure Store Service             rich client access.
                                                                                                                  requests and the technical support knowledge base are stored in external databases                                                                                                                                                                                                                                                                                          provides a means to authenticate against external
                                                                                                                  and are integrated into the solution by using the Business Data Connectivity                                                                  Cache refresh operations
Business Connectivity Services are administered primarily by using the Business Data                                                                                                                                                                                   execution                                                                                                                                                                                                              systems.                                                   L. Data is cached on client computers.
                                                                                                                  services. The solution displays both support requests and the knowledge base in the                                                       N
Connectivity service. Administrators can use this service to manage:
                                                                                                                  Web browser. Information workers can view their current requests either in a Web
·   External content types: Named sets of fields that define an object, such as
                                                                                                                  browser or in Microsoft Outlook. Tech support specialists view the requests                                                                                                                                                                                                                                                                   SAP                           D. Credential sets are stored in a dedicated               M. The Business Data Connectivity Client Runtime
                                                                                                                  assigned to them in a browser, by using Microsoft Outlook, or, when offline, by using
    “Customer,” or “Order,” in a business application along with the methods to create,                           Microsoft SharePoint Workspace. Workflows take support issues through each of                                                                                                                                                                                                                                            Custom                                             database.                                                  supports connecting to external systems from
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    SQL
    read, update, or delete that object in its external data source. Typical external                             their stages. Managers on the technical support team can view dashboards that                                                                                                                                                                                                                                                                                    Server                                                                client computers.
    content type administration tasks include adding actions to an external content type                          display help desk reports. Typical reports identify the number of support issues                                                                                                                                                                                  Shared                                                             Web            SharePoint
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              E. The BDC Server Runtime on front-end servers
    to provide users with new functionality, and associating profile pages with an                                assigned to each support specialist, the most critical issues currently, and the                                                                                                                                                                                                                                                    service
                                                                                                                                                                                                                                                                                                                                                                                    services                                                                                                  uses the Business Data Connectivity service data           N. The client cache refresh synchronizes the
    external content type to customize its appearance when viewed.                                                number of support incidents that are handled by each support specialist during a
                                                                                                                  given time period.
                                                                                                                                                                                                                                                                                                                                                                  A                            C                                                                                              to connect to and execute operations on external           cache with the back-end data.
·   External systems: Supported sources of data that can be modeled by the Business
    Connectivity Services, such as Web services, SQL Server, and other relational                                                                                                                                                                                                                                                                                     BDC service                  Secure Store Service
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              data sources for Web browser access.
                                                                                                              ·   Artist tracker - A talent agency integrates its database of artists into its internal                                                                                                                                                                                                                                                                                                                                                  O. The Client Secure Store enables end-users to
    databases. Typical external system administration tasks include setting permissions
                                                                                                                  Web site. The entire list of artists, their contact information, and schedules can be
    on the data source and viewing the external content types that are associated with                            taken offline in Microsoft SharePoint Workspace or in Microsoft Outlook. Recording                                                                            Development Tools                                                                                                                                                                                             F. The metadata cache provides caching of the              configure their client mappings in the credential
    the data source.                                                                                              contracts can be generated and filled from the Web site, Microsoft SharePoint                                                                                                                                                                                                                                                                                               runtime Business Data Connectivity service data. It        database.
                                                                                                                  Workspace, or Microsoft Outlook, and a workflow guides each contract through its                                                                                                                                             P
·   BDC models: XML descriptions of one or more external content types along with                                                                                                                                                                                                               SharePoint                                                                                                                                                                                    can optionally be encrypted.
                                                                                                                  various stages. New artists can be added from the Web site or from Microsoft
    resources, such as localized strings, and connectivity information. Typical BDC                                                                                                                                                                                                             Designer                                                                                                                                                                                                                                                 P. Solution developers can use SharePoint
                                                                                                                  Outlook. Using this solution, agents always have the information they need close at
    model administration tasks include importing and exporting models or resource files,                          hand, and they can perform many key tasks by using familiar Office interfaces.                                                                                                2010
    setting permissions on them, and viewing the external content types associated with                                                                                                                                                                                                                                                                                                                                                                                                       G. The Business Data Connectivity service                  Designer 2010 and Visual Studio 2010 to create
    a model.
                                                                                                              ·   My Sales Dashboard - A sales dashboard application helps sales associates in an                                                                                               Visual Studio                                                                        Database                                                                                                 supports connecting to SQL Server and other                external content types.
                                                                                                                  organization quickly find the information they need and enter new data. Sales orders                                                                                          2010                                                                                  servers                                                                                                 relational databases, SharePoint content, Web
                                                                                                                  and customer information are managed in an external database and integrated into                                                                                                                                                                                                                                                                                            services, and custom applications that are
                                                                                                                  the solution by using the Business Data Connectivity service. Depending on their
                                                                                                                  roles, team members can view sales analytics information, individual team                                                                                                                                                                   B                            D                                                                                                  compatible with the BDC object model.
                                                                                                                                                                                                                                                                                                                                                                      BDC service              Secure Store Service
                                                                                                                  members’ sales performance data, sales leads, and a customer’s contact                                                                                                                                                                                 data                         data
                                                                                                                  information and orders. Sales professionals can view their daily calendars, view
                                                                                                                  tasks assigned to them by their managers, collaborate with team members, and
                                                                                                                  read industry news, either from a Web browser, from Microsoft Outlook, or offline in
                                                                                                                  Microsoft SharePoint Workspace. By using Microsoft Word 2010, managers can
                                                                                                                  author monthly status reports that include data from the external systems.




