Computing at the Edge with AWS Greengrass and Amazon FreeRTOS, ft. Enel (IOT2...Amazon Web Services
Edge computing is all about moving compute power to the source of the data instead of having to bring it to the cloud. The edge is a fundamental part of IoT, and it is not only about connecting things to the internet. In this sesssion, we discuss how AWS Greengrass, which is an IoT edge software, can power devices small and large, from a sensor all the way to a wind turbine. With AWS Greengrass, these IoT devices can securely gather data, keep device data in sync, and communicate with each other while still using the cloud for management, analytics, and durable storage. Join us to learn more about the edge of IoT.
YouTube Link: https://youtu.be/0djPrlaxx_U
Edureka AWS Architect Certification Training - https://www.edureka.co/aws-certification-training
This Edureka PPT on AWS Cloud Practitioner will provide a complete guide to your AWS Cloud Practitioner Certification exam. It will explain the exam details, objectives, why you should get certified and also how AWS certification will help your career.
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
AWS provides a range of security services and features that AWS customers can use to secure their content and applications and meet their own specific business requirements for security. This presentation focuses on how you can make use of AWS security features to meet your own organisation's security and compliance objectives.
Deploy a DoD Secure Cloud Computing Architecture Environment in AWSAmazon Web Services
The Department of Defense's Secure Cloud Computing Architecture (SCCA) guidance provides DoD mission owners the security requirements for building a DoD compliant and secure application environment in the cloud. This session will review the DoD Cloud Security Requirements Guide and the DoD SCCA pillars and how they apply to AWS services. We will demonstrate how to build a DoD SCCA environment through automation and configuration management tools as well as discuss how to document security controls implementations. We will answer common questions, such as: how do we connect to a DoD Cloud Access Point? How do we implement a least privilege access control model? And how do we automate security event notifications and remediate issues? This session is designed for both technical and information assurance professionals that want to understand the process to move DoD systems into AWS, secure them, and get them accredited.
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Computing at the Edge with AWS Greengrass and Amazon FreeRTOS, ft. Enel (IOT2...Amazon Web Services
Edge computing is all about moving compute power to the source of the data instead of having to bring it to the cloud. The edge is a fundamental part of IoT, and it is not only about connecting things to the internet. In this sesssion, we discuss how AWS Greengrass, which is an IoT edge software, can power devices small and large, from a sensor all the way to a wind turbine. With AWS Greengrass, these IoT devices can securely gather data, keep device data in sync, and communicate with each other while still using the cloud for management, analytics, and durable storage. Join us to learn more about the edge of IoT.
YouTube Link: https://youtu.be/0djPrlaxx_U
Edureka AWS Architect Certification Training - https://www.edureka.co/aws-certification-training
This Edureka PPT on AWS Cloud Practitioner will provide a complete guide to your AWS Cloud Practitioner Certification exam. It will explain the exam details, objectives, why you should get certified and also how AWS certification will help your career.
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
AWS provides a range of security services and features that AWS customers can use to secure their content and applications and meet their own specific business requirements for security. This presentation focuses on how you can make use of AWS security features to meet your own organisation's security and compliance objectives.
Deploy a DoD Secure Cloud Computing Architecture Environment in AWSAmazon Web Services
The Department of Defense's Secure Cloud Computing Architecture (SCCA) guidance provides DoD mission owners the security requirements for building a DoD compliant and secure application environment in the cloud. This session will review the DoD Cloud Security Requirements Guide and the DoD SCCA pillars and how they apply to AWS services. We will demonstrate how to build a DoD SCCA environment through automation and configuration management tools as well as discuss how to document security controls implementations. We will answer common questions, such as: how do we connect to a DoD Cloud Access Point? How do we implement a least privilege access control model? And how do we automate security event notifications and remediate issues? This session is designed for both technical and information assurance professionals that want to understand the process to move DoD systems into AWS, secure them, and get them accredited.
