Presentation from TechEd North America 2009
Abstract:
Microsoft's identity services enable enterprises, organizations, and developers to easily adopt the services they need. In this session learn about how identity solutions can enable service adoption, including: enterprises connecting their identity directory to cloud services, ISV developers leveraging Microsoft building blocks to sell their service to organizations, and web developers adopting customized versions of Live ID for their applications. We'll cover the Microsoft Federation Gateway service, updates to Live ID, and a turnkey adoption mechanism using Active Directory and Codename “Geneva” Server.
Atlanta Salesforce UG Meeting 2/23/2011 Symplifiedvraopolisetti
This document provides a summary of a presentation about managing user experience across SaaS applications. It discusses the market dynamics of cloud computing and how different cloud markets are projected to evolve. It emphasizes that user experience is a key driver of adoption and outlines how seamless identity and access management can be provided across web, cloud, and mobile apps. The presentation then discusses Symplified's converged identity stack and logical runtime architecture to provide a centralized solution for provisioning, access control, single sign-on, and auditing across internal and external applications.
The document discusses the past, present, and future direction of Citrix Receiver. Receiver started as Updater in 2008, focusing on simplicity and automatic updates. It evolved into App Picker in 2010 with an emphasis on self-service app launching. In 2011-2012, Receiver became the Access Hub, providing access to anything from anywhere through multiple platforms. Looking ahead, Receiver will take the form of a Broker in 2013, facilitating discovery, connectivity, interaction between apps and services through a centralized access point. The summary concludes that Receiver continues evolving to normalize diverse devices, operating systems and app types through its brokering functions.
At Agile IT, we've been leading the trend in moving customers to the Microsoft Cloud. Along that roadmap is the need to secure and manage the devices that will access that data. The Microsoft Enterprise Mobility Suite (EMS) focuses on managing both the data that's accessible from the cloud as well as the devices that access it. In this webinar, we introduce you to EMS and focus on how cloud technologies work together to deliver a seamless solution for protecting your data.
The accompanying recording of the webinar can be found at https://youtu.be/NOWFI4xl-dM.
VMware launched Zimbra 7, the newest version of its email and collaboration platform. Key highlights include improved productivity through increased data sharing capabilities, expanded support for mobile clients, and improved integration with SaaS applications. Zimbra 7 also provides enhanced manageability through simple deployment and updates as well as end-user self-service features. With over 66 million paid mailboxes and growing adoption, Zimbra aims to provide an alternative to Microsoft Exchange that is more open and easier to manage.
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure Sentri
The document discusses cloud computing strategies and Microsoft's cloud offerings. Some key points:
- The cloud can provide agility, maximize infrastructure, and focus on projects rather than maintenance.
- Microsoft offers Office 365, Azure, and hybrid solutions that allow using public and private clouds together.
- Storage strategies are evolving from dispersed local storage to consolidated cloud-integrated storage.
- Solutions like StorSimple and Azure help simplify storage management and reduce costs by leveraging the cloud.
Microsoft Cloud Identity and Access Management Poster - AtidanDavid J Rosenthal
Unlock the power of the cloud with enterprise-level identity services for all your cloud apps.
AZURE ACTIVE DIRECTORY
Use Azure Active Directory (Azure AD) at
global scale to centrally manage employee
access and provide single sign-on to
Microsoft services such as Azure, Office 365,
Dynamics CRM, Windows Intune, and
thousands of non-Microsoft cloud apps
MULTI-FACTOR AUTHENTICATION
Use Multi-Factor Authentication to protect
access to sensitive company information
and to help protect your organization from
malicious attacks.
VMware launched Zimbra 7, the newest version of its next-generation email and collaboration platform. Zimbra 7 provides new data sharing capabilities, expanded calendaring and search functionality, and upgraded management features for both IT and end-users. The update establishes Zimbra as a platform for a next-generation workspace within VMware's end-user computing vision, with optimizations for both casual and power users.
Microsoft Windows Azure Platform Appfabric for Technical Decision MakersMicrosoft Private Cloud
This document discusses Microsoft's Service Bus and Access Control capabilities on the Windows Azure platform. It provides an overview of how they enable secure connectivity across network boundaries, simplify authorization, and support federated identity. Examples are given of how they allow for high availability, scale out, and multi-tenancy. The presentation also includes case studies of how various companies have used Service Bus and Access Control to improve efficiency, agility, and focus.
Atlanta Salesforce UG Meeting 2/23/2011 Symplifiedvraopolisetti
This document provides a summary of a presentation about managing user experience across SaaS applications. It discusses the market dynamics of cloud computing and how different cloud markets are projected to evolve. It emphasizes that user experience is a key driver of adoption and outlines how seamless identity and access management can be provided across web, cloud, and mobile apps. The presentation then discusses Symplified's converged identity stack and logical runtime architecture to provide a centralized solution for provisioning, access control, single sign-on, and auditing across internal and external applications.
The document discusses the past, present, and future direction of Citrix Receiver. Receiver started as Updater in 2008, focusing on simplicity and automatic updates. It evolved into App Picker in 2010 with an emphasis on self-service app launching. In 2011-2012, Receiver became the Access Hub, providing access to anything from anywhere through multiple platforms. Looking ahead, Receiver will take the form of a Broker in 2013, facilitating discovery, connectivity, interaction between apps and services through a centralized access point. The summary concludes that Receiver continues evolving to normalize diverse devices, operating systems and app types through its brokering functions.
At Agile IT, we've been leading the trend in moving customers to the Microsoft Cloud. Along that roadmap is the need to secure and manage the devices that will access that data. The Microsoft Enterprise Mobility Suite (EMS) focuses on managing both the data that's accessible from the cloud as well as the devices that access it. In this webinar, we introduce you to EMS and focus on how cloud technologies work together to deliver a seamless solution for protecting your data.
The accompanying recording of the webinar can be found at https://youtu.be/NOWFI4xl-dM.
VMware launched Zimbra 7, the newest version of its email and collaboration platform. Key highlights include improved productivity through increased data sharing capabilities, expanded support for mobile clients, and improved integration with SaaS applications. Zimbra 7 also provides enhanced manageability through simple deployment and updates as well as end-user self-service features. With over 66 million paid mailboxes and growing adoption, Zimbra aims to provide an alternative to Microsoft Exchange that is more open and easier to manage.