                                                                              Business Connectivity Services Security                                                                                                                                                                                                                                                                                Creating solutions based on Business Connectivity Services
Business Connectivity Services include security features for authenticating users to access external systems and for configuring permissions on data from external systems. Business Connectivity Services are highly flexible and can accommodate a range of security methods from within
supported Microsoft Office 2010 applications and from the Web browser.                                                                                                                                                                                                                                                                                                    Solutions based on Business Connectivity Services surface external data through the Business Data Connectivity service and provide access to that data in Office 2010 clients, such as Microsoft Outlook 2010,
                                                                                                                                                                                                                                                                                                                                                                          and in SharePoint Web sites. This flowchart illustrates the stages in designing and creating a solution that is based on Business Connectivity Services, the roles that come into play at each stage, and tasks
Accessing external data from an Office client application                                                                                                                   Accessing external data from a Web browser                                                                                                                                                    performed by the various team members in specifying, designing, and creating the solution :
When accessing external data from a supported Office client application, two systems are involved: the client computer of the logged-on user                                When a user accesses external data from a Web browser, three systems are involved: the logged-on user’s client computer, the Web
and the external system. This model is supported when a user interacts with external data by using Outlook 2010, Microsoft SharePoint
Workspace, and Microsoft Word 2010.
                                                                                                                                                                            server farm, and the external system.
                                                                                                                                                                                                                                                                                                                                                                                Phase                                                Participants                                                                           Task
                                                                                  SECURITY   1. Outlook 2010 users typically use external data in                                                                                                                            1. From Web browsers, users typically interact with
                                                                                  TOKEN         Outlook items such as Contacts or Tasks. SharePoint                                                                                                                             external data in external lists or by using Web
                        LOGGED-ON                 1                                                                                                                                                                                                                                                                                                                                                                                                                                                                           Assemble the
                        USER
                                                                                  SERVICE       Workspace 2010 users can take external lists offline                                                                                                                            Parts.                                                                                                                                                                                                              Define need
                                                                                                and interact with them. Word 2010 users can insert                                                                                                                                                                                                                                                                                                                                                                            project team
                                                                                                external data into Word documents.                                                                          SharePoint Server                      Security Token            2. The BDC Server Runtime on front-end servers                                                                                                              Business decision maker
                OFFICE
                                                                                                                                                                                                                                                   Service
                                                                                                                                                                                                                                                                                uses data from the Business Data Connectivity                                                                      Initial                               Project leader
               CLIENTS
                                                                                  3          2. The Office Integration Client Runtime acts as a                                                                                                                 4               service to connect to and execute operations on
                                                                                                connector between Business Connectivity Services                                                                                                                                external systems.
                                                                                                running on the client and the supported Office                                             Web              2
                                                                                                applications.                                                                              Parts                BDC Server Runtime                                           3. The Secure Store Service securely stores
                                                                                                                                                                                                                                                                                credential sets for external systems and
                   2                                                                         3. If the external data is configured to use claims-based                         1
                                                                                                                                                                                           External              Metadata store                                                 associates those credential sets to individual or                                                                                                                                                                                           Research & write
                          OFFICE INTEGRATION CLIENT
                          RUNTIME                                                               authentication, the client interacts with the Security                                       lists                                                                              group identities.                                                                                                                                                                                                                            specifications
                                                                                                                                                                             Logged-
                                                                                                Token Service on the SharePoint farm to get a claims                         on user                                   5
                                                                                                token.                                                                                                                                                              3        4. The Security Token Service is a Web service that
                                                                                                                                                                                                                                                                                responds to authentication requests by issuing
                                                                                             4. The BDC Client Runtime on client computers uses the                                                                                                   Secure Store              security tokens made up of identity claims that are
                                                                                                                                                                                                                                                      Service
         BCS                           4                                                        data from the Business Data Connectivity service to                                                                                                                             based on user account information.                                                                                                                                                                              Data Specs                    Security Specs                               UI Specs
      SERVICE                                                                                   connect to and execute operations on external
                                           BDC CLIENT                                                                                                                                                                                                                        5. Business Connectivity Services can pass
        HOST                                                                                    systems for rich client access.
                                           RUNTIME                                                                                                                                                                                                                              credentials to databases and Web services that
                                                                                                                                                                                                                                                                                                                                                                                                                                         Architect                                                                                 Identify                                Specify Web
                   6                                                                                                                                                                                                                                                            are configured to use claims-based                                                                                                                                                                                Identify data
                                                                                             5. The Client Cache caches information from the
                                                                                                                                                                                                                                                                                authentication.                                                                                      Specification                                       Program managers                                                                          security                                  parts &
                       STORE SERVICE
                       CLIENT SECURE




                                             5                                                  Business Data Connectivity service and Secure Store                                                                                                                                                                                                                                                                                                                                                 sources                                                                 data parts
                                                                                                                                                                                                Claims-aware                                                                                                                                                                                                                             Model designer                                                                         requirements
                                                                                                Service that is needed to securely connect to external                                             service                                  Database
                                                 CLIENT
                                                                                                data. The cache is refreshed from the SharePoint
                                                 CACHE
                                                                                                farm to incorporate updated information.
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Specify work                                                             Specify thin
                                                        7                                                                                                                                                                                                                                                                                                                                                                                                                                         to get at the                   Specify                                  client user
                                                                                             6. The client Secure Store Service enables end-users to                                                                                                                                                                                                                                                                                                                                                  data                        security                                 experience
                                                                                                configure their security credentials.
                                                                                                                                                                                   Business Connectivity Service Credentials Authentication                                                                                                                                                                                                                                                                                        model
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           Specify rich
                                                                                             7. Business Connectivity Services can pass credentials                                                                                                                                                                                                                                                                                                                                                Design the
                                                                                                to databases and claims-aware services.                                                                    Modes                                                                                                                                                                                                                                                                                   data model
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           client user
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           experience
                                                                                                                                                                          When configuring Business Connectivity Services to pass credentials, the solution designer adds authentication-mode information to
                                                                                                                                                                          external content types. The authentication mode gives Business Connectivity Services information about how to process an incoming
                                                                                                                                                                          authentication request from a user and map that request to a set of credentials that can be passed to the external content system. For
                                                                                                                                                                          example, an authentication mode could specify that a user’s credentials should be passed directly through to the external data system.
                       CLAIMS-AWARE
                                                                       DATABASE                                                                                           Alternatively, it could specify that a user’s credentials should be mapped to an account that is stored in a Secure Store Service which
                          SERVICE                                                                                                                                         should then be passed to the external system.
                                                                                                                                                                                                                                                                                                                                                                                                                                         Site designers
                                                                                                                                                                                                                                                                                                                                                                                                                                         Model designers
Business Connectivity Services and Claims Authentication                                                                                                                                                                                                   Authentication                Description                                                                            Implementation                                           Developers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Implement
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             the data
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              Implement          Implement              Implement          Implement rich   Implement
                                                                                                                                                                                                                                                           Mode                                                                                                                                                                                                                                               work to get         security              data parts/            client        browser
Business Connectivity Services can provide access to external data based on an incoming security token and it can pass security tokens to                                                                                                                                                                                                                                                                                                Database administrators
                                                                                                                                                                                                                                                           PassThrough                   Passes the credentials of the logged-on user to the external
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              model           at the data         settings              Web Parts            experience     experience
external systems. A security token is made up of a set of identity claims about a user, and the use of security tokens for authentication is called
                                                                                                                                                                                                                                                                                         system. This requires that the user’s credentials are known to
“claims-based authentication.”                                                                                                                                                                                                                                                           the external system.

