A presentation at a technology meetup.
Roy Kim will walk through various access scenarios and capabilities using Azure AD services and features to access SharePoint 2013/2016 server. This will include a comparison between AD Connect + Azure Application Proxy to publish an internal SharePoint application and 3rd Party Auth0 to assist in federating Azure AD and SSO integration. And also the recently supported Azure AD SAML 1.1 Token.
Roy will go through a demo, its architecture, and commentary of pros and cons. At the end you will have a good understanding of the technology capabilities to determine supporting access and user management scenarios.
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected.2
Migrating on premises and cloud contents to SharePoint Online at no cost with...Juan Carlos Gonzalez
Presentation delivered at M365 Philly virtual that took place on the 23rd of July 2020. In my session I talked about the migration tools provided by Microsoft to move On-Premises and Cloud contents to SharePoint Online and OneDrive For Business.
Whether or not you’re in the cloud, your employees are. This brings new challenges for Identity, Security and Compliance teams. Bring the security
of your on-premises systems to your cloud applications — both approved and unapproved — for deeper transparency, comprehensive controls, and
enhanced protection against cloud security issues.
Microsoft Graph API - A Single Stop For Your Cloud SolutionDipti Chhatrapati
The purpose of this slide is to help you to build a Cloud App using Microsoft Graph API as per your business requirement that works with data from different cloud services whether it’s a one-drive, outlook, office 365 Groups, Users and many more.
I have categorized information by seven rainbow colored steps to understand how Microsoft Graph API is a single stop for your cloud solution , hope you will enjoy it !
Here's the slide deck from my session titled "Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps" which was presented on the Modern Workplace Conference Paris 2022 Virtual event.
This is Microsoft Azure Information Protection which helps you out to protect your data being accessible to the unauthorized users. This is an overview for the AIP
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected.2
Migrating on premises and cloud contents to SharePoint Online at no cost with...Juan Carlos Gonzalez
Presentation delivered at M365 Philly virtual that took place on the 23rd of July 2020. In my session I talked about the migration tools provided by Microsoft to move On-Premises and Cloud contents to SharePoint Online and OneDrive For Business.
Whether or not you’re in the cloud, your employees are. This brings new challenges for Identity, Security and Compliance teams. Bring the security
of your on-premises systems to your cloud applications — both approved and unapproved — for deeper transparency, comprehensive controls, and
enhanced protection against cloud security issues.
Microsoft Graph API - A Single Stop For Your Cloud SolutionDipti Chhatrapati
The purpose of this slide is to help you to build a Cloud App using Microsoft Graph API as per your business requirement that works with data from different cloud services whether it’s a one-drive, outlook, office 365 Groups, Users and many more.
I have categorized information by seven rainbow colored steps to understand how Microsoft Graph API is a single stop for your cloud solution , hope you will enjoy it !
Here's the slide deck from my session titled "Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps" which was presented on the Modern Workplace Conference Paris 2022 Virtual event.
This is Microsoft Azure Information Protection which helps you out to protect your data being accessible to the unauthorized users. This is an overview for the AIP
Azure Active Directory (AD) is a directory as a service on Microsoft Azure. More than the cloud identity Azure AD provides a platform to build cloud applications with multi tenancy support. A flexible authentication systems which enables developers to leverage the cloud identity model and develop applications at ease. The session will walk you through on the basics of Azure AD and how to develop .NET applications using Azure AD.
Azure Role Based Access Control with an use case and explanation about various concepts like Global Administrators, Role Assignments, Account Administrators, Azure Roles, Custom Roles for both Azure AD and Azure Subscriptions
Platform + Intelligence + Partners
This new understanding has led us to build new solutions for our customers. It informs our entire approach across three critical elements:
Building a platform that looks holistically across all the critical end-points we talked about – building security into our platform as well as providing security tools and technologies to you
Acting on the Intelligence that comes from our security-related signals and insights – helps you and us to detect threats more quickly
Fostering a vibrant ecosystem of partners who help us raise the bar across the industry – we know we’re not your only security vendor, and we want to work with the industry and take a holistic approach to technology
Microsoft 365 provides holistic security that is aligned to these four pillars of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 E5 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Protect users’ identities and control access to valuable resources based on user risk level
Information Protection
Ensure documents and emails are seen only by authorized people
Threat Protection
Protect against advanced threats and recover quickly when attacked
Security Management
Gain visibility and control over security tools
Protect your business with a universal identity platform
The Azure Active Directory (Azure AD) enterprise identity service provides single sign-on and multi-factor authentication to help protect your users from 99.9 percent of cybersecurity attacks.
