This document provides an overview of security in Windows Communication Foundation (WCF). It discusses the different WCF bindings and their default security settings. It also covers how to configure WCF security by setting the security mode, client credential type, and credential values. Additional topics include role-based and claims-based authorization, impersonation, and sample security configuration code. The document recommends the WSHttpBinding for default message encryption security and also mentions the BasicHttpBinding and NetMsmqBinding as other options to consider for bindings.
The document discusses security concepts in Windows Communication Foundation including authentication, authorization, message integrity, and confidentiality. It describes how WCF supports various security modes and mechanisms at the transport and message levels including common configurations for client credential types, algorithm suites, and impersonation. The key aspects of securing a WCF service are defining a security policy and configuring the appropriate bindings, behaviors, and protection levels.
MTC Global is launching an initiative to accredit teachers across all disciplines except for management teachers. The Accredited Teacher (AT-MTC Global) recognition demonstrates a teacher's proficiency and ability to provide quality education. The application process is online and involves submitting an application form, registration fee, and an interview. Successful candidates will be added to MTC Global's website database and contacted for project opportunities. Accreditation is valid for 3 years. Benefits include professional development, networking opportunities, and consulting roles. Teachers from KG to Ph.D level can apply except for management faculty who have a separate process. The assessment focuses on teaching skills, technology use, innovation, ethics, and knowledge in their specialization area.
1) The document discusses transformative innovations in management education in India, including the founding of institutions like the B.K. School of Business Management, Institute of Rural Management (IRMA), Indian Institute of Plantation Management, and Women's Institute for Studies in Development Oriented Management (WISDOM).
2) It describes the transformative ideas behind each institution and shows photos from their founding years, activities, and key people.
3) Recent innovations discussed include the founding of the IBA Center for C-School and the Indian Forum for Creative & Qualitative Research, as well as the inauguration of the Yoga Meditation Training Center in Alsace, France.
Information technology (IT) encompasses all forms of technology used to create, store, exchange, and use information. IT has become essential to business through automating administration, production, communication and business processes. Key advantages of IT include enabling globalization, cost-effective operations, quick communication, secure storage of information, job creation, and improving efficiency. IT infrastructure includes computer hardware, operating systems, software applications, internet platforms, data management systems, and networking and communications technologies. IT is used across many industries and sectors including manufacturing, education, services, healthcare, hospitality, and real estate.
Korekcija ekspozicije pri profilisanju digitalnih aparataMirjana Marjanović
Ispitivanje mogućnosti korigovanja ekspozicije putem kalibracije i profilisanja digitalnog aparata.
Definisanje korekcija ekspozicije koje daju vidljivi rezultat,
Termodinamika mempelajari perubahan energi dalam suatu sistem dan interaksinya dengan lingkungan. Terdiri dari sistem terbuka, tertutup, dan terisolasi. Perubahan energi (ΔE) sama dengan kalor (q) yang diserap ditambah kerja (w) yang diterima sistem. Entalpi (H) menyatakan kandungan kalor suatu zat. Reaksi dapat eksoterm atau endoterm tergantung ΔH. ΔH standar dapat dihitung dari
The document discusses security concepts in Windows Communication Foundation including authentication, authorization, message integrity, and confidentiality. It describes how WCF supports various security modes and mechanisms at the transport and message levels including common configurations for client credential types, algorithm suites, and impersonation. The key aspects of securing a WCF service are defining a security policy and configuring the appropriate bindings, behaviors, and protection levels.
MTC Global is launching an initiative to accredit teachers across all disciplines except for management teachers. The Accredited Teacher (AT-MTC Global) recognition demonstrates a teacher's proficiency and ability to provide quality education. The application process is online and involves submitting an application form, registration fee, and an interview. Successful candidates will be added to MTC Global's website database and contacted for project opportunities. Accreditation is valid for 3 years. Benefits include professional development, networking opportunities, and consulting roles. Teachers from KG to Ph.D level can apply except for management faculty who have a separate process. The assessment focuses on teaching skills, technology use, innovation, ethics, and knowledge in their specialization area.