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
AWS offers a variety of tools enabling users to create highly scalable, durable and resilient architectures and the user community has developed a broad range of best practices and frameworks to build rock-solid systems on top of AWS. Many customers such as Netflix, Airbnb, Smugmug and others, already demonstrated those practices in production systems. While the theoretical concepts of building resilient architectures are well established, the practices of maintaining such systems are less understood, mostly because of the unpredictability of production environments under stress conditions. To address this issue, many adopted the concept of Game Days, which consists of simulating unexpected failures to test the resilience, detect and fix flaws, and more importantly train the operation teams on emergency situations. This session covers the best practices learned from many AWS customers who implemented the Game Days practice and the different failure simulation techniques that can be used on AWS.
When migrating applications to the AWS Cloud, it’s important to architect cloud environments that are efficient, secure, and compliant. Companies depend on critical enterprise applications to run their business. In this session, learn about the compute, storage, and networking services that AWS offers to help you build, run, and scale your business-critical applications more quickly, securely, and cost-efficiently. We also cover the AWS services and partners that are available to help you modernize and migrate your business-critical applications to the cloud.
Securely access services hosted on AWS using AWS PrivateLink. Come to this session and learn the fundamentals of AWS PrivateLink, including VPC design, VPC endpoint, Network Load Balancer, and more. Discover the benefits and use cases for connecting your VPC with AWS-based services over AWS PrivateLink, and hear about the technologies that are related to AWS PrivateLink, such as AWS Direct Connect, Amazon Route 53, and other AWS services. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision makers interested in understanding how to connect their Amazon VPCs to SaaS services in a secure and scalable manner.
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...Amazon Web Services
Many enterprises use Active Directory for authentication, server and workstation management, group policy management, and more. It’s also one of the first applications to be deployed on AWS by those building or migrating Windows applications at scale. There are two primary models for running Active Directory on AWS: AWS Managed Microsoft AD and self-managed Active Directory on Amazon EC2. We discuss best practices for securing Active Directory deployment on AWS and the shared responsibility model for running AWS Managed Microsoft AD. We also examine a reference architecture that follows these best practices. Services include AWS Managed Microsoft AD, Amazon EC2, Amazon EBS, Amazon VPC, and AWS KMS.
This presentation walks through the Security and Compliance functionality to customers leveraging Azure as a compute environment. It includes deep-dive references to detailed information on each topic presented.
한국의 클라우드 정책은 국가 기업, 공공기관 및 개인 사용자를 위해 미래지향적이고 효율적인 클라우드 서비스 제공을 목적으로, 최근에는 국가 레벨에서 클라우드 전략을 강화하고 있으며, 국내 클라우드 산업의 발전과 제품의 경쟁력 향상을 위한 정책이 제시되고 있습니다.
클라우드 정책의 어제와 오늘을 살펴보고, 소프트웨어산업협회, 법무법인 율촌, 행정 학회 등의 산학연 전문가와 함께 클라우드 정책의 나아갈 방향에 대해 토론합니다.
Microsoft certification exams are an all-time favorite and most coveted certification Microsoft Azure Fundamentals exams of the modern IT world. Now pass your desirable AZ-900 exam with the help of Braindumps4IT exam dumps. We offer superlative AZ-900 Exam dumps in the form of PDF file and AZ-900 Azure Fundamentals Exam Engine formats. All AZ-900 Exam Questions are newest and approved by professional experts to guarantee your success. Just visit the website to get the complete package: https://www.braindumps4it.com/braindumps-AZ-900.html
Get comprehensive protection across all your platforms and clouds
Protect your organization from threats across devices, identities, apps, data and clouds. Get unmatched visibility into your multiplatform environment that unifies Security Information and Event Management (SIEM) and Extended Detection and Response (XDR). Simplify your security stack with Azure Sentinel and Microsoft Defender.
AWS Transit Gateway를 통한 Multi-VPC 아키텍처 패턴 - 강동환 솔루션즈 아키텍트, AWS :: AWS Summit ...Amazon Web Services Korea
AWS Transit Gateway를 통한 Multi-VPC 아키텍처 패턴
강동환 솔루션즈 아키텍트, AWS
고객의 조직, 서비스 구조에 따라 함께 늘어나는 VPC를 효과적으로 통합, 관리, 운영하기 위한 서비스와 아키텍처 패턴을 소개합니다. Peering의 한계를 넘어 VPC간 자유로운 연동을 제공하는 Transit Gateway(TGW), 조직내 다양한 Account간의 VPC 공유를 위한 Multi-Account VPC(MAVPC), 그리고 AWS 자원의 안전한 공유를 제공하기 위한 Resource Access Manager(RAM)를 활용하는 다양한 아키텍처 패턴을 살펴봅니다.