                                                                                                                                                                                                                                                           RevertToSelf                  When the user is accessing external data from a Web browser,
                                                                                                                                                                                                                                                                                         this mode maps the user’s credentials to the application pool
                                                                                             1. A user tries an operation on an external list that is configured                                                                                                                         identity account under which the Business Connectivity Services
                                                                                                                                                                                                                                                                                         are running on the Web server and sends those credentials to
                                                                                                for claims authentication.                                                                                                                                                               the external system. When the user is accessing external data
               Logged-on                                                                                                                                                                                                                                                                 from an Office client application, this mode is equivalent to
                                                                                                                                                                                                                                                                                         PassThrough mode, because Business Connectivity Services
               user
                                                                                             2. The client application requests a security token from the                                                                                                                                running on the client will be running under the user’s
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      Integrate solution
                                                                                                                                                                                                                                                                                         credentials.
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               Bugs, etc
                                                                                                Secure Token Service.                                                                                                                                                                                                                                                                                                                                                                                                                     elements
                                                                                                                                                                                                                                                                                         Note: RevertToSelf is not supported in hosted environments.
                                                                                                                                                                                                                                                                                                                                                                                                                                         Testers
       1
                                                 SharePoint Server
                                                                                             3. Based on the requesting user’s identity, the Secure Token                                                                                                  WindowsCredentials            For external Web services or databases, this mode uses a
                                                                                                                                                                                                                                                                                                                                                                                Test/integration                                         Configuration managers
                                                                          Security Token
                                                                                                Service issues a security token that contains a set of claims                                                                                                                            Secure Store Service to map the user’s credentials to a set of                                                                                                                                                                                       Test
                                                                          Service                                                                                                                                                                                                        Windows credentials on the external system.
           2                                                                                    and a target application identifier. The Secure Token Service                                                                                                                            For an external Web service, this mode uses a Secure Store
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             solution
                                                                                                                                                                                                                                                           Credentials
               3                                                                                returns the security token to the client application.                                                                                                                                    Service to map the user’s credentials to a set of credentials that
                                                                                                                                                                                                                                                                                         are supplied by a source other than Windows and that are used
                                                                                                                                                                                                                                                                                         to access external data. The Web service should use basic or
                                                                                                                                                                                                                                                                                         digest authentication when this mode is used.
                                                                                             4. The client passes the security token to the Secure Store
                                                            4                                   Service.                                                                                                                                                                                 Important: To help preserve security in this mode, we                                                                                                                                                                                            Package for
                                                  5                                                                                                                                                                                                                                      recommend that the connection between the Business
                                                                                                                                                                                                                                                                                         Connectivity Services and the external system should be                                                                                                                                                                                          deployment
                                                                                                                                                                                                                                                                                         secured by using Secure Sockets Layer (SSL) or Internet
     External                                                               Secure Store
                                                                            Service
                                                                                             5. The Secure Store Service evaluates the security token and
                                                                                                uses the target application identifier to return a set of
                                                                                                                                                                                                                                                                                         Protocol Security (IPSec).                                                                   Deployment                                         IT service administrators
     list                                             BCS Runtime
                                                                                                credentials that apply to the external system.                                                                                                             RdbCredentials                For an external database, this mode uses a Secure Store
                                                                                                                                                                                                                                                                                         Service to map the user’s credentials to a set of credentials that
                                                                                                                                                                                                                                                                                         are supplied by a source other than Windows. The database                                                                                                                                                                           Deploy to                       Deploy to
                                                                                             6. The client receives the credentials and passes them to the                                                                                                                               should use basic or digest authentication when this mode is
                                                      Metadata store
                                                                                                external system so that an operation (such as retrieving or                                                                                                                              used. To help preserve security in this mode, we recommend                                                                                                                                                                             pilot                        production
                                                                                                                                                                                                                                                                                         that the connection between the Business Connectivity Services
                                                                                                updating external data) can be performed.                                                                                                                                                and the external system should be secured by using SSL or
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            environment                     environment
                                       6
                                                                                                                                                                                                                                                                                         IPSec.




                                                   Claims aware
                                                      service
                                                                                                                                                                                                                              © 2009 Microsoft Corporation. All rights reserved. To send feedback about this documentation, please write to us at ITSPDocs@microsoft.com.

More Related Content

Viewers also liked

Potentiele vragen pl
Potentiele vragen plPotentiele vragen pl
Potentiele vragen plLaura Mortier
 
De pinguin houdt van muzikanten! t dose 2013
De pinguin houdt van muzikanten! t dose 2013De pinguin houdt van muzikanten! t dose 2013
De pinguin houdt van muzikanten! t dose 2013Frits Van Der Holst
 
Report: Identifying Public Lands Suitable for Urban Agriculture in the City o...
Report: Identifying Public Lands Suitable for Urban Agriculture in the City o...Report: Identifying Public Lands Suitable for Urban Agriculture in the City o...
Report: Identifying Public Lands Suitable for Urban Agriculture in the City o...Matt Dressler
 
Elektronisch boeken in het onderwijs
Elektronisch boeken in het onderwijsElektronisch boeken in het onderwijs
Elektronisch boeken in het onderwijsPierre Gorissen
 