Gartner named Microsoft a leader in Magic Quadrant 2020 for Access Management
Single sign-on simplifies access to your apps from anywhere
Conditional Access and multi-factor authentication help protect and govern access
A single identity platform lets you engage with internal and external users more securely
Developer tools make it easy to integrate identity into your apps and services
Connect your workforce
Whether people are on-site or remote, give them seamless access to all their apps so they can stay productive from anywhere. Automate workflows for user lifecycle and provisioning. Save time and resources with self-service management.
Choose from thousands of SaaS apps
Simplify single sign-on. Azure AD supports thousands of pre-integrated software as a service (SaaS) applications.
Protect and govern access
Safeguard user credentials by enforcing strong authentication and conditional access policies. Efficiently manage your identities by ensuring that the right people have the right access to the right resources.
Engage with your customers and partners
Secure and manage customers and partners beyond your organizational boundaries, with one identity solution. Customize user journeys and simplify authentication with social identity and more.
Integrate identity into your apps
Accelerate adoption of your application in the enterprise by supporting single sign-on and user provisioning. Reduce sign-in friction and automate the creation, removal, and maintenance of user accounts.
Azure Active Directory | Microsoft Azure Tutorial for Beginners | Azure 70-53...Edureka!
** Microsoft Azure Certification Training: https://www.edureka.co/microsoft-azure-training**
This Edureka "Azure Active Directory” tutorial will give you a thorough and insightful overview of Microsoft Azure Active Directory and help you understand other related terms like Tenants, Domain services etc. Following are the offerings of this tutorial:
1. What is Azure Active Directory?
2. Azure AD vs Windows AD
3. Azure AD Audience
4. Azure AD Editions
5. Azure AD Tenants
6. Demo-Creating and using Active Directory
Check out our Playlists: https://goo.gl/A1CJjM
Overview of Data Loss Prevention Policies in Office 365Dock 365
Presentation about identifying, monitoring, and automatically protect sensitive information across Office 365.
With a DLP Policy, you can:
- Identify sensitive information across many locations, such as SharePoint Online and OneDrive for Business.
- Prevent the accidental sharing of sensitive information.
- Monitor and protect sensitive information in the desktop versions of Excel 2016, PowerPoint 2016, and Word 2016.
- Help users learn how to stay compliant without interrupting their workflow.
- View DLP reports showing content that matches your organization's DLP policies.
Visit www.mydock365.com to learn more about SharePoint with Dock.
Office 365: Migrating Your Business to Office 365!Michael Frank
Moving your business to Office 365 may seem like a pretty daunting task but with a careful planning you could be up and running before you know it. In this deep dive we take you through the maze of planning to configuration and mail migration. Exploring simple, staged and hybrid solutions. Packed with tips, tricks and solutions that will ensure your adoption of Office 365 will be a smooth one. We will cover various scenarios, from a simple hosted email migration to the complexities of the Exchange hybrid.
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
Microsoft has given us some amazing capabilities with the Microsoft Enterprise Mobility + Security (EM+S) suite to help protect both our information and our investments in Office 365. This collection of features gives you just about everything you need in the Microsoft Cloud for security, compliance and Information Protection. With such a vast array of services, tools and features, its often challenging to understand everything this product provides or how its layered on top of existing Office 365 security controls. In this session we’ll review the capabilities available to you in Microsoft EM+S, and you'll discover which ones may best fit with your security and compliance needs. Come and join us, as we also dive deep into some of the most useful Microsoft EM+ S tools.