An Introduction to the AWS Well Architected Framework - WebinarAmazon Web Services
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, cost optimization and operational excellence when building systems on AWS. This approach helps customers make informed decisions and weigh the pros and cons of application design patterns for the cloud.
In this one hour webinar, you'll learn how to use the AWS Well-Architected Framework to follow guidelines and best practices for your architecture on AWS.
Microsoft Cloud's Front Door: Building a Global APIC4Media
Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/25GPsXo.
Charles Lamanna talks about the scale and architecture of Microsoft’s Azure Management Gateway. Lamanna presents how Azure API’s are built for high availability and for data sovereignty from a key Microsoft Azure Architectural resource. Filmed at qconlondon.com.
Charles Lamanna is a Principal Group Development Manager in the Microsoft Azure team. Lamanna joined Microsoft in 2013 when Microsoft acquired MetricsHub, a company he cofounded. His team works on the Azure API front door, monitoring and auto-scaling capabilities, template deployments, resource groups and other management capabilities.
An overview of cloud security
- Quick Context of Security in the cloud
- General Best Practices
- Networking Services
- Security and Identity Services
- Management Tools
This session is designed to introduce you to fundamental cloud computing and AWS security concepts that will help you prepare for the Security Week sessions, demos, and labs. We will ensure you have an AWS account and understand EC2, prepare you to get set up on the AWS Command Line Interface (CLI) to access the AWS Management Console, introduce you to in source repositories, discuss SSH access and necessary SDKs, and more.
Secure your Azure and DevOps in a smart wayEficode
Victoria Almazova, Cloud Security Architect, Microsoft
Azure provides a set of security and governance controls to ensure that your environment is secure and complaint. Learn how to implement security on the subscription level, develop your applications securely, securely deploy, periodically scan production for compliance and security, and get a single security dashboard.
Azure Active Directory (AD) is a directory as a service on Microsoft Azure. More than the cloud identity Azure AD provides a platform to build cloud applications with multi tenancy support. A flexible authentication systems which enables developers to leverage the cloud identity model and develop applications at ease. The session will walk you through on the basics of Azure AD and how to develop .NET applications using Azure AD.
Identity and Access (AD), Azure and Office 365: Building a Single Page Application (SPA) with ASP.NET Web API and Angular.js using Azure Active Directory to Log in Users
AWS offers a variety of tools enabling users to create highly scalable, durable and resilient architectures and the user community has developed a broad range of best practices and frameworks to build rock-solid systems on top of AWS. Many customers such as Netflix, Airbnb, Smugmug and others, already demonstrated those practices in production systems. While the theoretical concepts of building resilient architectures are well established, the practices of maintaining such systems are less understood, mostly because of the unpredictability of production environments under stress conditions. To address this issue, many adopted the concept of Game Days, which consists of simulating unexpected failures to test the resilience, detect and fix flaws, and more importantly train the operation teams on emergency situations. This session covers the best practices learned from many AWS customers who implemented the Game Days practice and the different failure simulation techniques that can be used on AWS.
When migrating applications to the AWS Cloud, it’s important to architect cloud environments that are efficient, secure, and compliant. Companies depend on critical enterprise applications to run their business. In this session, learn about the compute, storage, and networking services that AWS offers to help you build, run, and scale your business-critical applications more quickly, securely, and cost-efficiently. We also cover the AWS services and partners that are available to help you modernize and migrate your business-critical applications to the cloud.
Securely access services hosted on AWS using AWS PrivateLink. Come to this session and learn the fundamentals of AWS PrivateLink, including VPC design, VPC endpoint, Network Load Balancer, and more. Discover the benefits and use cases for connecting your VPC with AWS-based services over AWS PrivateLink, and hear about the technologies that are related to AWS PrivateLink, such as AWS Direct Connect, Amazon Route 53, and other AWS services. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision makers interested in understanding how to connect their Amazon VPCs to SaaS services in a secure and scalable manner.