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure Sentri
The document discusses cloud computing strategies and Microsoft's cloud offerings. Some key points:
- The cloud can provide agility, maximize infrastructure, and focus on projects rather than maintenance.
- Microsoft offers Office 365, Azure, and hybrid solutions that allow using public and private clouds together.
- Storage strategies are evolving from dispersed local storage to consolidated cloud-integrated storage.
- Solutions like StorSimple and Azure help simplify storage management and reduce costs by leveraging the cloud.
Microsoft Cloud Identity and Access Management Poster - AtidanDavid J Rosenthal
Unlock the power of the cloud with enterprise-level identity services for all your cloud apps.
AZURE ACTIVE DIRECTORY
Use Azure Active Directory (Azure AD) at
global scale to centrally manage employee
access and provide single sign-on to
Microsoft services such as Azure, Office 365,
Dynamics CRM, Windows Intune, and
thousands of non-Microsoft cloud apps
MULTI-FACTOR AUTHENTICATION
Use Multi-Factor Authentication to protect
access to sensitive company information
and to help protect your organization from
malicious attacks.
VMware launched Zimbra 7, the newest version of its next-generation email and collaboration platform. Zimbra 7 provides new data sharing capabilities, expanded calendaring and search functionality, and upgraded management features for both IT and end-users. The update establishes Zimbra as a platform for a next-generation workspace within VMware's end-user computing vision, with optimizations for both casual and power users.
Microsoft Windows Azure Platform Appfabric for Technical Decision MakersMicrosoft Private Cloud
This document discusses Microsoft's Service Bus and Access Control capabilities on the Windows Azure platform. It provides an overview of how they enable secure connectivity across network boundaries, simplify authorization, and support federated identity. Examples are given of how they allow for high availability, scale out, and multi-tenancy. The presentation also includes case studies of how various companies have used Service Bus and Access Control to improve efficiency, agility, and focus.
This document discusses Microsoft's web platform and tools. It highlights key capabilities of the Microsoft web platform including the Web Platform Installer, IIS extensions, servers, and technologies. It also discusses tools for developers, designers, and UX designers including SketchFlow for prototyping and Expression Blend for visual design. Silverlight 4 capabilities are summarized in areas of media, rich experiences, business applications, beyond the browser, and developer tools.
Cloud computing bpos & windows azure ossAvni Gupta
This document provides an overview of cloud computing using Microsoft's platforms, including Business Productivity Online Suite (BPOS) and Windows Azure. It describes how these services offer scalable resources that can be accessed remotely, reducing the need for on-premise infrastructure management. Specific features and services are highlighted, like email, file sharing, and development tools available. Security measures are also summarized, noting the physical data center protections and access management controls. The document concludes by describing how to get started using these Microsoft cloud offerings.
Tutorial: (Additional Slides) Business Intelligence: Making the Right Choices...SPTechCon
Peter Serzo is a consultant who specializes in Microsoft technologies. He runs a company called High Monkey Consulting and maintains a blog. In this session, he will discuss productivity tools available in Microsoft's business intelligence stack, including SharePoint, Excel, PowerPivot, SQL Server Reporting Services, and PerformancePoint Services. He will demonstrate how each tool can be used and highlight their strengths. The session aims to help attendees understand their options for building dashboards, reports, and analytics solutions using Microsoft products.
Compliance and Governance Through Complex Entitlement ManagementNoam Bunder
DataScan implemented AquaLogic Enterprise Security (ALES) to manage entitlements and comply with financial regulations. ALES allows DataScan to define security policies centrally and enforce them across applications without modifying code. This improves agility to respond to changing requirements and increases efficiency by removing security logic from applications. DataScan worked with BEA Professional Services on an SOA-based implementation using Java. Ongoing best practices include training IT administrators, integrating prototypes, and focusing on standards-based compliance.
Intervento di Enrico Boverino, Direttore Pubblica Amministrazione & Media - VMWARE a
OPEN DAY - COMPETENZE DIGITALI
Sala Convegni Pad. 152 Regione Puglia Fiera del levante Bari
15 maggio 2015 ore 9.30
A view on architectural considerations and models for the emerging context of software plus services and in view of technologies such as Windows Azure.
This document provides an overview of Microsoft cloud offerings including Cloud 101, Microsoft cloud data center locations and security program, Microsoft continuum model, and Business Productivity Online Suite (BPOS). BPOS is described including Exchange Online for email, SharePoint Online for collaboration, Office Communications Online for chat/presence, and LiveMeeting for virtual meetings. Licensing and pricing models are also covered. The presentation concludes with how to embrace the cloud including determining the right service, economic analysis, deployment options, piloting, and working with cloud partners.
This document provides an overview of cloud computing and software as a service (SaaS). It discusses the benefits of SaaS such as reduced costs and easier implementation. Key characteristics of cloud services include infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The document also covers service models, types of cloud (public, private, hybrid), and how service-oriented architecture enables integration between cloud applications.
This document discusses how System Center provides an integrated platform for managing applications, services, and infrastructure across physical, virtual, and cloud environments. It allows for:
1) Standardizing application deployment using templates to ensure consistent configurations.
2) Creating cloud abstractions that allow resources to be managed across different virtualization platforms from Microsoft, VMware, and Citrix.
3) Providing flexibility through delegation and control by allowing administrators to delegate self-service access and control utilization of cloud resources.
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...Abhishek Sood
The document discusses 8 common identity and access management challenges organizations face when adopting software-as-a-service (SaaS) applications: 1) user password fatigue, 2) manual user provisioning and de-provisioning processes, 3) lack of compliance visibility into user access, 4) siloed user directories for each application, 5) managing access across devices and browsers, 6) keeping application integrations up-to-date, 7) different administration models across applications, and 8) lack of utilization insights. It then introduces Okta as a solution that can address these challenges by providing single sign-on, automated user provisioning and de-provisioning, centralized compliance reporting, integration with existing user directories, mobile
Citrix XenMobile is a mobile device management solution that allows organizations to securely manage mobile apps, devices, and data. It offers features such as device management, policy configuration, security and compliance controls, and mobile application management. It provides these capabilities across major mobile platforms through three editions - XenMobile MDM Edition, XenMobile App Edition, and XenMobile Enterprise Edition. The Enterprise Edition includes additional capabilities such as delivery of Windows apps, ShareFile Enterprise features and email attachment encryption.