One of the major concerns for most organizations considering cloud services is security in the cloud. Are you looking to secure your cloud environment or services, no matter what they may be – data, operating system, domain or applications from intrusion and vulnerabilities? Azure Active Directory is Microsoft's multi-tenant, cloud-based directory, and identity management service helping secure your cloud and on-premise environments.
In this presentation, we discussed Azure Active Directory (Azure AD) Identity Protection, Conditional Access, Identity Management which uses AI and machine learning capabilities to help secure your cloud environment – Office 365 and Azure. In this session, we discussed
Advanced features of Azure AD
Demonstrate the detection capabilities, and real-time prevention
Microsoft Office 365 Advanced Threat Protection leverages our approach and our strengths to help customers be secure against advanced threats and recover quickly in the event they are attacked.
Protect their data
Detect compromised users
And gain the required visibility to respond to threats
Azure Active Directory (AD) is a directory as a service on Microsoft Azure. More than the cloud identity Azure AD provides a platform to build cloud applications with multi tenancy support. A flexible authentication systems which enables developers to leverage the cloud identity model and develop applications at ease. The session will walk you through on the basics of Azure AD and how to develop .NET applications using Azure AD.
Azure Role Based Access Control with an use case and explanation about various concepts like Global Administrators, Role Assignments, Account Administrators, Azure Roles, Custom Roles for both Azure AD and Azure Subscriptions
Platform + Intelligence + Partners
This new understanding has led us to build new solutions for our customers. It informs our entire approach across three critical elements:
Building a platform that looks holistically across all the critical end-points we talked about – building security into our platform as well as providing security tools and technologies to you
Acting on the Intelligence that comes from our security-related signals and insights – helps you and us to detect threats more quickly
Fostering a vibrant ecosystem of partners who help us raise the bar across the industry – we know we’re not your only security vendor, and we want to work with the industry and take a holistic approach to technology
Microsoft 365 provides holistic security that is aligned to these four pillars of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 E5 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Protect users’ identities and control access to valuable resources based on user risk level
Information Protection
Ensure documents and emails are seen only by authorized people
Threat Protection
Protect against advanced threats and recover quickly when attacked
Security Management
Gain visibility and control over security tools
Protect your business with a universal identity platform
The Azure Active Directory (Azure AD) enterprise identity service provides single sign-on and multi-factor authentication to help protect your users from 99.9 percent of cybersecurity attacks.
Gartner named Microsoft a leader in Magic Quadrant 2020 for Access Management
Single sign-on simplifies access to your apps from anywhere
Conditional Access and multi-factor authentication help protect and govern access
A single identity platform lets you engage with internal and external users more securely
Developer tools make it easy to integrate identity into your apps and services
Connect your workforce
Whether people are on-site or remote, give them seamless access to all their apps so they can stay productive from anywhere. Automate workflows for user lifecycle and provisioning. Save time and resources with self-service management.
Choose from thousands of SaaS apps
Simplify single sign-on. Azure AD supports thousands of pre-integrated software as a service (SaaS) applications.
Protect and govern access
Safeguard user credentials by enforcing strong authentication and conditional access policies. Efficiently manage your identities by ensuring that the right people have the right access to the right resources.
Engage with your customers and partners
Secure and manage customers and partners beyond your organizational boundaries, with one identity solution. Customize user journeys and simplify authentication with social identity and more.
Integrate identity into your apps
Accelerate adoption of your application in the enterprise by supporting single sign-on and user provisioning. Reduce sign-in friction and automate the creation, removal, and maintenance of user accounts.
Azure Active Directory | Microsoft Azure Tutorial for Beginners | Azure 70-53...Edureka!
** Microsoft Azure Certification Training: https://www.edureka.co/microsoft-azure-training**
This Edureka "Azure Active Directory” tutorial will give you a thorough and insightful overview of Microsoft Azure Active Directory and help you understand other related terms like Tenants, Domain services etc. Following are the offerings of this tutorial:
1. What is Azure Active Directory?
2. Azure AD vs Windows AD
3. Azure AD Audience
4. Azure AD Editions
5. Azure AD Tenants
6. Demo-Creating and using Active Directory
Check out our Playlists: https://goo.gl/A1CJjM
Overview of Data Loss Prevention Policies in Office 365Dock 365
Presentation about identifying, monitoring, and automatically protect sensitive information across Office 365.