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...Amazon Web Services
Many enterprises use Active Directory for authentication, server and workstation management, group policy management, and more. It’s also one of the first applications to be deployed on AWS by those building or migrating Windows applications at scale. There are two primary models for running Active Directory on AWS: AWS Managed Microsoft AD and self-managed Active Directory on Amazon EC2. We discuss best practices for securing Active Directory deployment on AWS and the shared responsibility model for running AWS Managed Microsoft AD. We also examine a reference architecture that follows these best practices. Services include AWS Managed Microsoft AD, Amazon EC2, Amazon EBS, Amazon VPC, and AWS KMS.
This presentation walks through the Security and Compliance functionality to customers leveraging Azure as a compute environment. It includes deep-dive references to detailed information on each topic presented.
한국의 클라우드 정책은 국가 기업, 공공기관 및 개인 사용자를 위해 미래지향적이고 효율적인 클라우드 서비스 제공을 목적으로, 최근에는 국가 레벨에서 클라우드 전략을 강화하고 있으며, 국내 클라우드 산업의 발전과 제품의 경쟁력 향상을 위한 정책이 제시되고 있습니다.
클라우드 정책의 어제와 오늘을 살펴보고, 소프트웨어산업협회, 법무법인 율촌, 행정 학회 등의 산학연 전문가와 함께 클라우드 정책의 나아갈 방향에 대해 토론합니다.
Microsoft certification exams are an all-time favorite and most coveted certification Microsoft Azure Fundamentals exams of the modern IT world. Now pass your desirable AZ-900 exam with the help of Braindumps4IT exam dumps. We offer superlative AZ-900 Exam dumps in the form of PDF file and AZ-900 Azure Fundamentals Exam Engine formats. All AZ-900 Exam Questions are newest and approved by professional experts to guarantee your success. Just visit the website to get the complete package: https://www.braindumps4it.com/braindumps-AZ-900.html
Get comprehensive protection across all your platforms and clouds
Protect your organization from threats across devices, identities, apps, data and clouds. Get unmatched visibility into your multiplatform environment that unifies Security Information and Event Management (SIEM) and Extended Detection and Response (XDR). Simplify your security stack with Azure Sentinel and Microsoft Defender.
AWS Transit Gateway를 통한 Multi-VPC 아키텍처 패턴 - 강동환 솔루션즈 아키텍트, AWS :: AWS Summit ...Amazon Web Services Korea
AWS Transit Gateway를 통한 Multi-VPC 아키텍처 패턴
강동환 솔루션즈 아키텍트, AWS
고객의 조직, 서비스 구조에 따라 함께 늘어나는 VPC를 효과적으로 통합, 관리, 운영하기 위한 서비스와 아키텍처 패턴을 소개합니다. Peering의 한계를 넘어 VPC간 자유로운 연동을 제공하는 Transit Gateway(TGW), 조직내 다양한 Account간의 VPC 공유를 위한 Multi-Account VPC(MAVPC), 그리고 AWS 자원의 안전한 공유를 제공하기 위한 Resource Access Manager(RAM)를 활용하는 다양한 아키텍처 패턴을 살펴봅니다.
An Introduction to the AWS Well Architected Framework - WebinarAmazon Web Services
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, cost optimization and operational excellence when building systems on AWS. This approach helps customers make informed decisions and weigh the pros and cons of application design patterns for the cloud.
In this one hour webinar, you'll learn how to use the AWS Well-Architected Framework to follow guidelines and best practices for your architecture on AWS.
Microsoft Cloud's Front Door: Building a Global APIC4Media
Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/25GPsXo.
Charles Lamanna talks about the scale and architecture of Microsoft’s Azure Management Gateway. Lamanna presents how Azure API’s are built for high availability and for data sovereignty from a key Microsoft Azure Architectural resource. Filmed at qconlondon.com.
Charles Lamanna is a Principal Group Development Manager in the Microsoft Azure team. Lamanna joined Microsoft in 2013 when Microsoft acquired MetricsHub, a company he cofounded. His team works on the Azure API front door, monitoring and auto-scaling capabilities, template deployments, resource groups and other management capabilities.