Gemeentefinanciën - documentatie
Gemeentefinanciën - documentatieGemeentefinanciën - documentatie
Gemeentefinanciën - documentatieguestd60e5b67
 
Dn11 u3 a28_igpc
Dn11 u3 a28_igpcDn11 u3 a28_igpc
Dn11 u3 a28_igpcaeson
 
ConXioN cloud - vcloud - office365
ConXioN   cloud - vcloud - office365ConXioN   cloud - vcloud - office365
ConXioN cloud - vcloud - office365CXN-BE
 
Agri daily report
Agri daily reportAgri daily report
Agri daily reportcash cow
 
搜索引擎与搜索引擎营销
搜索引擎与搜索引擎营销搜索引擎与搜索引擎营销
搜索引擎与搜索引擎营销Hao Peiqiang
 
Weblectures in het onderwijs
Weblectures in het onderwijsWeblectures in het onderwijs
Weblectures in het onderwijsPierre Gorissen
 
Czech Republic - Jeseniky
Czech Republic - JesenikyCzech Republic - Jeseniky
Czech Republic - JesenikyOldrich
 
Elektronisch boeken in het onderwijs
Elektronisch boeken in het onderwijsElektronisch boeken in het onderwijs
Elektronisch boeken in het onderwijsPierre Gorissen
 
Presentatie Zaanstad Netwerk Ssc V2
Presentatie Zaanstad Netwerk Ssc V2Presentatie Zaanstad Netwerk Ssc V2
Presentatie Zaanstad Netwerk Ssc V2jan.paffen
 

Viewers also liked (20)

Potentiele vragen pl
Potentiele vragen plPotentiele vragen pl
Potentiele vragen pl
 
De pinguin houdt van muzikanten! t dose 2013
De pinguin houdt van muzikanten! t dose 2013De pinguin houdt van muzikanten! t dose 2013
De pinguin houdt van muzikanten! t dose 2013
 
2013.06 rcc wko ketenbenadering
2013.06 rcc wko ketenbenadering2013.06 rcc wko ketenbenadering
2013.06 rcc wko ketenbenadering
 
Report: Identifying Public Lands Suitable for Urban Agriculture in the City o...
Report: Identifying Public Lands Suitable for Urban Agriculture in the City o...Report: Identifying Public Lands Suitable for Urban Agriculture in the City o...
Report: Identifying Public Lands Suitable for Urban Agriculture in the City o...
 
Elektronisch boeken in het onderwijs
Elektronisch boeken in het onderwijsElektronisch boeken in het onderwijs
Elektronisch boeken in het onderwijs
 
Gemeentefinanciën - documentatie
Gemeentefinanciën - documentatieGemeentefinanciën - documentatie
Gemeentefinanciën - documentatie
 
Dn11 u3 a28_igpc
Dn11 u3 a28_igpcDn11 u3 a28_igpc
Dn11 u3 a28_igpc
 
ConXioN cloud - vcloud - office365
ConXioN   cloud - vcloud - office365ConXioN   cloud - vcloud - office365
ConXioN cloud - vcloud - office365
 
Agri daily report
Agri daily reportAgri daily report
Agri daily report
 
搜索引擎与搜索引擎营销
搜索引擎与搜索引擎营销搜索引擎与搜索引擎营销
搜索引擎与搜索引擎营销
 
Gegevensbanken 2010 les13
Gegevensbanken 2010 les13Gegevensbanken 2010 les13
Gegevensbanken 2010 les13
 
Weblectures in het onderwijs
Weblectures in het onderwijsWeblectures in het onderwijs
Weblectures in het onderwijs
 
Czech Republic - Jeseniky
Czech Republic - JesenikyCzech Republic - Jeseniky
Czech Republic - Jeseniky
 
Elektronisch boeken in het onderwijs
Elektronisch boeken in het onderwijsElektronisch boeken in het onderwijs
Elektronisch boeken in het onderwijs
 
Openheid In Innovatie
Openheid In InnovatieOpenheid In Innovatie
Openheid In Innovatie
 
Autos híbridos
Autos híbridosAutos híbridos
Autos híbridos
 
Vergaderen op afstand
Vergaderen op afstandVergaderen op afstand
Vergaderen op afstand
 
Presentatie Zaanstad Netwerk Ssc V2
Presentatie Zaanstad Netwerk Ssc V2Presentatie Zaanstad Netwerk Ssc V2
Presentatie Zaanstad Netwerk Ssc V2
 
Gegevensbank
GegevensbankGegevensbank
Gegevensbank
 
Gunnen Op Waarde
Gunnen Op WaardeGunnen Op Waarde
Gunnen Op Waarde
 

Similar to Business connectivityservices model

Business.Process.Alignment
Business.Process.AlignmentBusiness.Process.Alignment
Business.Process.AlignmentDjadja Sardjana
 
Business Process Management
Business Process ManagementBusiness Process Management
Business Process ManagementIBMGovernmentCA
 
Bill Moore Visual Resume
Bill Moore Visual ResumeBill Moore Visual Resume
Bill Moore Visual ResumeWilliam Moore
 
Doty Promo Piece
Doty Promo PieceDoty Promo Piece
Doty Promo Piecedotydesign
 
Annual hr salary survey 2011 report
Annual hr salary survey 2011 reportAnnual hr salary survey 2011 report
Annual hr salary survey 2011 reportHRhelpdesk.in
 
The collaborative enterprise
The collaborative enterpriseThe collaborative enterprise
The collaborative enterpriseLorie Vela
 
Service Oriented Enterprise Architecture and Service Oriented Enterprise
Service Oriented Enterprise Architecture and Service Oriented EnterpriseService Oriented Enterprise Architecture and Service Oriented Enterprise
Service Oriented Enterprise Architecture and Service Oriented EnterpriseYan Zhao
 
Behavioral Stylesheets
Behavioral StylesheetsBehavioral Stylesheets
Behavioral StylesheetsDan Yoder
 
Är du molnklar?
Är du molnklar?Är du molnklar?
Är du molnklar?IBM Sverige
 
Introduction to ACOORA
Introduction to ACOORAIntroduction to ACOORA
Introduction to ACOORAACOORA
 