With a DLP Policy, you can:
- Identify sensitive information across many locations, such as SharePoint Online and OneDrive for Business.
- Prevent the accidental sharing of sensitive information.
- Monitor and protect sensitive information in the desktop versions of Excel 2016, PowerPoint 2016, and Word 2016.
- Help users learn how to stay compliant without interrupting their workflow.
- View DLP reports showing content that matches your organization's DLP policies.
Visit www.mydock365.com to learn more about SharePoint with Dock.
Office 365: Migrating Your Business to Office 365!Michael Frank
Moving your business to Office 365 may seem like a pretty daunting task but with a careful planning you could be up and running before you know it. In this deep dive we take you through the maze of planning to configuration and mail migration. Exploring simple, staged and hybrid solutions. Packed with tips, tricks and solutions that will ensure your adoption of Office 365 will be a smooth one. We will cover various scenarios, from a simple hosted email migration to the complexities of the Exchange hybrid.
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
Microsoft has given us some amazing capabilities with the Microsoft Enterprise Mobility + Security (EM+S) suite to help protect both our information and our investments in Office 365. This collection of features gives you just about everything you need in the Microsoft Cloud for security, compliance and Information Protection. With such a vast array of services, tools and features, its often challenging to understand everything this product provides or how its layered on top of existing Office 365 security controls. In this session we’ll review the capabilities available to you in Microsoft EM+S, and you'll discover which ones may best fit with your security and compliance needs. Come and join us, as we also dive deep into some of the most useful Microsoft EM+ S tools.
One of the major concerns for most organizations considering cloud services is security in the cloud. Are you looking to secure your cloud environment or services, no matter what they may be – data, operating system, domain or applications from intrusion and vulnerabilities? Azure Active Directory is Microsoft's multi-tenant, cloud-based directory, and identity management service helping secure your cloud and on-premise environments.
In this presentation, we discussed Azure Active Directory (Azure AD) Identity Protection, Conditional Access, Identity Management which uses AI and machine learning capabilities to help secure your cloud environment – Office 365 and Azure. In this session, we discussed
Advanced features of Azure AD
Demonstrate the detection capabilities, and real-time prevention
Microsoft Office 365 Advanced Threat Protection leverages our approach and our strengths to help customers be secure against advanced threats and recover quickly in the event they are attacked.
Protect their data
Detect compromised users
And gain the required visibility to respond to threats
Azure Networking, Azure Storage, Enterprise Azure Active Directory, Daemon or Server application authentication workflow, Worker processes, Daemon, Daemon application to Web API, Azure Active Directory in old azure portal, ASM, Azure active directory and Mutl-tenant applications, Sharding, Federation, Shared singe, RBAC, Differences between AAD and AD DS, Azure AD Subscription models, Azure Domain Names, Manage Users, Groups,Co-Admin Role, Default Azure Active Directory, Adding access to another azure subscription. Contributor, Owner , Roles in Azure Subscriptions, Roles, MFA, Multi-Factor Authentication, How does MFA works, Scenarios for Azure MFA, Setting up MFA in Azure AD, Setting MFA, Azure Authenticator, Hybrid AD solutions, AD DS, Federated Trust, Domain Controller, AD, AAD Connecter, AD FS, AAD, Active Directory Password synchronization, Benefits of Active Directory, Active Directory Replication, vulnerabilities with multiple Domain Controller, Azure AD features, Synchronization with AD Connect, Write-back policies, Azure AD Health COnnect, Installing Azure AD COnnect Health,Integrating Azure AD and SaaS Applications, Benefits of using SaaS Solutions with your products, Benefits of SaaS Solutions, Azure Marketplace, DropBox Integrations with AAD, New Relic Integrations, New Relic, Dropbox, Azure AD Enterprise Application, VSTS integration for Automated Builds, Federation Overview, Claims, Single Sign On, Federated Trusts, Claim based authentications, Federated trusts, Claims Processing, Web Application Proxy, ADFS Proxy, ADFS 2.0 Proxy, How does ADFS proxy works for internal users, How does ADFS proxy works for internal users,Azure AD B2C