An overview of cloud security
- Quick Context of Security in the cloud
- General Best Practices
- Networking Services
- Security and Identity Services
- Management Tools
This session is designed to introduce you to fundamental cloud computing and AWS security concepts that will help you prepare for the Security Week sessions, demos, and labs. We will ensure you have an AWS account and understand EC2, prepare you to get set up on the AWS Command Line Interface (CLI) to access the AWS Management Console, introduce you to in source repositories, discuss SSH access and necessary SDKs, and more.
Secure your Azure and DevOps in a smart wayEficode
Victoria Almazova, Cloud Security Architect, Microsoft
Azure provides a set of security and governance controls to ensure that your environment is secure and complaint. Learn how to implement security on the subscription level, develop your applications securely, securely deploy, periodically scan production for compliance and security, and get a single security dashboard.
Azure Active Directory (AD) is a directory as a service on Microsoft Azure. More than the cloud identity Azure AD provides a platform to build cloud applications with multi tenancy support. A flexible authentication systems which enables developers to leverage the cloud identity model and develop applications at ease. The session will walk you through on the basics of Azure AD and how to develop .NET applications using Azure AD.
Identity and Access (AD), Azure and Office 365: Building a Single Page Application (SPA) with ASP.NET Web API and Angular.js using Azure Active Directory to Log in Users
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...Michael Collier
Identity management for cloud deployed applications can be a challenge. Often users will want to leverage an existing social network or corporate identity. Now we have to worry about dealing with multiple APIs, any updates to those APIs, or the addition of new identity providers. Windows Azure Access Control Services offers a better way! ACS allows for federated user authentication via popular social networks and Active Directory. In this session we’ll provide a crash course in claims as they relate to identity management. We’ll discuss why claims are important and how to add additional claims beyond what is provided by the identity providers. We'll also take a look at Windows Azure Active Directory and see how to manage corporate identities in the cloud.
** note that a recording of this presentation is available at https://www.youtube.com/watch?v=UBNOJ_G7EZc **
Mobile Single Sign-On: are we there yet?
-- Brian Campbell, Ping Identity --
-- at the 2015 Cloud Identity Summit --
Mobile computing has grown at an unprecedented rate in recent years while innovations in identity and Single Sign-On on mobile have lagged behind. We'll look at the state of native mobile application SSO including applicable standards such as OAuth 2.0, OpenID Connect, and NAAPS, and try to better understand the bigger picture of what's happening and what might be done to improve things.
Information security in office 365 a shared responsibility - antonio maioAntonioMaio2
There is no denying that Office 365 can make us highly productive, sharing and collaborating with coworkers, partners and clients. But, does it take care of our security and compliance issues? Is our data secure in Office 365? Yes, and no. The security of our information in Office 365 is a shared responsibility between Microsoft (the cloud provider) and us (the customers). Office 365 is a secure platform, but to truly secure our data we must make effective use of the security capabilities and features provided within the platform. We must also have strong information governance structures in place to control how information is shared and accessed through the platform. This session will provide a detailed review of the Office 365 Security and Compliance Center, including how to use the built in capabilities for alerts, data loss prevention policies, activity audit logs, advanced security management and customer lockbox. We'll also review recommended information governance and security practices based on customer experiences to help you effectively secure your information in Office 365 and uphold your end of the shared responsibility.
[Michael Noel] Microsoft has expended significant effort in the creation of an all-encompassing tool that provides organizations with the ability to quickly and easily synchronize information from on-premises Active Directory to Azure Active Directory instances such as those running as part of Office 365. This tool, named Azure AD Connect, has robust bidirectional synchronization options as well as the built-in ability to provide for Single Sign On (SSO) with Active Directory Federation Services. While simple to deploy, management and maintenance of the tool requires a thorough understanding of the core components utilized by the tool. This session takes an in-depth technical look at the various components of Azure AD Connect, walking the audience through various deployment scenarios, the upgrade approach used by the tool, SSO with ADFS, and how to maintain and manage the various running components.
• Understand key deployment scenarios with Azure AD Connect, including password and directory synchronization, Single Sign-On, and self-service password reset as part of Azure AD Premium.