Valentines Day Kelly Ocg
Valentines Day Kelly OcgValentines Day Kelly Ocg
Valentines Day Kelly Ocgsokolki
 
The CORA Model Explained
The CORA Model ExplainedThe CORA Model Explained
The CORA Model Explainedtelzinga
 
RR Donnelley 2000AR
RR Donnelley  2000ARRR Donnelley  2000AR
RR Donnelley 2000ARfinance23
 
Choose a tool for business intelligence in share point 2010
Choose a tool for business intelligence in share point 2010Choose a tool for business intelligence in share point 2010
Choose a tool for business intelligence in share point 2010Ard van Someren
 
Jan Duffy - UK/Canada: L'esperienza degli Shared Services Centers in UK e in ...
Jan Duffy - UK/Canada: L'esperienza degli Shared Services Centers in UK e in ...Jan Duffy - UK/Canada: L'esperienza degli Shared Services Centers in UK e in ...
Jan Duffy - UK/Canada: L'esperienza degli Shared Services Centers in UK e in ...innoforum09
 
20091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 520091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 5Arian Zwegers
 

Similar to Business connectivityservices model (20)

Skelta BPM
Skelta BPMSkelta BPM
Skelta BPM
 
Business.Process.Alignment
Business.Process.AlignmentBusiness.Process.Alignment
Business.Process.Alignment
 
Business Process Management
Business Process ManagementBusiness Process Management
Business Process Management
 
Messing
MessingMessing
Messing
 
Bill Moore Visual Resume
Bill Moore Visual ResumeBill Moore Visual Resume
Bill Moore Visual Resume
 
Doty Promo Piece
Doty Promo PieceDoty Promo Piece
Doty Promo Piece
 
Annual hr salary survey 2011 report
Annual hr salary survey 2011 reportAnnual hr salary survey 2011 report
Annual hr salary survey 2011 report
 
The collaborative enterprise
The collaborative enterpriseThe collaborative enterprise
The collaborative enterprise
 
Service Oriented Enterprise Architecture and Service Oriented Enterprise
Service Oriented Enterprise Architecture and Service Oriented EnterpriseService Oriented Enterprise Architecture and Service Oriented Enterprise
Service Oriented Enterprise Architecture and Service Oriented Enterprise
 
Behavioral Stylesheets
Behavioral StylesheetsBehavioral Stylesheets
Behavioral Stylesheets
 
Är du molnklar?
Är du molnklar?Är du molnklar?
Är du molnklar?
 
Introduction to ACOORA
Introduction to ACOORAIntroduction to ACOORA
Introduction to ACOORA
 
Valentines Day Kelly Ocg
Valentines Day Kelly OcgValentines Day Kelly Ocg
Valentines Day Kelly Ocg
 
The CORA Model Explained
The CORA Model ExplainedThe CORA Model Explained
The CORA Model Explained
 
RR Donnelley 2000AR
RR Donnelley  2000ARRR Donnelley  2000AR
RR Donnelley 2000AR
 
Choose a tool for business intelligence in share point 2010
Choose a tool for business intelligence in share point 2010Choose a tool for business intelligence in share point 2010
Choose a tool for business intelligence in share point 2010
 
Jan Duffy - UK/Canada: L'esperienza degli Shared Services Centers in UK e in ...
Jan Duffy - UK/Canada: L'esperienza degli Shared Services Centers in UK e in ...Jan Duffy - UK/Canada: L'esperienza degli Shared Services Centers in UK e in ...
Jan Duffy - UK/Canada: L'esperienza degli Shared Services Centers in UK e in ...
 
20091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 520091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 5
 
NETSUITE DEVELOPMENT SERVICES
NETSUITE DEVELOPMENT SERVICESNETSUITE DEVELOPMENT SERVICES
NETSUITE DEVELOPMENT SERVICES
 
I B M ECM Roadmap
I B M  ECM RoadmapI B M  ECM Roadmap
I B M ECM Roadmap
 

More from Ard van Someren

Het outsourcing congres 20011 - Documents in/to The Cloud, do not forget unst...
Het outsourcing congres 20011 - Documents in/to The Cloud, do not forget unst...Het outsourcing congres 20011 - Documents in/to The Cloud, do not forget unst...
Het outsourcing congres 20011 - Documents in/to The Cloud, do not forget unst...Ard van Someren
 
Productbrochure Ricoh WerkBOX
Productbrochure Ricoh WerkBOXProductbrochure Ricoh WerkBOX
Productbrochure Ricoh WerkBOXArd van Someren
 
Onbeperkt archiveren en opslaan van documenten en informatie v4.1pub avs
Onbeperkt archiveren en opslaan van documenten en informatie v4.1pub   avsOnbeperkt archiveren en opslaan van documenten en informatie v4.1pub   avs
Onbeperkt archiveren en opslaan van documenten en informatie v4.1pub avsArd van Someren
 
Dspinformatielogistiekmei2010avsv01
Dspinformatielogistiekmei2010avsv01Dspinformatielogistiekmei2010avsv01
Dspinformatielogistiekmei2010avsv01Ard van Someren
 
IDRM2 informatie beheer en onderhoud
IDRM2  informatie beheer en onderhoudIDRM2  informatie beheer en onderhoud
IDRM2 informatie beheer en onderhoudArd van Someren
 
Upgrade services share_pointserver
Upgrade services share_pointserverUpgrade services share_pointserver
Upgrade services share_pointserverArd van Someren
 
Upgrade approaches share_pointproducts
Upgrade approaches share_pointproductsUpgrade approaches share_pointproducts
Upgrade approaches share_pointproductsArd van Someren
 
Topologies share pointserver2010
Topologies share pointserver2010Topologies share pointserver2010
Topologies share pointserver2010Ard van Someren
 
Svs crossfarm sharepointproducts2010
Svs crossfarm sharepointproducts2010Svs crossfarm sharepointproducts2010
Svs crossfarm sharepointproducts2010Ard van Someren
 
Search model 4 of 4 farm-level design
Search model 4 of 4   farm-level designSearch model 4 of 4   farm-level design
Search model 4 of 4 farm-level designArd van Someren
 