1) The document discusses transformative innovations in management education in India, including the founding of institutions like the B.K. School of Business Management, Institute of Rural Management (IRMA), Indian Institute of Plantation Management, and Women's Institute for Studies in Development Oriented Management (WISDOM).
2) It describes the transformative ideas behind each institution and shows photos from their founding years, activities, and key people.
3) Recent innovations discussed include the founding of the IBA Center for C-School and the Indian Forum for Creative & Qualitative Research, as well as the inauguration of the Yoga Meditation Training Center in Alsace, France.
Information technology (IT) encompasses all forms of technology used to create, store, exchange, and use information. IT has become essential to business through automating administration, production, communication and business processes. Key advantages of IT include enabling globalization, cost-effective operations, quick communication, secure storage of information, job creation, and improving efficiency. IT infrastructure includes computer hardware, operating systems, software applications, internet platforms, data management systems, and networking and communications technologies. IT is used across many industries and sectors including manufacturing, education, services, healthcare, hospitality, and real estate.
Korekcija ekspozicije pri profilisanju digitalnih aparataMirjana Marjanović
Ispitivanje mogućnosti korigovanja ekspozicije putem kalibracije i profilisanja digitalnog aparata.
Definisanje korekcija ekspozicije koje daju vidljivi rezultat,
Termodinamika mempelajari perubahan energi dalam suatu sistem dan interaksinya dengan lingkungan. Terdiri dari sistem terbuka, tertutup, dan terisolasi. Perubahan energi (ΔE) sama dengan kalor (q) yang diserap ditambah kerja (w) yang diterima sistem. Entalpi (H) menyatakan kandungan kalor suatu zat. Reaksi dapat eksoterm atau endoterm tergantung ΔH. ΔH standar dapat dihitung dari
MTC Global Biography of Indian Management Educators, Volume-I, Feb 2016Prof. Bholanath Dutta
This document provides short biographies of 12 management educators in India. It includes their contact details, educational qualifications, areas of research, publications, and interests. The biographies aim to create a resource for activities like guest lectures, research collaboration, training programs, and consultancy in management education.
This document provides information about the Management Teachers Consortium, Global (MTC Global). It summarizes that MTC Global:
- Was established in 2010 as a non-profit organization and Google Group to provide a platform for knowledge sharing among management professionals;
- Has grown significantly and now has over 5,000 members from academia and corporations in 30+ countries, and indirectly connects over 40,000 professionals;
- Aims to educate, empower, and elevate the management community globally through various initiatives like research, conferences, faculty development programs, and awards that recognize excellence.
My family consists of my parents, two brothers, and me. We all live together in a house in the suburbs of Chicago. We enjoy spending time together watching movies, playing games, and going out to eat on the weekends.
GameVui.biz là một web chơi game onlien với hàng nghìn game hay nhất như game Dragon ball, game songoku, game đào vàng, game nấu ăn, game đua xe, game bắn súng, game làm bánh, game cờ tướng, game đá bóng.....Hãy ghé Gamevui.biz để chơi game vui hay nhất
Geo-Marine Technology is a geological, geophysical, and hydrographic survey consultancy that specializes in marine survey services and desktop study production for offshore construction and exploration projects. It is headed by John Rietman and Beau Pallister, who together have over 40 years of experience analyzing and interpreting geological and geophysical data. Geo-Marine Technology provides quality products and services with integrity and experience to support its clients' marine energy and telecommunications objectives.
The document describes the Certified Management Teacher (CMT) program by MTC Global. The CMT program certifies management teachers and industry professionals based on their academic achievements, teaching innovation, research excellence, consultancy, training, and contributions to society. The certification recognizes a level of proficiency and competency in providing quality management education. Applications are invited for the CMT certification, which involves an application process, fee payment, and evaluation of candidates based on focus areas like teaching skills, knowledge, and contributions to the field. Becoming a CMT offers benefits like opportunities for teaching, research, networking, and adding value to one's professional profile.