• Explore the various synchronization components of Azure AD Connect and how to use and manage them to transfer directory info from on-premises Active Directory to Azure AD
• Examine the requirements to implement Single Sign On to Azure AD/Office 365 using the built-in Azure AD Connect AD FS components
Intelligent Cloud Conference 2018 - Next Generation of Data Integration with ...Tom Kerkhove
Azure Data Factory is a hybrid data integration service in Azure that allows you to create, manage & operate data pipelines in Azure. It is a serverless orchestrator that allows you to create data pipelines to either move, transform, load data; a fully managed Extract, Transform, Load (ETL) & Extract, Load, Transform (ELT) service if you will.
In this talk I'll cover the basics of Azure Data Factory and show you how you can create, manage & operate data pipelines.
CoLabora - Identity in a World of Cloud - June 2015CoLaboraDK
CoLabora UC User Group Meeting - June 2015.
Topic about: Identity in a World of Cloud - June 2015
Speaker: Jakob Østergaard Nielsen (www.mistercloudtech.com)
This webinar session introduced the basics of Azure (topics below) allowing you to get online and start working in the Azure environment.
• Azure Portal Demo
• Azure VMs
• Azure Storage
• Azure SQL
• Azure Connectivity options to the Data Center
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...Peter Selch Dahl
Improve security posture by implementing new Azure AD Security features for better protection for M365 and Azure.
Azure AD Enterprise Application
Azure AD Application Registration
https://www.meetup.com/CoLabora/events/284462324/
EWUG - Something about the Cloud - Unit IT - January 14, 2020Peter Selch Dahl
Azure AD Refresh of new features and options released during Ignite and afterward. A look into new future features to enforce governance upon cloud applications and service principals
Customer story - NAC - The journey from Microsoft hybrid cloud to Microsoft n...Peter Selch Dahl
How Nordic Aviation Capital A/S made the transition from a hybrid cloud infrastructure (IaaS) to a pure/native cloud (PaaS/SaaS). As one of the first companies to adopt both Microsoft Office 365 and Microsoft Azure in Denmark. We will talk about the bold vision to GO ALL Cloud, the impact on the business and IT department, challenges along the journey, touch a bit on Capex vs. Opex (Cost) and explain which approaches and technologies that was implemented to support the business.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
4. Self-service Single
sign on
•••••••••••
Username
Identity as the control plane
Simple
connection
Cloud
SaaS
Azure
Office 365Public
cloud
Other
Directories
Windows Server
Active Directory
On-premises Microsoft Azure Active Directory
9. Why Pass-Through Auth and SSO?
- The Goal of PTA/Seamless SSO!
• Help new customers with the following requirements onboard faster
• AuthN against AD on-prem
• No passwords in the cloud
• Do not want unauthenticated endpoints on-prem exposed to internet
• Provide an SSO solution
• Help existing customers with above requirements, switch to a lower
TCO option
JANUARY 26, 2017
@EWUGDK
9
10. Azure AD Pass-through Authentication
• Enables customers to validate password on-premises without the complexity
of AD FS
• Allows for on-premises policies to be evaluated such as account disabled, login
hours restrictions etc.
• Simple deployment via AAD Connect, no complex DMZ requirements
• Works for single or multi-forest customers
• Built on AAD Application Proxy infrastructure
• Securely validates the user’s password against on-premises AD
• Customer can deploy multiple agents for HA
• Bottom line – Similar benefits to federation without the deployment cost
JANUARY 26, 2017
@EWUGDK
10
11. Azure AD Pass-through Authentication
• True single sign on without the cost of AD FS
• No additional servers or infrastructure required on premises
• Accelerated deployment
• Utilizes existing AD infrastructure
• Inherit support for multiple regions
• Inherit support for finding the closest DC
• Based on Kerberos
• No DR plan outside of existing AD plans
• Support for both PTA and PHS customers
• SSO is provide for all domain joined corporate machines with line of sight to a
DC
JANUARY 26, 2017
@EWUGDK
11
12. Azure AD Pass-through Authentication
• Provides similar services to AD FS
• Forms based authentication for non-domain joined/outside of corp net users (PTA)
• SSO for domain joined users on corp net (SSO)