Directory, B2C applications, Business 2 Customers application, 3rd Party Authentication, Bearer Token, OAuth, 3rd Party Identity Provider, OAuth server, Azure AD B2C Authentication & Authorization, Implementing Azure AD B2C Directory, Setting up Single Sign On with Facebook, Google, Microsoft. Linkedin, SignUP Policies, SignIN Policies, Email SignUp, SignUpSignIN PolicyID, Configuring Application with Azure Application ID,Modern Applications, Requirements for Modern Apps, API, Logic Applications, Mobile App, Web App, Function App, Go To Market, Microsoft Application Platform, App Service Plan, App Service Environment - Private Infrastructure, Why use App Service, App service Features & Capabilities, Azure App Service, Virtual Machine, Service Fabric & Cloud Services Comparison, Creating a Mobile App, Swagger UI, API Apps, API management, API APPS & API Management, Implementing API APP via Visual Studio,
Análisis de riesgos en Azure y protección de la informaciónPlain Concepts
Charla impartida en evento Protección y seguridad en entornos de Cloud Hibrida con Azure y O365 sobre Análisis de riesgos en Azure y protección de la información by Plain Concepts
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365Scott Hoag
Looking to reduce the number of post-it notes you see stuck around the office? Seeking to automate your user creation processes for Office 365? Or maybe you're interested in single sign-on for everything you host in the cloud? Are you questioning what a cloud identity is?
This session will take you through the basics of identity in the Microsoft Cloud and show you to how to set up and configure Office 365 with Azure Active Directory using the Azure Active Directory Synchronization Connect tools.
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?Scott Hoag
Office 365 brings a host of productivity options, but one of the most overlooked components is how we'll authenticate to The Cloud™. With Microsoft Azure Active Directory driving access and authentication to our Office 365 tenants, it is important to understand how we can interact with it. Join us as we explore Cloud Identity, identity federation, directory synchronisation, and most importantly Azure and its impacts on user experience and access Office 365. Throughout this session, we'll answer the questions that impact you and how your decisions around identity shape your Office 365 experience.
SYDSP - Office 365 and Cloud Identity - What does it mean for me?Scott Hoag
Office 365 brings a host of productivity options, but one of the most overlooked components is how we'll authenticate to The Cloud™. With Microsoft Azure Active Directory driving access and authentication to our Office 365 tenants, it is important to understand how we can interact with it. Join us as we explore Cloud Identity, identity federation, directory synchronisation, and most importantly Azure and its impacts on user experience and access Office 365. Throughout this session, we'll answer the questions that impact you and how your decisions around identity shape your Office 365 experience.
Overview of Azure AD
Deployment lessons from the real world
Outline items that can accelerate your deployment
Avoid things that can slow you down
Deep Dive on common technical challenges and how to overcome them
Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...Roy Kim
Azure Kubernetes Service (AKS) is a managed container orchestration service. With Kubernetes continuing to grow in popularity, many developers and IT engineers are curious to get started. Roy will demonstrate hosted microservices applications and the Istio service mesh. Along with how to manage your cluster with the Kubernetes Dashboard, Prometheus, Grafana and Azure Monitor. You will see a practical overview how all these pieces fit together.
www.roykim.ca
Twitter: @RoyKimYYZ
Github: https://github.com/RoyKimYYZ
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentRoy Kim
This is a presentation I held at a local Azure user group. The session abstract: Azure Key Vault is a tool for securely storing and accessing secrets. We will go through a popular Azure PaaS Architecture pattern using Key Vault to store a password. I will demo and walk through the general configuration of a dedicated Azure Function app, Azure SQL and Key Vault that was deployed with automation. I will then go through fairly advanced techniques and best practices on how to deploy Azure Key Vault and a password secret with ARM templates. Finally, a very brief look at my Azure DevOps Pipeline to deploy the ARM template. You will come away with an understanding of an applied use case of leveraging Azure Key vault for a PaaS solution in better managing a password secret.