Brochure MTC Global award nomination-2014. Closes on 31.03.2014Prof. Bholanath Dutta
The document announces the MTC Global Awards, given out annually to recognize excellence in management education. It provides details on the different award categories, both with and without nomination requirements. Previous years' award winners are listed from 2011-2013. Guidelines are provided on the nomination process, evaluation criteria, and selection of award recipients by an independent jury board. Sponsorship opportunities are outlined. Contact information is given for any questions.
The document describes www.shopperquick.com, an online marketplace launched in Chennai that allows sellers across India to sell a wide range of products in various categories to customers. The marketplace provides sellers with digital storefronts, order and sales management, delivery services, and marketing support to help them succeed online. It aims to be a one-stop shop for buyers and sellers by offering various products, fulfillment services, and a growing customer base nationwide.
Лучшее из приложений для смартфонов, помогающее сэкономить на роуминге!
Едите за границу и не знаете, какого оператора выбрать? Не знаете тарифы на роуминг за рубежом и боитесь по возвращении увидеть огромный долг на балансе Вашего мобильного? Тогда приложение The Best Roaming - это именно то, что вам необходимо!
Первое мобильное приложение, благодаря которому Вы сможете путешествовать по миру и отслеживать информацию о тарифах на роуминг в разных странах! Теперь просматривать сведения о ценах на звонки, смс и Интернет стало как никогда удобно и просто! Всего за несколько кликов Вы можете сравнить тарифы операторов страны визита и определить подходящий вариант. Кроме того, мы предоставим Вам наиболее подробную информацию обо всех особенностях использования роуминга в сетях различных операторов.
Основные уникальные особенности:
- подробная информация о тарифах каждого зарубежного оператора;
- возможность сравнения тарифов всех операторов страны-пребывания и выбора наиболее выгодного из них;
- чрезвычайно удобный и понятный интерфейс;
Только продуманные путешествия с The Best Roaming!
Our success can be attributed to our state of the art infrastructure and our team of experienced professionals. We follow a standardized production process so as to maintain standard quality for every single product and provide customized solutions. We undergo quality control tests based on several parameters and take necessary quality measures.
1) The document outlines the process for creating a poster to advertise the school's X-Factor event, including researching what makes an effective poster, determining the necessary information to include, exploring design styles and software.
2) Key research steps involve interviewing the event coordinator to understand requirements, analyzing sample posters, and consulting an expert in design. This provides guidance on eye-catching colors, fonts, images and layout.
3) The poster will be designed in Microsoft Publisher to attract the whole school community to the event, with details like the date, location, and event description. Feedback will be gathered to improve the final design.
This document provides an agenda and overview for a presentation on software services, including Windows Communication Foundation (WCF) and RESTful WCF. The presentation covers topics such as WCF architecture, endpoints, bindings, contracts, hosting, metadata exchange, instance management, transfer modes, REST principles, and comparisons between SOAP and REST. Code examples are provided to illustrate key WCF concepts.
Building Services: .NET FX 3.5, SOAP, REST, and Beyond
Most developers will be aware of various Microsoft technologies to help build SOAP services, the latest of which are WCF and WF in .NET FX 3.5, but there’s another world of services outside SOAP. Recently Microsoft has been very active in its support for, and use of, REST as a mechanism for implementing services. This event will cover recent and forthcoming technologies for building services with SOAP and REST, and we’ll explain REST for the uninitiated.
Agenda:
Session 1: The SOAP Story
In this session we’ll do a lighting quick re-cap of what SOAP is, what specs surround it before looking at how far the SOAP programming model has come in Microsoft’s latest-and-greatest stack – Windows Communication Foundation (WCF) V3.5. We’ll talk about different approaches to building services and we’ll take a good look at the integration between WCF V3.5 and Windows Workflow Foundation (WF) V3.5 which opens up a whole new way of implementing services.
Session 2: Time for a REST
Web applications have evolved; using technologies like AJAX and Silverlight they have rich client-side code that wants to consume services, but they prefer JSON, “plain xml” and REST. In this session we’ll introduce REST for the uninitiated, and we’ll demonstrate some of the new and forthcoming technology that Microsoft has for working with REST: WCF 3.5, Web3S, Windows Live Data, and Codename “Astoria”.