The document provides an overview of key concepts for understanding Active Directory Federation Services (AD FS) 2.0 including how it authenticates users and issues security tokens containing user claims to applications. It discusses common AD FS 2.0 challenges and troubleshooting tools like event logs, performance counters, and security auditing. It also covers how to view the claims pipeline and process rules in AD FS 2.0.
CIS14: Creating a Federated Identity Service for Better SSOCloudIDSummit
Matt Tatro, Denise Lores, Wade Ellery
Radiant Logic
How to avoid building half an Enterprise IdP; demonstration of how to create a federated identity service that will complement and improve your SSO by aggregating all of your identity silos into an enterprise IdP.
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middlewareinvestorrelation
The document discusses Oracle's new Fusion Middleware 11g product. It highlights new features in areas like developer tools, service-oriented architecture, enterprise portals, application grids, identity management, and business intelligence. It also discusses Oracle Fusion Middleware's leadership position in middleware based on various analyst reports and customer satisfaction surveys. The document promotes Oracle Fusion Middleware 11g's integrated development environment, performance improvements, and adoption by industry leaders.
The document discusses architectural principles for the software + services paradigm. It outlines industry trends like SOA, SaaS, and cloud computing that inform the paradigm. It then presents principles for foundations like physical vs virtual infrastructure and self-hosted vs vendor-hosted models. It details infrastructure services like identity, messaging, and storage. It also outlines application services, client software, and how to apply the principles when designing architectures.
Steve Abrams reviews Open Services for Lifecycle collaboration - objectives, technical and community approach, process, and progress. Originally presented at Rational Software Conference in June, 2009
This document provides an overview of enterprise rich internet applications (RIAs) with examples and lessons learned from real world implementations. It discusses the requirements and benefits of enterprise RIAs, compares various RIA platforms, and shares case studies of companies that have implemented RIAs using the Curl platform to address challenges like linking field data to business processes and providing complex applications via a web-based infrastructure. The document concludes that Ajax is inadequate for enterprise needs, and that Curl has seen the largest enterprise adoption of the four main RIA platforms that aim to meet stringent enterprise requirements.
Thinkfree Office Live Introduction Material EnBenedict Ji
The document discusses the main features of ThinkFree Office Live, which is divided into 3 sections - Log In, My Office, and Work Space. My Office provides 1GB of free cloud storage and allows users to view, save, move, rename and delete documents online. It also includes a web-based office application and document collaboration features. Documents can be shared publicly or collaboratively. A desktop synchronization tool allows for offline editing and syncing documents between devices. The service applies security standards to meet compliance requirements.
The document discusses Microsoft's solution for connecting on-premises Active Directory to cloud services and applications. The solution involves two main components: 1) Microsoft Federation Gateway, which acts as a broker that allows a single sign-on to any connected service once Active Directory is federated through it, and 2) Microsoft Services Connector, which registers an enterprise's domain with the gateway and issues tokens for authentication to services. The solution aims to simplify access to cloud services while maintaining on-premises identity management with Active Directory.
This document discusses Microsoft's web platform and tools. It highlights key capabilities of the Microsoft web platform including the Web Platform Installer, IIS extensions, servers, and technologies. It also discusses tools for developers, designers, and UX designers including SketchFlow for prototyping and Expression Blend for visual design. Silverlight 4 capabilities are summarized in areas of media, rich experiences, business applications, beyond the browser, and developer tools.
Cloud computing bpos & windows azure ossAvni Gupta
This document provides an overview of cloud computing using Microsoft's platforms, including Business Productivity Online Suite (BPOS) and Windows Azure. It describes how these services offer scalable resources that can be accessed remotely, reducing the need for on-premise infrastructure management. Specific features and services are highlighted, like email, file sharing, and development tools available. Security measures are also summarized, noting the physical data center protections and access management controls. The document concludes by describing how to get started using these Microsoft cloud offerings.
Tutorial: (Additional Slides) Business Intelligence: Making the Right Choices...SPTechCon
Peter Serzo is a consultant who specializes in Microsoft technologies. He runs a company called High Monkey Consulting and maintains a blog. In this session, he will discuss productivity tools available in Microsoft's business intelligence stack, including SharePoint, Excel, PowerPivot, SQL Server Reporting Services, and PerformancePoint Services. He will demonstrate how each tool can be used and highlight their strengths. The session aims to help attendees understand their options for building dashboards, reports, and analytics solutions using Microsoft products.
Compliance and Governance Through Complex Entitlement ManagementNoam Bunder
DataScan implemented AquaLogic Enterprise Security (ALES) to manage entitlements and comply with financial regulations. ALES allows DataScan to define security policies centrally and enforce them across applications without modifying code. This improves agility to respond to changing requirements and increases efficiency by removing security logic from applications. DataScan worked with BEA Professional Services on an SOA-based implementation using Java. Ongoing best practices include training IT administrators, integrating prototypes, and focusing on standards-based compliance.
Intervento di Enrico Boverino, Direttore Pubblica Amministrazione & Media - VMWARE a
OPEN DAY - COMPETENZE DIGITALI
Sala Convegni Pad. 152 Regione Puglia Fiera del levante Bari
15 maggio 2015 ore 9.30
A view on architectural considerations and models for the emerging context of software plus services and in view of technologies such as Windows Azure.
This document provides an overview of Microsoft cloud offerings including Cloud 101, Microsoft cloud data center locations and security program, Microsoft continuum model, and Business Productivity Online Suite (BPOS). BPOS is described including Exchange Online for email, SharePoint Online for collaboration, Office Communications Online for chat/presence, and LiveMeeting for virtual meetings. Licensing and pricing models are also covered. The presentation concludes with how to embrace the cloud including determining the right service, economic analysis, deployment options, piloting, and working with cloud partners.
This document provides an overview of cloud computing and software as a service (SaaS). It discusses the benefits of SaaS such as reduced costs and easier implementation. Key characteristics of cloud services include infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The document also covers service models, types of cloud (public, private, hybrid), and how service-oriented architecture enables integration between cloud applications.