Search model 3 of 4 search architectures
Search model 3 of 4   search architecturesSearch model 3 of 4   search architectures
Search model 3 of 4 search architecturesArd van Someren
 
Search model 1 of 4 search technologies
Search model 1 of 4   search technologiesSearch model 1 of 4   search technologies
Search model 1 of 4 search technologiesArd van Someren
 
Oit2010 model extranet_topologies
Oit2010 model extranet_topologiesOit2010 model extranet_topologies
Oit2010 model extranet_topologiesArd van Someren
 
Hosting share pointproducts2010
Hosting share pointproducts2010Hosting share pointproducts2010
Hosting share pointproducts2010Ard van Someren
 
Deployment share point2010products
Deployment share point2010productsDeployment share point2010products
Deployment share point2010productsArd van Someren
 
Content deployment sharepointserver2010
Content deployment sharepointserver2010Content deployment sharepointserver2010
Content deployment sharepointserver2010Ard van Someren
 
Business productivity at its best whitepaper
Business productivity at its best whitepaperBusiness productivity at its best whitepaper
Business productivity at its best whitepaperArd van Someren
 
Share point 2010 ard van someren working version
Share point 2010  ard van someren working versionShare point 2010  ard van someren working version
Share point 2010 ard van someren working versionArd van Someren
 

More from Ard van Someren (20)

Het outsourcing congres 20011 - Documents in/to The Cloud, do not forget unst...
Het outsourcing congres 20011 - Documents in/to The Cloud, do not forget unst...Het outsourcing congres 20011 - Documents in/to The Cloud, do not forget unst...
Het outsourcing congres 20011 - Documents in/to The Cloud, do not forget unst...
 
Productbrochure Ricoh WerkBOX
Productbrochure Ricoh WerkBOXProductbrochure Ricoh WerkBOX
Productbrochure Ricoh WerkBOX
 
Onbeperkt archiveren en opslaan van documenten en informatie v4.1pub avs
Onbeperkt archiveren en opslaan van documenten en informatie v4.1pub   avsOnbeperkt archiveren en opslaan van documenten en informatie v4.1pub   avs
Onbeperkt archiveren en opslaan van documenten en informatie v4.1pub avs
 
Dspinformatielogistiekmei2010avsv01
Dspinformatielogistiekmei2010avsv01Dspinformatielogistiekmei2010avsv01
Dspinformatielogistiekmei2010avsv01
 
IDRM2 informatie beheer en onderhoud
IDRM2  informatie beheer en onderhoudIDRM2  informatie beheer en onderhoud
IDRM2 informatie beheer en onderhoud
 
Upgrade services share_pointserver
Upgrade services share_pointserverUpgrade services share_pointserver
Upgrade services share_pointserver
 
Upgrade approaches share_pointproducts
Upgrade approaches share_pointproductsUpgrade approaches share_pointproducts
Upgrade approaches share_pointproducts
 
Topologies share pointserver2010
Topologies share pointserver2010Topologies share pointserver2010
Topologies share pointserver2010
 
Svs crossfarm sharepointproducts2010
Svs crossfarm sharepointproducts2010Svs crossfarm sharepointproducts2010
Svs crossfarm sharepointproducts2010
 
Search model 4 of 4 farm-level design
Search model 4 of 4   farm-level designSearch model 4 of 4   farm-level design
Search model 4 of 4 farm-level design
 
Search model 3 of 4 search architectures
Search model 3 of 4   search architecturesSearch model 3 of 4   search architectures
Search model 3 of 4 search architectures
 
Search model 1 of 4 search technologies
Search model 1 of 4   search technologiesSearch model 1 of 4   search technologies
Search model 1 of 4 search technologies
 
Oit2010 model extranet_topologies
Oit2010 model extranet_topologiesOit2010 model extranet_topologies
Oit2010 model extranet_topologies
 
Oit2010 model databases
Oit2010 model databasesOit2010 model databases
Oit2010 model databases
 
Hosting share pointproducts2010
Hosting share pointproducts2010Hosting share pointproducts2010
Hosting share pointproducts2010
 
Deployment share point2010products
Deployment share point2010productsDeployment share point2010products
Deployment share point2010products
 
Content deployment sharepointserver2010
Content deployment sharepointserver2010Content deployment sharepointserver2010
Content deployment sharepointserver2010
 
Business productivity at its best whitepaper
Business productivity at its best whitepaperBusiness productivity at its best whitepaper
Business productivity at its best whitepaper
 
Share point 2010 ard van someren working version
Share point 2010  ard van someren working versionShare point 2010  ard van someren working version
Share point 2010 ard van someren working version
 
Send2SharePoint
Send2SharePointSend2SharePoint
Send2SharePoint
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Business connectivityservices model