For more details and the original slidedeck visit http://www.microsoft.com/uk/msdn/events/new/Detail.aspx?id=316
This document provides an introduction and overview of Windows Communication Foundation (WCF). It discusses what WCF is, how it differs from web services, and some of its key advantages and disadvantages. Development tools for WCF like Visual Studio are also mentioned. The document concludes by outlining some of the fundamental concepts in WCF like endpoints, bindings, contracts, and messages.
The document discusses various concepts related to Windows Communication Foundation (WCF) services such as:
1. The key differences between ASMX and WCF web services and how WCF allows for more flexible message exchange.
2. What WCF service endpoints are and how they define the address, binding, and contract for communicating with a service.
3. The possible ways of hosting a WCF service including self-hosting, IIS hosting, and Windows Service hosting.
4. Core WCF concepts like contracts, bindings, security modes, and instance management techniques.
5. Advanced topics like operation overloading, message exchange patterns, data contract serialization, and throttling.
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)Jorgen Thelin
The document discusses Windows Communication Foundation (WCF) and how it provides a unified programming model for building service-oriented applications. WCF enables development of loosely-coupled services through features like support for WS-* specifications, compatibility with existing Microsoft distributed application technologies, and integration with Visual Studio 2005. It also discusses how WCF improves productivity over previous technologies and promotes interoperability and service-orientation.
This document provides an introduction to Windows Communication Foundation (WCF). It discusses what WCF is, its architecture and fundamentals. It covers topics like hosting, tooling support, handling faults, endpoints, bindings, contracts and more. The key points are that WCF provides a runtime for building service-oriented applications, supports different programming models, and handles messaging, transactions, reliability and security behind the scenes.
This document summarizes an advanced WCF topics training module. It covers creating WCF services and clients in code, securing WCF services through various transports, bindings and authentication mechanisms, and using the Windows Azure Service Bus for connectivity and messaging between applications. The module includes demonstrations of creating services and clients in code, securing services, and using the Azure Service Bus.
The document discusses Windows Communication Foundation (WCF), Microsoft's unified programming model for building service-oriented applications. It enables developers to build secure, reliable, transacted solutions that integrate across platforms and interoperate with existing investments. Some key points discussed include:
- WCF provides a single unified solution rather than requiring different technologies for different communication styles.
- WCF is designed to interoperate well with non-WCF platforms and technologies from other vendors as well as Microsoft technologies that preceded WCF.
- A WCF service exposes methods through a well-defined XML interface, interacting only through data contracts rather than passing complete classes.
- Services and clients agree on their interface but are otherwise independent,
This document contains 26 questions and answers related to Windows Communication Foundation (WCF). It covers topics such as the differences between WCF and ASMX web services, WCF endpoints, hosting options, operation overloading, message exchange patterns, data contract serialization, security modes, instance modes, and addressing in WCF. The questions provide explanations of core WCF concepts and configuration options at an intermediate technical level.
MTC Global Biography of Indian Management Educators, Volume-I, Feb 2016Prof. Bholanath Dutta
This document provides short biographies of 12 management educators in India. It includes their contact details, educational qualifications, areas of research, publications, and interests. The biographies aim to create a resource for activities like guest lectures, research collaboration, training programs, and consultancy in management education.
This document provides information about the Management Teachers Consortium, Global (MTC Global). It summarizes that MTC Global:
- Was established in 2010 as a non-profit organization and Google Group to provide a platform for knowledge sharing among management professionals;
- Has grown significantly and now has over 5,000 members from academia and corporations in 30+ countries, and indirectly connects over 40,000 professionals;
- Aims to educate, empower, and elevate the management community globally through various initiatives like research, conferences, faculty development programs, and awards that recognize excellence.
My family consists of my parents, two brothers, and me. We all live together in a house in the suburbs of Chicago. We enjoy spending time together watching movies, playing games, and going out to eat on the weekends.