This document discusses how System Center provides an integrated platform for managing applications, services, and infrastructure across physical, virtual, and cloud environments. It allows for:
1) Standardizing application deployment using templates to ensure consistent configurations.
2) Creating cloud abstractions that allow resources to be managed across different virtualization platforms from Microsoft, VMware, and Citrix.
3) Providing flexibility through delegation and control by allowing administrators to delegate self-service access and control utilization of cloud resources.
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...Abhishek Sood
The document discusses 8 common identity and access management challenges organizations face when adopting software-as-a-service (SaaS) applications: 1) user password fatigue, 2) manual user provisioning and de-provisioning processes, 3) lack of compliance visibility into user access, 4) siloed user directories for each application, 5) managing access across devices and browsers, 6) keeping application integrations up-to-date, 7) different administration models across applications, and 8) lack of utilization insights. It then introduces Okta as a solution that can address these challenges by providing single sign-on, automated user provisioning and de-provisioning, centralized compliance reporting, integration with existing user directories, mobile
Citrix XenMobile is a mobile device management solution that allows organizations to securely manage mobile apps, devices, and data. It offers features such as device management, policy configuration, security and compliance controls, and mobile application management. It provides these capabilities across major mobile platforms through three editions - XenMobile MDM Edition, XenMobile App Edition, and XenMobile Enterprise Edition. The Enterprise Edition includes additional capabilities such as delivery of Windows apps, ShareFile Enterprise features and email attachment encryption.
The document provides an overview of key concepts for understanding Active Directory Federation Services (AD FS) 2.0 including how it authenticates users and issues security tokens containing user claims to applications. It discusses common AD FS 2.0 challenges and troubleshooting tools like event logs, performance counters, and security auditing. It also covers how to view the claims pipeline and process rules in AD FS 2.0.
CIS14: Creating a Federated Identity Service for Better SSOCloudIDSummit
Matt Tatro, Denise Lores, Wade Ellery
Radiant Logic
How to avoid building half an Enterprise IdP; demonstration of how to create a federated identity service that will complement and improve your SSO by aggregating all of your identity silos into an enterprise IdP.
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middlewareinvestorrelation
The document discusses Oracle's new Fusion Middleware 11g product. It highlights new features in areas like developer tools, service-oriented architecture, enterprise portals, application grids, identity management, and business intelligence. It also discusses Oracle Fusion Middleware's leadership position in middleware based on various analyst reports and customer satisfaction surveys. The document promotes Oracle Fusion Middleware 11g's integrated development environment, performance improvements, and adoption by industry leaders.
The document discusses architectural principles for the software + services paradigm. It outlines industry trends like SOA, SaaS, and cloud computing that inform the paradigm. It then presents principles for foundations like physical vs virtual infrastructure and self-hosted vs vendor-hosted models. It details infrastructure services like identity, messaging, and storage. It also outlines application services, client software, and how to apply the principles when designing architectures.
Steve Abrams reviews Open Services for Lifecycle collaboration - objectives, technical and community approach, process, and progress. Originally presented at Rational Software Conference in June, 2009
This document provides an overview of enterprise rich internet applications (RIAs) with examples and lessons learned from real world implementations. It discusses the requirements and benefits of enterprise RIAs, compares various RIA platforms, and shares case studies of companies that have implemented RIAs using the Curl platform to address challenges like linking field data to business processes and providing complex applications via a web-based infrastructure. The document concludes that Ajax is inadequate for enterprise needs, and that Curl has seen the largest enterprise adoption of the four main RIA platforms that aim to meet stringent enterprise requirements.
Thinkfree Office Live Introduction Material EnBenedict Ji
The document discusses the main features of ThinkFree Office Live, which is divided into 3 sections - Log In, My Office, and Work Space. My Office provides 1GB of free cloud storage and allows users to view, save, move, rename and delete documents online. It also includes a web-based office application and document collaboration features. Documents can be shared publicly or collaboratively. A desktop synchronization tool allows for offline editing and syncing documents between devices. The service applies security standards to meet compliance requirements.
The document discusses Microsoft's solution for connecting on-premises Active Directory to cloud services and applications. The solution involves two main components: 1) Microsoft Federation Gateway, which acts as a broker that allows a single sign-on to any connected service once Active Directory is federated through it, and 2) Microsoft Services Connector, which registers an enterprise's domain with the gateway and issues tokens for authentication to services. The solution aims to simplify access to cloud services while maintaining on-premises identity management with Active Directory.
This document discusses the development model for cloud computing platforms. It provides an overview of computing history from Turing machines to modern application platforms and servers. It then discusses how cloud computing aims to further reduce complexity by providing hosted services, software, and platforms. The document compares traditional on-premise application development with challenges to the cloud development approach using services like Amazon Web Services, Microsoft Azure, Google App Engine, and Salesforce Force.com platform. It analyzes commonalities and differences between these platforms in terms of abstraction levels, application capabilities, and developer experience.
We create custom user-friendly and highly productive software for enterprises and start-up clients using the .NET platform. We also help our clients with scalability, productivity and information security. Let us help you transform your ideas into fully fledged .NET solutions!
Cloud Intelligence - Get Your Head Out of the CloudsHarold Wong
Cloud Intelligence Conference Presentation: Introduction to Cloud Computing (Public, Private, Hybrid) with a level set on terminology and capabilities.
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...Peter de Haas
Presentation I gave on 15 Sept 2009 at the Dutch Datacenter & Hosting Summit 2009.
Main topics of the presentation :
- Look beyond the hype of cloudcomputing
- Microosft vision for cloud computing / online slutions
- Importance of a Partner ecosystem
- The ability to choose the right sourcing and deployment scenario for your organisation
1. The document discusses the evolution of Microsoft's .NET framework and development platforms over time, from versions 1.0 to 4.0.
2. It highlights new capabilities in .NET 4 like parallel computing innovations and faster web development.
3. The document promotes resources for learning more about .NET 4 and Microsoft's software and cloud services.
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or LessSalesforce_APAC
This document provides an overview of the Force.com platform. It discusses how Force.com eliminates the need to manage hardware infrastructure through its cloud-based platform as a service (PaaS) model. It then outlines the key components of the Force.com platform including its development platform, cloud database, APIs, and cloud infrastructure. Finally, it briefly discusses some of the declarative and programmatic tools available for application building on Force.com.