  • 1. Microsoft Business Connectivity Services Model What are Business Connectivity Services? Business Connectivity Services Elements of Business Connectivity H architecture Services Introducing the Microsoft Typical solutions based on Web browser Office clients Business Connectivity Services Business Connectivity Services The illustration to the left shows the elements of H. Using Web Parts and SharePoint external lists, Microsoft SharePoint Server 2010 and the Microsoft Office 2010 suites include Solutions based on Business Connectivity Services can take advantage of the J the Business Connectivity Services: back-end data exposed by the Business Data Microsoft Business Connectivity Services, which are a set of services and features that integration of client applications, servers, services, and tools in the Microsoft Office provide a way to connect solutions based on SharePoint Server 2010 to sources of 2010 suites. Information workers typically perform much of their work outside the formal Connectivity service is made available in external data and to define external content types based on that external data. External processes of a business system. For example, they collaborate by phone or e-mail A. The Business Data Connectivity service SharePoint Web sites and available from the Web Office Integration Client runtime content types are similar to content types and allow the presentation of and interaction messages, use documents and spreadsheets from multiple sources, and switch Front-end provides a means for creating external content browser. with data from external systems in SharePoint lists (called external lists), Web Parts, between being online and offline. Solutions based on Business Connectivity Services servers types. and in Microsoft Outlook 2010, Microsoft SharePoint Workspace 2010, and Microsoft can be designed to fit within these informal processes that information workers use: Word 2010 clients. Office Business Web External I. The BDC Server Runtime on the server provides Part · They can be built by combining multiple services and features from external systems Parts lists B. External content types are stored in a dedicated access to Business Data Connectivity service data Sources of external data that Business Connectivity Services can connect to include and from the Office 2010 suites to deliver solutions targeted to specific roles. database. from Office client applications. SQL Server databases, SAP applications, Web services (including Windows Communication Foundation Web services), custom applications, and Web sites based · They support informal interactions and target activities and processes that occur on SharePoint products. By using Business Connectivity Services, you can design and mostly outside formal enterprise systems. Because they are built by using C. The Secure Store Service provides the J. On supported Office 2010 clients (SharePoint build solutions that extend SharePoint collaboration capabilities and the Office user SharePoint 2010 products, solutions based on Business Connectivity Services K capability of securely storing credential sets and Workspace, Outlook, and Word) the Office experience to include external business data and the processes that are associated BCS E associating them to identities or group of identities. Integration Client Runtime acts as a connector promote collaboration. BDC Runtime with that data. Service BDC Server Runtime A common scenario for the Secure Store Service between the BDC runtime and Office applications. · They help users perform tasks within the familiar user interface of Office applications host F Business Connectivity Services solutions use a set of standardized interfaces to provide is an application that authenticates against a Client SSS and SharePoint 2010 products. Metadata cache access to business data. As a result, solution developers do not have to learn I system in which the current user is known K. The BDC Client Runtime uses the Business L programming practices that apply to a specific system or adapter for each external Examples of solutions based on Business Connectivity Services include the following: differently or has a different account for Data Connectivity service data to connect to and Client cache system. Business Connectivity Services also provide the run-time environment in which M G authentication. When used with the Business Data execute operations on external data sources for solutions that include external data are loaded, integrated, and executed in supported · Help Desk – An enterprise implements its help desk, which provides internal Office client applications and on the Web server. technical support, as a solution based on Business Connectivity Services. Support O Connectivity service, the Secure Store Service rich client access. requests and the technical support knowledge base are stored in external databases provides a means to authenticate against external and are integrated into the solution by using the Business Data Connectivity Cache refresh operations Business Connectivity Services are administered primarily by using the Business Data execution systems. L. Data is cached on client computers. services. The solution displays both support requests and the knowledge base in the N Connectivity service. Administrators can use this service to manage: Web browser. Information workers can view their current requests either in a Web · External content types: Named sets of fields that define an object, such as browser or in Microsoft Outlook. Tech support specialists view the requests SAP D. Credential sets are stored in a dedicated M. The Business Data Connectivity Client Runtime assigned to them in a browser, by using Microsoft Outlook, or, when offline, by using “Customer,” or “Order,” in a business application along with the methods to create, Microsoft SharePoint Workspace. Workflows take support issues through each of Custom database. supports connecting to external systems from SQL read, update, or delete that object in its external data source. Typical external their stages. Managers on the technical support team can view dashboards that Server client computers. content type administration tasks include adding actions to an external content type display help desk reports. Typical reports identify the number of support issues Shared Web SharePoint E. The BDC Server Runtime on front-end servers to provide users with new functionality, and associating profile pages with an assigned to each support specialist, the most critical issues currently, and the service services uses the Business Data Connectivity service data N. The client cache refresh synchronizes the external content type to customize its appearance when viewed. number of support incidents that are handled by each support specialist during a given time period. A C to connect to and execute operations on external cache with the back-end data. · External systems: Supported sources of data that can be modeled by the Business Connectivity Services, such as Web services, SQL Server, and other relational BDC service Secure Store Service data sources for Web browser access. · Artist tracker - A talent agency integrates its database of artists into its internal O. The Client Secure Store enables end-users to databases. Typical external system administration tasks include setting permissions Web site. The entire list of artists, their contact information, and schedules can be on the data source and viewing the external content types that are associated with taken offline in Microsoft SharePoint Workspace or in Microsoft Outlook. Recording Development Tools F. The metadata cache provides caching of the configure their client mappings in the credential the data source. contracts can be generated and filled from the Web site, Microsoft SharePoint runtime Business Data Connectivity service data. It database. Workspace, or Microsoft Outlook, and a workflow guides each contract through its P · BDC models: XML descriptions of one or more external content types along with SharePoint can optionally be encrypted. various stages. New artists can be added from the Web site or from Microsoft resources, such as localized strings, and connectivity information. Typical BDC Designer P. Solution developers can use SharePoint Outlook. Using this solution, agents always have the information they need close at model administration tasks include importing and exporting models or resource files, hand, and they can perform many key tasks by using familiar Office interfaces. 