Azure App Gateway and Log Analytics under Penetration TestsRoy Kim
An end to end configuration of Azure App Gateway in front of Azure App Service with Log Analytics monitoring. You will see a demo of a simple penetration test and how you can monitor and alert with Log Analytics to detect common web attacks such as SQL injection and cross site scripting with the Gateway’s Web Application Firewall. You will walk away with an understanding of how Azure App Gateway and Log Analytics is applied as a security solution.
Applying Advanced Techniques to Azure Web AppsRoy Kim
A lap around 4 advanced techniques or services to complement an Azure Web App solution.
Application Gateway with Web Application Firewall
Azure SQL VNet Integration with (ASE v2)
Azure CDN
Auto Scale & Visual Studio Load Testing
A walk through of how Microsoft Azure could platform can be a powerful tool for solution designing, proof of concepts and performance testing. Leverage Azure capabilities and technologies in early development phases in dev/test scenarios without heavy dependence of IT support. Azure can be a DIY model for quick prototyping and gaining visibility into material solution design and architectures.
SharePoint 2013 Hosted App Presentation by Roy KimRoy Kim
Sharing my experience and knowledge of developing a SharePoint Hosted App during late 2012. This app is a photo slider with a Picture Library and a custom list to hold default settings. Subjects include, REST API, JavaScript Object Model, Client Web Part, App Web, Cross Domain Call to the host web and other developer insights.
SharePoint Saturday 2010 - SharePoint 2010 Content Organizer FeatureRoy Kim
SharePoint Saturday Speaker presentation on the SharePoint 2010 Content Organizer Feature. Explain the business values especially around enterprise sites. Also explain
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
1. Azure AD Login Scenarios
with SharePoint 2013/2016
Azure AD, Azure Application Proxy,
AD Connect,
AAD Non-Gallery AppMay 16, 2017
Roy Kim
@RoyKimYYZ
www.roykim.ca
2. Roy Kim
Independent Consultant
15+ years work experience in consulting for enterprise
applications involving SharePoint, Azure, Office 365 and
.NET development
Microsoft MVP
University of Toronto – Computer Science graduate
rkim@roykim.ca
Twitter: @roykimYYZ
Blog: roykim.ca
Slideshare: www.slideshare.netroykimtoronto
About Me
3. Azure AD Overview
Publishing with Azure Application Proxy and Azure AD Connect
Azure AD with Auth0 SSO Broker
Azure AD with Extranet User Manager
Publishing SP with Azure AD Non-Gallery App with SAML Claims
Azure AD Features
Q&A
Agenda
4. Use cases
External Access
Azure AD App Proxy
3rd Party SSO Brokers
Single Sign On
Conditional Access
Sign In and Audit Logs
Identity and Access Management to Applications
5. Client
•Desktop, Native
Mobile
•Browser Web Apps
•Server, Console apps
Identity
•Corporate AD/LDAP
•Application
username/password
•Internet social
accounts
Sign In &
Authentication
Protocol
•Windows / Kerberos
•OpenID Connect,
OAuth
•SAML, WS-Fed
•Certificate /
Password-less
•and more
Web Application
•Claims Aware
•Standard / Non
claims aware
Authentication Stack
Some of the pieces of an authentication stack
.. can get complex ..
7. Azure AD
Azure AD
Multi-tenant
Platform as a Service
Identity management service. Azure AD combines core directory services,
advanced identity governance,
Application access management
Azure AD B2B
A feature of Azure AD. That is to add a 'guest' user type
In simplified terms, any active email address that is either ‘wrapped’ by a
Microsoft Account or is any Azure AD account
Azure AD B2C
Authenticate with:
Social Accounts (such as Facebook, Google, LinkedIn, and more)
Enterprise Accounts (using open standard protocols, OpenID Connect or SAML)
Local Accounts (email address and password, or username and password)
Azure AD and Azure AD B2C are separate product offerings and cannot
coexist in the same tenant.
A tenant represents a collection of identities to be used with relying party
applications.
7
9. Properties of an AAD B2B collaboration user
9
https://docs.microsoft.com/en-us/azure/active-directory/active-directory-b2b-user-properties
i.e. AAD Account
Non-typical cases
11. Evaluating 4 Architecture Patterns
Let’s evaluate three architectural patterns with some demos!