Amit Cohen discusses strategies for platform interoperability and virtualization support. Some key points include fostering partnerships and alliances to build bridges between diverse systems, participating in standards bodies to promote interoperability, and making Microsoft technology available to others. The document also outlines Microsoft's efforts related to virtual server technologies, heterogeneous support for Linux, open specifications, and certification programs.
SPEC INDIA Microsoft Technology Case StudySPEC INDIA
SPEC INDIA is a custom software development company with over 25 years of experience in developing web based enterprise software applications, asp.net application development, software development India
This document discusses Microsoft's cloud computing offerings and strategy. It outlines 5 key characteristics of cloud computing, describes Microsoft's cloud services including Software as a Service, Platform as a Service and Infrastructure as a Service. It highlights Microsoft's investments in security, compliance programs and global infrastructure to support enterprise adoption of cloud computing. The document encourages readers to consider Microsoft's cloud solutions and how they can help reduce costs while increasing productivity and flexibility.
Get ready to deliver Windows desktops and apps like a cloud provider with Pro...Citrix
At Synergy in San Francisco, Citrix announced a bold new project aimed at enabling enterprises and service providers to deliver Windows desktops and apps as a true cloud service. Project Avalon promises to revolutionise the delivery of IT services by enabling enterprise customers to build and leverage private, public and hybrid clouds to deliver access to desktops, apps and data anywhere. Join us to learn what you can do to prepare for Project Avalon.
Patterns of Cloud Applications Using Microsoft Azure Services PlatformDavid Chou
The document describes Microsoft's Azure Services Platform, which provides IT services through a global network of Microsoft data centers. It offers infrastructure, platform, and private cloud services that are managed at different levels, from fully managed platform services to customer-managed private infrastructure. Key services include compute, data, networking, development platforms, identity management, and more. It also provides high availability, security, and usage-based pricing. The platform supports various application patterns including cloud web applications and composite services applications built with Azure services.
David Giard is a principal consultant who blogs and speaks about topics including SQL Server, Microsoft Distributed Cache, and communication skills. He lists upcoming speaking events in April about an introduction to SQL Server, using Distributed Cache to speed applications, and proactive communication. The document then discusses Microsoft Live Services, Mesh Services, and Live Mesh as tools to connect applications to users across devices through features like identity, storage, and communications. It provides usage statistics and explains how Live Services can help engage users and integrate experiences. Examples are given of how FedEx and Blockbuster use Virtual Earth and Live Mesh to improve customer experiences through location services and access to content across devices.
The document discusses the convergence of software and services. It describes how software is increasingly being delivered as a service and outlines different models for software delivery including on-premise, hosted, and software as a service. It also discusses key considerations around experience, delivery, composition, and monetization in this new software and services paradigm.
Windows Azure is a cloud computing platform that provides Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It allows developers to build, deploy, and manage applications through Microsoft-managed data centers. The key services include compute, storage, networking, and development tools. Architectural principles for building reliable cloud applications on Windows Azure emphasize statelessness, redundancy, loose coupling between components, and scaling automatically based on demand.
This document discusses whether Windows Azure is the right cloud platform. It covers why cloud computing is beneficial as a utility service model, why Microsoft is well-positioned in the cloud with its breadth of offerings across platforms, and what types of scenarios are well-suited for the Windows Azure platform, such as applications with changing loads or seasonal usage patterns. It also addresses some challenges with cloud like data security and outlines steps to evaluate and adopt cloud computing like identifying opportunities, calculating total cost of ownership, and conducting proof of concepts.
The document discusses creating on-demand enterprise applications for the iPhone using the Force Platform. It outlines three approaches: using Visualforce for web-based apps, using Force Platform Mobile for easier native apps that leverage the full Force Platform, or using the iPhone SDK and Force SOAP API for native apps with full SDK features but requiring a connection. Force Platform Mobile is described as the quickest way to create a native app while Visualforce is best for quick prototyping and the iPhone SDK provides the most UI options but requires connectivity.
WebFest 2011 Hosting Applications CR by David TangSpiffy
David Tang, a Product Marketing Manager at Microsoft Singapore, discussed how customers can expand their services from on-premise to hosted to cloud solutions using Microsoft technologies. He outlined scenarios for publishing a website and editing a live site remotely. The presentation promoted Microsoft's cloud computing landscape including Infrastructure as a Service, Platform as a Service and Software as a Service. It also covered emerging IT roles and skill sets needed for working with cloud technologies.
Similar to Identity Services Drilldown - TechEd NA 2009 (20)
The Internet of Cars - Towards the Future of the Connected CarJorgen Thelin
No doubt you have heard the phrase “Internet of Things” and the new buzzword “IoT” been used more and more these days, but what does that mean in practice? The Tesla Model S is probably the most well-connected car on the planet at the moment, and in this presentation we will use that vehicle as a case study of some practical usage of IoT concepts and technology that is already being applied to modern automobiles.How far away are we from a future “Internet of Cars” and what will be the social and privacy impacts of more connected-car scenarios?
Orleans: Cloud Computing for Everyone - SOCC 2011Jorgen Thelin
Orleans is a software framework for building reliable, scalable, and elastic cloud applications. Its programming model encourages the use of simple concurrency patterns that are easy to understand and employ correctly. It is based on distributed actor-like components called grains, which are isolated units of state and computation that communicate through asynchronous messages. Within a grain, promises are the mechanism for managing both asynchronous messages and local task-based concurrency. Isolated state and a constrained execution model allow Orleans to persist, migrate, replicate, and reconcile grain state. In addition, Orleans provides lightweight transactions that support a consistent view of state and provide a foundation for automatic error handling and failure recovery.
We implemented several applications in Orleans, varying from a messaging-intensive social networking application to a data- and compute-intensive linear algebra computation. The programming model is a general one, as Orleans allows the communications to evolve dynamically at runtime. Orleans enables a developer to concentrate on application logic, while the Orleans runtime provides scalability, availability, and reliability.
Live Identity Services presentation at Microsoft's MIX09 Conference.
Learn how Microsoft provides a range of identity solutions for helping developers more easily build seamless user experiences that include Federation, Authentication, UX Customization, Open Standards, Open ID and more.