2010 setting permissions on them, and viewing the external content types associated with G. The Business Data Connectivity service Designer 2010 and Visual Studio 2010 to create a model. · My Sales Dashboard - A sales dashboard application helps sales associates in an Visual Studio Database supports connecting to SQL Server and other external content types. organization quickly find the information they need and enter new data. Sales orders 2010 servers relational databases, SharePoint content, Web and customer information are managed in an external database and integrated into services, and custom applications that are the solution by using the Business Data Connectivity service. Depending on their roles, team members can view sales analytics information, individual team B D compatible with the BDC object model. BDC service Secure Store Service members’ sales performance data, sales leads, and a customer’s contact data data information and orders. Sales professionals can view their daily calendars, view tasks assigned to them by their managers, collaborate with team members, and read industry news, either from a Web browser, from Microsoft Outlook, or offline in Microsoft SharePoint Workspace. By using Microsoft Word 2010, managers can author monthly status reports that include data from the external systems. Business Connectivity Services Security Creating solutions based on Business Connectivity Services Business Connectivity Services include security features for authenticating users to access external systems and for configuring permissions on data from external systems. Business Connectivity Services are highly flexible and can accommodate a range of security methods from within supported Microsoft Office 2010 applications and from the Web browser. Solutions based on Business Connectivity Services surface external data through the Business Data Connectivity service and provide access to that data in Office 2010 clients, such as Microsoft Outlook 2010, and in SharePoint Web sites. This flowchart illustrates the stages in designing and creating a solution that is based on Business Connectivity Services, the roles that come into play at each stage, and tasks Accessing external data from an Office client application Accessing external data from a Web browser performed by the various team members in specifying, designing, and creating the solution : When accessing external data from a supported Office client application, two systems are involved: the client computer of the logged-on user When a user accesses external data from a Web browser, three systems are involved: the logged-on user’s client computer, the Web and the external system. This model is supported when a user interacts with external data by using Outlook 2010, Microsoft SharePoint Workspace, and Microsoft Word 2010. server farm, and the external system. Phase Participants Task SECURITY 1. Outlook 2010 users typically use external data in 1. From Web browsers, users typically interact with TOKEN Outlook items such as Contacts or Tasks. SharePoint external data in external lists or by using Web LOGGED-ON 1 Assemble the USER SERVICE Workspace 2010 users can take external lists offline Parts. Define need and interact with them. Word 2010 users can insert project team external data into Word documents. SharePoint Server Security Token 2. The BDC Server Runtime on front-end servers Business decision maker OFFICE Service uses data from the Business Data Connectivity Initial Project leader CLIENTS 3 2. The Office Integration Client Runtime acts as a 4 service to connect to and execute operations on connector between Business Connectivity Services external systems. running on the client and the supported Office Web 2 applications. Parts BDC Server Runtime 3. The Secure Store Service securely stores credential sets for external systems and 2 3. If the external data is configured to use claims-based 1 External Metadata store associates those credential sets to individual or Research & write OFFICE INTEGRATION CLIENT RUNTIME authentication, the client interacts with the Security lists group identities. specifications Logged- Token Service on the SharePoint farm to get a claims on user 5 token. 3 4. The Security Token Service is a Web service that responds to authentication requests by issuing 4. The BDC Client Runtime on client computers uses the Secure Store security tokens made up of identity claims that are Service BCS 4 data from the Business Data Connectivity service to based on user account information. Data Specs Security Specs UI Specs SERVICE connect to and execute operations on external BDC CLIENT 5. Business Connectivity Services can pass HOST systems for rich client access. RUNTIME credentials to databases and Web services that Architect Identify Specify Web 6 are configured to use claims-based Identify data 5. The Client Cache caches information from the authentication. Specification Program managers security parts & STORE SERVICE CLIENT SECURE 5 Business Data Connectivity service and Secure Store sources data parts Claims-aware Model designer requirements Service that is needed to securely connect to external service Database CLIENT data. The cache is refreshed from the SharePoint CACHE farm to incorporate updated information. Specify work Specify thin 7 to get at the Specify client user 6. The client Secure Store Service enables end-users to data security experience configure their security credentials. Business Connectivity Service Credentials Authentication model Specify rich 7. Business Connectivity Services can pass credentials Design the to databases and claims-aware services. Modes data model client user experience When configuring Business Connectivity Services to pass credentials, the solution designer adds authentication-mode information to external content types. The authentication mode gives Business Connectivity Services information about how to process an incoming authentication request from a user and map that request to a set of credentials that can be passed to the external content system. For example, an authentication mode could specify that a user’s credentials should be passed directly through to the external data system. CLAIMS-AWARE DATABASE Alternatively, it could specify that a user’s credentials should be mapped to an account that is stored in a Secure Store Service which SERVICE should then be passed to the external system. Site designers Model designers Business Connectivity Services and Claims Authentication Authentication Description Implementation Developers Implement the data Implement Implement Implement Implement rich Implement Mode work to get security data parts/ client browser Business Connectivity Services can provide access to external data based on an incoming security token and it can pass security tokens to Database administrators PassThrough Passes the credentials of the logged-on user to the external model at the data settings Web Parts experience experience external systems. A security token is made up of a set of identity claims about a user, and the use of security tokens for authentication is called system. This requires that the user’s credentials are known to “claims-based authentication.” the external system. RevertToSelf When the user is accessing external data from a Web browser, this mode maps the user’s credentials to the application pool 1. A user tries an operation on an external list that is configured identity account under which the Business Connectivity Services are running on the Web server and sends those credentials to for claims authentication. the external system. When the user is accessing external data Logged-on from an Office client application, this mode is equivalent to PassThrough mode, because Business Connectivity Services user 2. The client application requests a security token from the running on the client will be running under the user’s Integrate solution credentials. Bugs, etc Secure Token Service. elements Note: RevertToSelf is not supported in hosted environments. Testers 1 SharePoint Server 3. Based on the requesting user’s identity, the Secure Token WindowsCredentials For external Web services or databases, this mode uses a Test/integration Configuration managers Security Token Service issues a security token that contains a set of claims Secure Store Service to map the user’s credentials to a set of Test Service Windows credentials on the external system. 2 and a target application identifier. The Secure Token Service For an external Web service, this mode uses a Secure Store solution Credentials 3 returns the security token to the client application. Service to map the user’s credentials to a set of credentials that are supplied by a source other than Windows and that are used to access external data. The Web service should use basic or digest authentication when this mode is used. 4. The client passes the security token to the Secure Store 4 Service. Important: To help preserve security in this mode, we Package for 5 recommend that the connection between the Business Connectivity Services and the external system should be deployment secured by using Secure Sockets Layer (SSL) or Internet External Secure Store Service 5. The Secure Store Service evaluates the security token and uses the target application identifier to return a set of Protocol Security (IPSec). Deployment IT service administrators list BCS Runtime credentials that apply to the external system. RdbCredentials For an external database, this mode uses a Secure Store Service to map the user’s credentials to a set of credentials that are supplied by a source other than Windows. The database Deploy to Deploy to 6. The client receives the credentials and passes them to the should use basic or digest authentication when this mode is Metadata store external system so that an operation (such as retrieving or used. To help preserve security in this mode, we recommend pilot production that the connection between the Business Connectivity Services updating external data) can be performed. and the external system should be secured by using SSL or environment environment 6 IPSec. Claims aware service © 2009 Microsoft Corporation. All rights reserved. To send feedback about this documentation, please write to us at ITSPDocs@microsoft.com.