11
Azure AD Application
Proxy with Windows
Authentication
Azure AD + 3rd Party
Auth0 Single Sign On
cloud broker
claims based
authentication
3rd Party Extranet User
Manager as the Identity
Provider
claims based
authentication
Azure AD Enterprise Non-
Gallery Application
SAML claims based
authentication
12. 12
AZURE APPLICATION PROXY
Azure Application Proxy
Remote Access
Single Sign-on experience
Windows Integrated Authentication / Kerberos
Constrained Delegation
Install App Proxy connector in internal network
AD Connect
Sync on-prem AD accounts to Azure AD tenant.
Note: Not the other way around.
Install AD Connect in internal network
13. 13
AZURE APPLICATION PROXY + AAD CONNECT
On-Premises Network OR
Azure IaaS Virtual Network
Azure AD Connect
Azure
Active Directory
Azure Application
Proxy Connector
Work account
Microsoft account
AAD Users
Synced AD Users
Guest Users *
Azure PaaS Services
AD Users
MS Access Panel
myapps.microsoft.com
Enterprise Applications
Microsoft Account
Azure AD
Tenant
SP DB
Sync
Outbound
443
Internet
User
My SharePoint App
Azure
Active Directory
Partner Azure
AD Tenant
access
invite
invite
https://roykimspublishedsharepoint-
spb2b.msappproxy.net/
* Guest users wouldn’t be able to access the on-premises application
14. 14
AZURE APPLICATION PROXY DEMO
User Authentication Scenarios
Access points
Application sign in Url
MS Access Panel – https://myapps.microsoft.com
Employees login with their corporate credentials.
No OOTB automatic external user sign-up (AD B2B).
Need to create starting from on-premises AD. But not IT support friendly.
Note: There used to be user write back from Azure AD to on-premises
AD.
External user sign in (AD B2B)
Self Service Password Reset for employee accounts
IT/Application Admin responsibility
Add new external user (AD B2B guest user)
15. 15
AZURE APPLICATION PROXY SUMMARY
Pros
Easily publish on-premises application without added ADFS and
Web Application Proxy
Cons
Adding Azure AD guest users requires on-prem AD account added
with same domain.
There used to be user write-back in AAD Connect
Good fit for organizations that just want to easily publish on-premises
Applications with limited Azure AD B2B requirements.
16. 16
AUTH0 SSO BROKER
Auth0
Authenticate and authorize apps and APIs with any
identity provider running on any stack on any device or
cloud
Platform as a Service
Single Sign On Broker
No need for ADFS.
Require application public end point to support ‘Reply
Url’ where the application expects to receive the SAML
token.
Alternatives: OneLogin, Okta, Ping Identity, AWS Cognito,
EUM
Gartner’s IAM Magic Quadrant 2017
17. 17
AUTH0 SSO BROKER
On-Premises Network OR
Azure IaaS Virtual Network
Enterprise Connection
- Azure AD tenant
Azure PaaS Services
Users
Auth0 (3rd Party PaaS)
Auth0
Claims
Provider
Client
- SharePoint App
Registration
- Auth0 Login Page
SSO Integration
- SharePoint
SP DB
Azure
Active Directory
Work account
Microsoft account
AAD Users
Synced AD Users
Guest Users
MS Access Panel
myapps.microsoft.com
Azure
Active Directory
Partner Azure
AD Tenant
Microsoft Account
Azure AD
Tenant
‘SPB2C’
Enterprise Applications
Published SharePoint App
DMZ
1 Direct access
2 Redirect
direct internet access
18. 18
AUTH0 SSO BROKER
Pros
Single Sign On
Role based access with role claim
Support SAML 1.1 to work SharePoint Server. Also supports
SAML 2.0, Open ID, Oauth, etc.