Live Identity Services Drilldown - PDC 2008Jorgen Thelin
Live Identity Services enables developers on any platform to choose the identity integration model that best enables their scenarios, including: web or client authentication, delegated authentication, or federated authentication. Learn how to build seamless, cobranded, and customized sign-up and sign-in experiences.
Microsoft PDC 2008 - Session BB22
The New Enterprise Alphabet - .Net, XML And XBRLJorgen Thelin
The document discusses new enterprise technologies like .NET, XML, and XBRL that are enabling greater interoperability between businesses. It covers key concepts like service-oriented architecture (SOA) and web services that allow applications from different vendors to communicate. Interoperability profiles play an important role in achieving business interoperability by defining subsets of specifications for specific domains or environments. While challenges remain, initiatives like web services specifications and Microsoft's focus on standards are helping to realize the vision of an interconnected, agile enterprise.
The document discusses Microsoft's strategy and commitment to interoperability through web services specifications and standards. It provides an overview of Microsoft's WS-* specification development process, their involvement in various standards bodies, and implementations in their products to support interoperability. It also discusses the adoption of WS-* specifications by other vendors and defines interoperability profiles to compose subsets of specifications for specific domains or environments.
WS-* Protocol Workshop Process OverviewJorgen Thelin
The document discusses the WS Protocol Workshop Process, which aims to apply software testing practices to web services specifications to promote interoperability. Workshops provide a way for interested parties to review, test, and validate specifications early in the development process. This helps identify and address problems before wide implementation. There are feedback workshops to gather comments, and interoperability workshops where implementations are tested against each other. The goal is community involvement in specification development and proven interoperability of implementations.
Web Services and Devices Profile for Web Services (DPWS)Jorgen Thelin
The document discusses Web Services and how they can be applied to devices using the Device Profile for Web Services. It describes how WS specifications can be scaled down to work on limited resource devices. The Device Profile defines a lightweight subset of WS specs for device communication and includes security, discovery, and other protocols. Microsoft's implementations in Windows Vista and .NET support these standards for printer, scanner, and other device integration.
The document discusses WS-Discovery, a protocol that allows devices and services to advertise themselves and discover other devices and services on a network. It describes the key message exchanges in WS-Discovery including Hello, Bye, Probe, and ProbeMatch. It also summarizes the metadata included in messages and how matching is performed. Finally, it provides examples of how WS-Discovery could be used for device discovery and integration scenarios.
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)Jorgen Thelin
The document discusses Windows Communication Foundation (WCF) and how it provides a unified programming model for building service-oriented applications. WCF enables development of loosely-coupled services through features like support for WS-* specifications, compatibility with existing Microsoft distributed application technologies, and integration with Visual Studio 2005. It also discusses how WCF improves productivity over previous technologies and promotes interoperability and service-orientation.
The document discusses Microsoft's strategy and roadmap for web services and interoperability using WS-* specifications. Microsoft is committed to implementing all WS-* specifications in its products to ensure interoperability. It delivers web services capabilities through Windows Server, Visual Studio, and other products. The document outlines the WS-* specifications, their purpose, development process, and industry adoption status.
Interoperability and Windows Communication Foundation (WCF) OverviewJorgen Thelin
The document discusses interoperability and Microsoft's commitment to it. It defines interoperability as the ability of diverse systems to connect and exchange information. Microsoft supports interoperability through its implementations of WS-* specifications in Windows Communication Foundation and by participating in standards bodies. Profiles help constrain specifications to promote out-of-the-box interoperability across industries and systems.
This document summarizes a presentation about achieving real-world business interoperability using Microsoft's web services platform products. It discusses how standard web services protocols and industry data standards can enable true multi-vendor solutions. It provides an example use case of connecting insurance industry systems and outlines considerations for payload formats, protocols, processes, partners and people when designing interoperable systems.
Achieving Interoperability Through Web ServicesJorgen Thelin
The document discusses interoperability in the context of web services. It defines interoperability as the ability for software and hardware from different vendors to communicate. It describes several techniques for achieving interoperability, including specification profiling, interoperability workshops, and plugfests for testing implementations. The document also outlines Microsoft's commitment to delivering interoperable web services products and their involvement in specification development.
Zero-Defects Plug and Play -- General Quality Frameworks and Processes for Ac...Jorgen Thelin
This document describes the design of quality frameworks and processes implemented at ICL's Ashton Manufacturing plant to achieve high levels of product quality. It outlines frameworks for measuring delivered quality, preventing problems through validation processes, trapping defects before shipment through audits, and driving continuous quality improvement through corrective action loops. The frameworks aim to standardize best practices while allowing customization between product lines. Ultimately, the document emphasizes the importance of organizational structure and knowledge retention in supporting effective quality processes.
Identity, Security, and XML Web Services -- The Importance of Interoperable S...Jorgen Thelin
The document discusses identity, security, and XML web services. It defines identity as who a person is and how they prove it. Identity provides permissions in computing systems as in real life. Standards like SAML and WS-Security encode identity credentials in XML for use in web services. Examples show username tokens, X.509 certificates, and SAML assertions transmitted in SOAP message headers to authenticate callers and pass identity attributes between systems.
This document provides an overview of web services security. It discusses the main concerns of authentication, authorization, confidentiality and integrity. It presents a framework for web services security and describes how security can be implemented at the transport, message and application levels. Various usage scenarios for web services are explored, and the security implications of scenarios like enterprise application integration, reusing existing business logic, and business partner collaboration are examined. Emerging standards for web services security are also overviewed.
There are two main types of distributed systems: request/response and message passing. Request/response systems focus on invoking operations and return values, while message passing focuses on constructing and dispatching messages without expecting a response. There are also two main architecture styles: object-oriented and service-oriented. Object-oriented styles involve communicating with object instances and have stateful communications, while service-oriented styles involve communicating with services through a standardized interface in a stateless manner. A shift is occurring from object-oriented to service-oriented architectures, as the latter allows for looser coupling and better scalability through messages. Web services can support both request/response and message passing systems.
Identity, Security and XML Web ServicesJorgen Thelin
The use of security credentials and concepts of single-sign-on and “identity” play a big part in Web Services as developers start writing enterprise-grade line-of-business applications. An overview is provided of the emerging XML security credential standards such as SAML, along with various “identity” standards such as Passport and Liberty. We examine how “identity aware” Web Service implementations need to be, and the value a Web Services platform can add in reducing complexity in this area, with lessons drawn from experiences using J2EE technology for real-world security scenarios.