• No need for dedicated servers
• PTA can be installed on existing servers or DC’s
• SSO is only a computer account in AD
• No load balancers
• PTA automatically uses all available connectors no need to load balance
• No DMZ
• All connections are outbound
• No unauthenticated end points on the internet
• Less to manage ongoing
• Simple DR, place connectors where needed
• No certificates to manage
JANUARY 26, 2017
@EWUGDK
12
13. Why Pass-Through Auth and SSO?
-Sign-in Options today
Complexity
Value
Cloud only
Accounts
AAD Connect
+ AD FS
AAD Connect
Cloud Accounts
AAD Connect
+ PHS
JANUARY 26, 2017
@EWUGDK
13
14. Why Pass-Through Auth and SSO?
-Sign-in Options today
Complexity
Value
Cloud only
Accounts
AAD Connect
+ AD FS
AAD Connect
Cloud Accounts
AAD Connect
+ PHS
AAD Connect
+ PTA and SSO
AAD Connect
+ PHS and SSO
JANUARY 26, 2017
@EWUGDK
14
15. What AD FS offers that PTA and SSO Don’t
• Support for smartcard authentication
• Support for 3rd Party MFA providers
• Passwords are always in your control boundary – i.e. don’t pass
through the cloud
• Conditional access rules based on Exchange protocols (e.g.
pop, imap etc)
• Support for on-premises device based conditional access
(device write back)
JANUARY 26, 2017
@EWUGDK
15
16. What PTA and SSO offers that AD FS Don’t
• Common authentication for cloud and on-prem users
• Co-existence authentication
JANUARY 26, 2017
@EWUGDK
16
17. Authentication comparison
• 45% are cloud only and completed directly by Azure AD
(down from 56% in March).
• 37% are federated and completed by an ADFS server at a
customer site (up from 32% in March).
• 18% are completed using a password hash that was
synced from on-premises to the cloud using AAD Connect
or one of its predecessors (up from 7% in March).
• 1% are completed by a syndication partner (large
companies who resell Microsoft services)
• Just under 1% are completed by a 3rd party federation
server (i.e. Ping Federate, CA Site Minder, etc.)
• Just under 1% are completed by a 3rd party identity
service (a company like Centrify, Okta, OneLogin, etc.)
• The remaining 1% are completed by a custom or open
source identity server
JANUARY 26, 2017
@EWUGDK
17
• The use of ADFS with Azure AD/Office 365 continues to grow. It now accounts for 36% of all authentications (up from 32% nine
months ago).
Note: Number are a bit old... waiting new numbers from Alex Simons - Director of PM
20. Pass-Through Auth
• Supported Scenarios
• Rich Clients that utilize modern authentication, think ADAL enabled
• Browser based passive Web flows
• Future Supported Scenarios
• Legacy clients (PowerShell, Lync/Skype, Outlook not using ADAL) – GA
• EAS, native mobile email clients - GA
• Until then
• Customers need to use ADAL enabled clients
• Alternatively, use PHS as a fallback
JANUARY 26, 2017
@EWUGDK
20
22. How does it work - Setup
JANUARY 26, 2017
@EWUGDK
22
23. How does it work - Setup
JANUARY 26, 2017
@EWUGDK
23
Azure AD
1
2
3
Contoso Corpnet
24. How does it work - Runtime
JANUARY 26, 2017
@EWUGDK
24
5
Contoso Corpnet
AAD
STS
12
3
6
4
25. What’s In A Token? (In Brief)
Claim Example Intended Purpose
Tenant ID 81aabdd2-3682-48fd-9efa-2cb2fcea8557 Immutable tenant identifier
Name Peter.dahl@proactive.dk Display only
First Name Peter Display only
Last Name Dahl Display only
Object ID b3809430-6c28-4e43-870d-fa7d38636dcd Immutable security identifier
Token also contains Group information
26. Ports required for Azure AD Connect
JANUARY 26, 2017
@EWUGDK
26
• 80 Enable outbound HTTP traffic for security validation such as SSL.
• 443 Enable user authentication against Azure AD
• 10100–10120 Enable responses from the connector back to the Azure AD
• 9352, 5671 Enable communication between the Connector toward the Azure service
for incoming requests.