No need for WAP and ADFS
Cons
Added licensing cost
May lose its competitive value if Azure AD grows in its
capabilities
19. 19
EXTRANET USER MANAGER
Extranet User Manager
https://www.extranetusermanager.com
Delegated external user management
Self-registration
Local SQL accounts or federation with Microsoft Azure AD, Microsoft
accounts, Facebook, and Google
Password management and Multi-Factor Authentication
Azure App Service or on premise IIS hosting
20. 20
EXTRANET USER MANAGER
On-Premises Network OR
Azure IaaS Virtual Network
Enterprise Connection
- Azure AD tenant
Azure PaaS Services
Users
EUM (3rd Party PaaS)
EUM Trusted
Identity
Provider
Client
- SharePoint App
Registration
- EUM Login Page
SSO Integration
- SharePoint
SP DB
Azure
Active Directory
Work account
Microsoft account
AAD Users
Synced AD Users
Guest Users
MS Access Panel
myapps.microsoft.com
Azure
Active Directory
Partner Azure
AD Tenant
Microsoft Account
Azure AD
Tenant
‘SPB2C’
Enterprise Applications
Published SharePoint App
DMZ
1 Direct access
2 Redirect
direct internet access;
Or ideally via any
proxy
21. 21
EXTRANET USER MANAGER
Pros
Single Sign On
Role based access with role claim
Support SAML 1.1 to work SharePoint Server. Also supports Open ID
Connect
No need for WAP and ADFS
Cons
Added licensing cost
22. 22
AZURE AD NON-GALLERY APP WITH SAML 1.1 TOKEN
Configure single sign-on with on-premises applications
As an Azure AD App that is not part of the gallery
No need to write code.
Generates a certificate for the app to establish trust with
AAD
Require Azure AD Premium license
No need for WAP and ADFS
References:
Using Azure AD for SharePoint Server Authentication
Azure Active Directory claims provider for SharePoint 2013 and 2016
View project on GitHub
Understanding WS-Federation
23. 23
AZURE AD NON-GALLERY APP (ALTERNATE DESIGN)
On-Premises Network; OR
Azure IaaS Virtual Network
Azure PaaS Services
Users
Web Application:
Azure AD Trusted
Identityy Provider
SP DB
Azure
Active Directory
Work account
Microsoft account
AAD Users
Synced AD Users
Guest Users
sts
MS Access Panel
myapps.microsoft.com
Enterprise Application
SP App (non-gallery)
- SAML 1.1 token issuance policy
Azure
Active Directory
Partner Azure
AD Tenant
Microsoft Account
Azure AD
Tenant
direct internet access;
Or ideally via any
proxy
24. 24
AZURE AD NON-GALLERY APP
Pros
Single Sign On
The ability to grant permissions to users or in a group; there
by, access a role claim
No need for ADFS and Web App Proxy
Cons
Added configuration for SAML based authentication with
SAML 1.1 token support with a PowerShell script.
25. 25
AZURE AD NON-GALLERY APP (ALTERNATE DESIGN)
On-Premises Network; OR
Azure IaaS Virtual Network
Azure PaaS Services
Users
Claims
Provider
SP DB
ADFS
Azure
Active Directory
Work account
Microsoft account
AAD Users
Synced AD Users
Guest Users
sts
MS Access Panel
myapps.microsoft.com
Enterprise Application
SP App (non-gallery)
Azure
Active Directory
Partner Azure
AD Tenant
Microsoft Account
Azure AD
Tenant
Web App
Proxy
Will not work since
requires SAML 1.1
token *
* Should be able to federate and trust Azure AD with SAML 1.1 token issuance policy
* I need to test
Advantage: Able to protect SharePoint app within corporate fire wall and
publish with Azure App Proxy
Azure Application
Proxy Connector
26. To provide secure sign-in and authorization for their services.
Any application that wants to use the capabilities of Azure AD must first be
registered in an Azure AD tenant
Azure AD Applications
27. Portal of all Azure AD Applications including Office 365
- Per AD Directory
Access Panel Applications
28. Portal of all Azure AD Applications including Office 365
Per AD Directory
Azure AD APP Self Service
29. AZURE AD - CONDITIONAL ACCESS
Policy: For Azure AD App ‘SP SAML’, require MFA
if guest user, outside of trusted IP locations, device is iOS or windows,
client app is browser or native app