The Web Services Container (WSC) is responsible for routing messages to call handlers, configuring execution steps, and controlling execution context. It uses a SOAP processing engine and supports custom legacy adaptors, transports, security, and message interceptors. The WSC allows configuration of aspects like activation policy, session management, resource usage controls, and application configuration through an XML descriptor file. It also provides a metadata catalog and standard implementations that can be customized through plugins.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
3. Web ISVs Organizations
Developers • Federation for • Turnkey
• Customizable selling their federation for
identity UX applications to adopting services
• Single Sign On organizations (Online, Live, ISVs
• Access to • Easy on-boarding )
user data of new customers • Works with
existing identity
infrastructure
4. Agenda
Baseline understanding of Identity Services & Windows
Live ™ ID
Identity challenges from Cloud Services
Organizations
• Consuming federated identities -- Microsoft ® Federation Gateway
• Rapid on-boarding for organizations – Codename “Geneva” Server +
one-click federation
ISVs
• Become part of the federation ecosystem
• Consuming federated identities
• Rapid on-boarding for your customers and suppliers
Web Developers
• Consuming Windows Live IDs on your site
• Accessing user data on your site
5. Windows Live Identity Services
Core principles
Ease of use
Open and
Rich
Standards-
functionality
based
Security
is our top
priority!
Personal and Federation
Business ready
6. Identity Services - Many components
Identities • Authentication: users, applications, devices
Strong Authentication • Investing in 2FA such as Smartcard, StartKey
Attacker Resistant • User / IP reputation, Account abuse prevention
UI Customization • Windows Live ™ ID is fully customizable
Data Portability • Delegated auth: user permission to access data
Open Standards • SAML 2.0 / OpenID / OAuth
Federated
• Compatible with Microsoft ® Federation Gateway
Authentication
7.
8. Software and Service Topology
Cloud
Enterprise Windows Microsoft®
ISV Apps
Apps Live Online
Microsoft
Live
Azure™ Services Platform Online Dynamics®
Mesh CRM Online
Identity
Service
Browser
Org On-Premises
Active
Office
Directory®
Desktop
Apps Exchange ISV Apps SharePoint
9. Federated Ecosystem
Benefits of federated identity
Open participation based on industry standards
Linking service providers and service consumers
Access to more services and applications:
Microsoft cloud applications
Developers using Azure ™ Services Platform
Developers using other hosting platforms
Access to more customers:
500m+ Windows Live ID users
Other organizations using federated identity
Microsoft is offering solutions that greatly simplify the federation
scenarios
10. Software and Service Challenges
Security Challenges Adoption Challenges
Identity islands: IT Admin
User identity in AD on premise Re-work security practices
Software service and tools?
(Exchange Labs) is in cloud Re-train to manage identity
Partners & Customers federation?
Security zones: Users
Physical isolation for Re-train on a new user
on-premise software experience?
Service in cloud Developers
Data transport across Re-write existing applications?
security zones
11. Federation Rapid on-
Infrastructure boarding / tools
• Microsoft Federation • Codename “Geneva”
Gateway Server
• Standards-based • One-click federation
• Service adoption
scenarios
12. Scenario - Switching to Cloud Services
Cloud
Enterprise Windows Microsoft®
ISV App
Apps Live Online
Microsoft
Live
Dynamics®
Azure™ Services Platform Mesh CRM Online
Challenge: How to switch to cloud
Typical IT Requests: services without scrapping your
1) Outsource service to existing identity infrastructure?
cloud-based delivery
(e.g. Exchange)
2) Move application to Enterprise On-Premises
cloud hosting Active
Directory®
3) Use a new cloud-service
Exchange ISV App SharePoint
13. Software and Service Topology – Federated Identity
Cloud
Enterprise Windows Microsoft®
ISV Apps
Apps Live Online
Microsoft
Live
Live Microsoft Dynamics®
Azure™ Services Platform Mesh CRM Online
Identity Federation
Service Gateway
“Geneva”
Server Enterprise On-Premises
Browser
Active
Office Directory®
Employee Exchange ISV AppsSharePoint
Apps
14. Scenario - Collaborating with Other Organizations
Cloud
Enterprise Windows Microsoft®
ISV Apps
Apps Live Online
Microsoft
Live
Azure™ Services Platform Live Microsoft Dynamics®
Mesh CRM Online
Identity Federation
Service Gateway
“Geneva” “Geneva”
Server University Server
Org On-Premises
Active Active
Directory® Directory®
Exchange Exchange ISV AppsSharePoint
15. Scenario - Outreach to End User Customers
Cloud
Enterprise Windows Microsoft
ISV Apps
Apps Live Online
Microsoft
Live
Azure Services Platform Live Microsoft Dynamics
Mesh CRM Online
Identity Federation
Service Gateway
“Geneva”
Server Org On-Premises
Browser
Office Active
End User Directory
Apps
Exchange ISV Apps SharePoint
16. Solution: Microsoft Federation Gateway
Federation hub service enables
access to:
Microsoft services Service Service Service
Provider
Provider Provider
ISVs on Azure Platform
Other businesses
500+ million Live IDs
Federation
Hub
Manage one relationship to
connect to any combination
Hub and spoke model Customer Customer Customer
handles endpoint changes,
key rollovers, protocol changes
17. Federation Rapid on-
Infrastructure boarding / tools
• Microsoft Federation • Codename “Geneva”
Gateway Server
• Standards-based • One-click federation
• Service adoption
scenarios
18. Solution: Live Federation Tool for quot;Genevaquot; Server
Codename “Geneva” Server connects Active
Directory® to:
Microsoft Federation Gateway
Online/Live services, Windows Live ID & ISV services
Other standards-based federation hubs
Supports range of AD and network topologies:
Single server, Server farm, Proxy server, DMZ
Active Directory:
Single domain, Single forest, Multiple forests
Download tool for quick and easy connection setup to
Microsoft Federation Gateway
http://www.microsoft.com/Geneva
20. Connecting to Federation Gateway
One-click federation tool for quot;Genevaquot;
Connects Active Directory® to Federation Gateway
and Cloud services / applications
One-time federation setup – Trust-Provisioning
Assert domain ownership via SSL cert issued by a trusted Cert Authority
Registers organization's domain, sign-in endpoint, and token signing key
http://msdn.microsoft.com/en-us/library/dd164396.aspx
Microsoft Microsoft Cloud
Organization “Geneva” Federation
Server Applications
Gateway
Developer
Active
Services
Directory
Server Apps
21. Federation Gateway and quot;Genevaquot; Server
Accessing federated resources
from inside corporate network
22. Using Federation Gateway and
quot;Genevaquot; – Accessing Services
1. User clicks link -- taken to Codename 3. “Geneva” Server issues login token and
“Geneva” Server for authentication redirects to Federation Gateway
2. “Geneva” Server validates credentials with 4. Federation Gateway validates token
Active Directory and transforms claims
5. Federation Gateway issues service
token and redirects to service
Browser
6. User accesses service
Office
Desktop Apps
Microsoft Cloud
Enterprise “Geneva”
Federation
Server Applications
Gateway
Developer
Active
Services
Directory
23. Federation Gateway and quot;Genevaquot; Server
Accessing federated resources
from outside corporate network
24. Using Federation Gateway and
quot;Genevaquot; – Deployment Options
Active
Directory
“Geneva”
“Geneva”
Server
Server
Proxy
External
user
Internal
user
Enterprise DMZ
25. Benefit: Reduced Federation Costs
Federated Identity makes switching to Cloud Services easier:
Microsoft Federation Gateway for federation of both
enterprises and services
Codename “Geneva” Server extends AD into the Cloud –
a simple on-boarding process
Federation Gateway and “Geneva” Server provides:
Fewer federation relationships to configure
Helps protect corporate account security
No new user accounts needed
No extra passwords for users to forget!