• 9350 Optional, to enables better performance for incoming requests
• 8080/443 Enable the Connector bootstrap sequence and Connector automatic
update
• 9090 Enable Connector registration (required only for the Connector registration
process)
• 9091 Enable Connector trust certificate automatic renewal
https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-ports
27. Pass-Through Auth and SSO
JANUARY 26, 2017
@EWUGDK
27
• Only works with Web flows
• ADAL rich clients supported
• Limited browser support
• IE, Chrome, Firefox
• Edge not currently (due to lack of SSO support)
• Alternate login ID
• Not supported, will be supported in Public Preview
29. Which of the following would you choose
JANUARY 26, 2017
@EWUGDK
29
• PTA + Desktop SSO
• Password Hash Sync (PHS) + SSO
• Either, PTA or PHS + SSO is good for me/my customers
• PTA + Desktop SSO with fallback to PHS
• I don’t really need SSO or PTA – Why?
34. AzureAD: Primary Refresh Tokens
JANUARY 26, 2017
@EWUGDK
34
Microsoft Azure
Active DirectoryDave authenticates to Azure
AD as part of logon process
35. AzureAD: Primary Refresh Tokens
JANUARY 26, 2017
@EWUGDK
35
Microsoft Azure
Active Directory
Primary Refresh Token (PRT)
Returned by Azure AD and
cached by Windows 10
36. AzureAD: Primary Refresh Tokens
JANUARY 26, 2017
@EWUGDK
36
Microsoft Azure
Active Directory
Office 365
37. AzureAD: Primary Refresh Tokens
JANUARY 26, 2017
@EWUGDK
37
Microsoft Azure
Active Directory
Here is my PRT can I please
have an SSO token for Office
365
Office 365
38. AzureAD: Primary Refresh Tokens
JANUARY 26, 2017
@EWUGDK
38
Microsoft Azure
Active Directory
Your PRT checks out so here
is the SSO token you have
asked for
Office 365
39. AzureAD: Primary Refresh Tokens
JANUARY 26, 2017
@EWUGDK
39
Microsoft Azure
Active DirectoryHere is my Office 365
SSO token give me
access please
Office 365
40. AzureAD: Tokens
JANUARY 26, 2017
@EWUGDK
40
Kerberos Maximum lifetime for service ticket:
10 Timer før brugeren skal hente en ny ticket fra domain controlleren intern (Validering):
https://technet.microsoft.com/en-us/library/cc775748(v=ws.10).aspx
Session timeouts for Office 365
https://support.office.com/en-US/article/Session-timeouts-for-Office-365-37a5c116-5b07-4f70-8333-5b86fd2c3c40?ui=en-US&rs=en-
US&ad=US
Modern Authentication
Vi skal på et tidspunkt også have talt ”Modern Authentication” med jer, men jeg ser ikke lige tiden er moden endnu til dette:
https://blogs.office.com/2015/11/19/updated-office-365-modern-authentication-public-preview/. Det hænger meget sammen med EMS
(Conditional Access)
”Modern Authentication” : http://www.cloudidentity.com/blog/2015/03/20/azure-ad-token-lifetime/
Basic Authentication
ADFS Token: 8 timer (Det er standard fra Microsoft).
42. Microsoft MCSA: 2012 Windows Server 2016,
Microsoft MCSA: 2012 Windows Server 2012,
Microsoft MCITP: 2008 Server and Enterprise Administrator,
Microsoft MCSA: 2008 Windows Server 2008,
Microsoft MCSA/MCSE : 2003 Security,
Microsoft MCITP:Windows Server 2008 R2, Virtualization Administrator,
Microsoft MCTS: SCOM 2007, ISA 2006, DPM,
Microsoft MCTS: Forefront Protection, etc.,
VMWare Certified Professional VI3/VI4/VI5,
CompTIA A+, Network+,
Citrix CCA: Branch Repeater (CloudBridge),
EC-Council: Certified Ethical Hacker (CEH v7),
And more
Peter Selch Dahl
Sr. IT Architect, Cloud and IT Infrastructure
Twitter: @PeterSelchDahl
YouTube: www.youtube.com/user/PeterSelchDahl
Blog : http://blog.peterdahl.net
LinkedIn: https://dk.linkedin.com/in/petersdahl
Editor's Notes
Doesn’t require a Windows CAL license for Windows.
Doesn’t require a Windows CAL license for Windows.