GameVui.biz là một web chơi game onlien với hàng nghìn game hay nhất như game Dragon ball, game songoku, game đào vàng, game nấu ăn, game đua xe, game bắn súng, game làm bánh, game cờ tướng, game đá bóng.....Hãy ghé Gamevui.biz để chơi game vui hay nhất
Geo-Marine Technology is a geological, geophysical, and hydrographic survey consultancy that specializes in marine survey services and desktop study production for offshore construction and exploration projects. It is headed by John Rietman and Beau Pallister, who together have over 40 years of experience analyzing and interpreting geological and geophysical data. Geo-Marine Technology provides quality products and services with integrity and experience to support its clients' marine energy and telecommunications objectives.
The document describes the Certified Management Teacher (CMT) program by MTC Global. The CMT program certifies management teachers and industry professionals based on their academic achievements, teaching innovation, research excellence, consultancy, training, and contributions to society. The certification recognizes a level of proficiency and competency in providing quality management education. Applications are invited for the CMT certification, which involves an application process, fee payment, and evaluation of candidates based on focus areas like teaching skills, knowledge, and contributions to the field. Becoming a CMT offers benefits like opportunities for teaching, research, networking, and adding value to one's professional profile.
Brochure MTC Global award nomination-2014. Closes on 31.03.2014Prof. Bholanath Dutta
The document announces the MTC Global Awards, given out annually to recognize excellence in management education. It provides details on the different award categories, both with and without nomination requirements. Previous years' award winners are listed from 2011-2013. Guidelines are provided on the nomination process, evaluation criteria, and selection of award recipients by an independent jury board. Sponsorship opportunities are outlined. Contact information is given for any questions.
The document describes www.shopperquick.com, an online marketplace launched in Chennai that allows sellers across India to sell a wide range of products in various categories to customers. The marketplace provides sellers with digital storefronts, order and sales management, delivery services, and marketing support to help them succeed online. It aims to be a one-stop shop for buyers and sellers by offering various products, fulfillment services, and a growing customer base nationwide.
Лучшее из приложений для смартфонов, помогающее сэкономить на роуминге!
Едите за границу и не знаете, какого оператора выбрать? Не знаете тарифы на роуминг за рубежом и боитесь по возвращении увидеть огромный долг на балансе Вашего мобильного? Тогда приложение The Best Roaming - это именно то, что вам необходимо!
Первое мобильное приложение, благодаря которому Вы сможете путешествовать по миру и отслеживать информацию о тарифах на роуминг в разных странах! Теперь просматривать сведения о ценах на звонки, смс и Интернет стало как никогда удобно и просто! Всего за несколько кликов Вы можете сравнить тарифы операторов страны визита и определить подходящий вариант. Кроме того, мы предоставим Вам наиболее подробную информацию обо всех особенностях использования роуминга в сетях различных операторов.
Основные уникальные особенности:
- подробная информация о тарифах каждого зарубежного оператора;
- возможность сравнения тарифов всех операторов страны-пребывания и выбора наиболее выгодного из них;
- чрезвычайно удобный и понятный интерфейс;
Только продуманные путешествия с The Best Roaming!
Our success can be attributed to our state of the art infrastructure and our team of experienced professionals. We follow a standardized production process so as to maintain standard quality for every single product and provide customized solutions. We undergo quality control tests based on several parameters and take necessary quality measures.
1) The document outlines the process for creating a poster to advertise the school's X-Factor event, including researching what makes an effective poster, determining the necessary information to include, exploring design styles and software.
2) Key research steps involve interviewing the event coordinator to understand requirements, analyzing sample posters, and consulting an expert in design. This provides guidance on eye-catching colors, fonts, images and layout.
3) The poster will be designed in Microsoft Publisher to attract the whole school community to the event, with details like the date, location, and event description. Feedback will be gathered to improve the final design.
This document provides an agenda and overview for a presentation on software services, including Windows Communication Foundation (WCF) and RESTful WCF. The presentation covers topics such as WCF architecture, endpoints, bindings, contracts, hosting, metadata exchange, instance management, transfer modes, REST principles, and comparisons between SOAP and REST. Code examples are provided to illustrate key WCF concepts.