26.
27. Connections - Federation Ecosystem
User Applications Relying Party (RP) Identity Providers (IdP)
Client SDK
Live ID
Windows
App
Microsoft
Web Site /
Online App
Federation
Gateway
Browser
Live ID Other federated
Identity Identity
Provider Providers
28. Federation Gateway: Integration Options
For businesses and universities:
Microsoft Services Connector, “Geneva” Server
Works for businesses without Active Directory too
Protocols: WS-* (WS-Trust, WS-Federation)
Tokens: SAML
For web applications / relying services:
Frameworks: .NET, “Geneva”, Live Framework
Protocols:
29. Consume Accessing user
identities and SSO data
• Web Authentication • Delegated
• Client SDK Authentication SDK
31. How Web Authentication Works
Live ID Web Authentication SDK Docs http://go.microsoft.com/fwlink/?LinkID=91762
Relying Party Web Site
1 AdventureWorks.com
End User
with web 5
browser
4 2
3
Live ID WebAuth service
34. Sign-in Screen Customizable Theme
Elements cannot change.
Customize look and feel.
Font color
Background color
Button color
Task integration statement
User tile color
Live ID description color
Customizable Contents
Elements that can
Sign-up section
be customized.
Partner Logo
Task statement
Product description
Sign up section
Header background
37. Customizable Sign-in Screen
What was changed?
Partner Logo
Task statement
Product description
Sign up section
Header background
Font color
Background color
Button color
User tile color
Live ID
description color
41. Delegated Auth Protocol Overview
End User “Granting Consent” phase
with
browser
Consent UI
consent.live.com
Application
Provider “Using Consent” Phase (user can be offline)
(web site)
Resource
Provider (ex:
Windows
Live Contacts)
Live ID Delegation
Service
42. Web ISVs Organizations
Developers • Federation for • Turnkey
• Customizable selling their federation for
identity UX applications to adopting services
• Single sign On organizations (Online, Live, ISVs
• Access to user • Easy on-boarding )
data of new customers • Works with
existing identity
infrastructure
43.
44. Resources
www.microsoft.com/teched www.microsoft.com/learning
Sessions On-Demand & Community Microsoft Certification & Training Resources
http://microsoft.com/technet http://microsoft.com/msdn
Resources for IT Professionals Resources for Developers
www.microsoft.com/learning
Microsoft Certification and Training Resources
46. Federation Resources and Links
Microsoft Federation Gateway
Released in 2006, available today
Whitepaper: http://msdn.microsoft.com/en-us/library/cc287610.aspx
On-boarding documentation:
http://msdn.microsoft.com/en-us/library/dd164396.aspx
Codename “Geneva” Server
Beta 2 available today
http://www.microsoft.com/Geneva
Live Federation tool for Codename “Geneva” Server
http://www.microsoft.com/Geneva
47. Live ID Resources & Links
Windows Live ID Developer Center - http://dev.live.com/liveid
Windows Live ID Articles on MSDN - http://go.microsoft.com/fwlink/?LinkId=111111
Windows Live ID Documentation on MSDN - http://msdn2.microsoft.com/en-us/library/bb404787.aspx
Windows Live ID Developer Forum - http://go.microsoft.com/fwlink/?LinkID=78146
Windows Live ID Team Blog - http://winliveid.spaces.live.com
Windows Live ID Whitepapers
Introduction to Windows Live ID - http://msdn2.microsoft.com/en-us/library/bb288408.aspx
Understanding Windows Live Delegated Authentication - http://msdn2.microsoft.com/en-
us/library/cc287613.aspx
Windows Live ID Federation - http://msdn2.microsoft.com/en-us/library/cc287610.aspx
Windows Live ID Documentation and SDKs
Windows Live ID Web Authentication SDK Docs http://go.microsoft.com/fwlink/?LinkID=91762
Web Authentication SDK Samples http://go.microsoft.com/fwlink/?LinkID=91761
Windows Live ID Delegated Authentication SDK Docs http://go.microsoft.com/fwlink/?LinkID=107420
Delegated Authentication SDK Samples http://go.microsoft.com/fwlink/?LinkId=107419
Windows Live ID Client SDK download - http://go.microsoft.com/fwlink/?LinkId=86974
Delegated Authentication Resource Providers List -
http://go.microsoft.com/fwlink/?LinkID=108535
Windows Live ID Web Authentication app registration page http://lx.azure.microsoft.com
Windows Live Tools for Visual Studio - http://dev.live.com/tools/