Building Services: .NET FX 3.5, SOAP, REST, and Beyond
Most developers will be aware of various Microsoft technologies to help build SOAP services, the latest of which are WCF and WF in .NET FX 3.5, but there’s another world of services outside SOAP. Recently Microsoft has been very active in its support for, and use of, REST as a mechanism for implementing services. This event will cover recent and forthcoming technologies for building services with SOAP and REST, and we’ll explain REST for the uninitiated.
Agenda:
Session 1: The SOAP Story
In this session we’ll do a lighting quick re-cap of what SOAP is, what specs surround it before looking at how far the SOAP programming model has come in Microsoft’s latest-and-greatest stack – Windows Communication Foundation (WCF) V3.5. We’ll talk about different approaches to building services and we’ll take a good look at the integration between WCF V3.5 and Windows Workflow Foundation (WF) V3.5 which opens up a whole new way of implementing services.
Session 2: Time for a REST
Web applications have evolved; using technologies like AJAX and Silverlight they have rich client-side code that wants to consume services, but they prefer JSON, “plain xml” and REST. In this session we’ll introduce REST for the uninitiated, and we’ll demonstrate some of the new and forthcoming technology that Microsoft has for working with REST: WCF 3.5, Web3S, Windows Live Data, and Codename “Astoria”.
For more details and the original slidedeck visit http://www.microsoft.com/uk/msdn/events/new/Detail.aspx?id=316
This document provides an introduction and overview of Windows Communication Foundation (WCF). It discusses what WCF is, how it differs from web services, and some of its key advantages and disadvantages. Development tools for WCF like Visual Studio are also mentioned. The document concludes by outlining some of the fundamental concepts in WCF like endpoints, bindings, contracts, and messages.
The document discusses various concepts related to Windows Communication Foundation (WCF) services such as:
1. The key differences between ASMX and WCF web services and how WCF allows for more flexible message exchange.
2. What WCF service endpoints are and how they define the address, binding, and contract for communicating with a service.
3. The possible ways of hosting a WCF service including self-hosting, IIS hosting, and Windows Service hosting.
4. Core WCF concepts like contracts, bindings, security modes, and instance management techniques.
5. Advanced topics like operation overloading, message exchange patterns, data contract serialization, and throttling.
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)Jorgen Thelin
The document discusses Windows Communication Foundation (WCF) and how it provides a unified programming model for building service-oriented applications. WCF enables development of loosely-coupled services through features like support for WS-* specifications, compatibility with existing Microsoft distributed application technologies, and integration with Visual Studio 2005. It also discusses how WCF improves productivity over previous technologies and promotes interoperability and service-orientation.
This document provides an introduction to Windows Communication Foundation (WCF). It discusses what WCF is, its architecture and fundamentals. It covers topics like hosting, tooling support, handling faults, endpoints, bindings, contracts and more. The key points are that WCF provides a runtime for building service-oriented applications, supports different programming models, and handles messaging, transactions, reliability and security behind the scenes.
This document summarizes an advanced WCF topics training module. It covers creating WCF services and clients in code, securing WCF services through various transports, bindings and authentication mechanisms, and using the Windows Azure Service Bus for connectivity and messaging between applications. The module includes demonstrations of creating services and clients in code, securing services, and using the Azure Service Bus.
The document discusses Windows Communication Foundation (WCF), Microsoft's unified programming model for building service-oriented applications. It enables developers to build secure, reliable, transacted solutions that integrate across platforms and interoperate with existing investments. Some key points discussed include:
- WCF provides a single unified solution rather than requiring different technologies for different communication styles.
- WCF is designed to interoperate well with non-WCF platforms and technologies from other vendors as well as Microsoft technologies that preceded WCF.
- A WCF service exposes methods through a well-defined XML interface, interacting only through data contracts rather than passing complete classes.
- Services and clients agree on their interface but are otherwise independent,
This document contains 26 questions and answers related to Windows Communication Foundation (WCF). It covers topics such as the differences between WCF and ASMX web services, WCF endpoints, hosting options, operation overloading, message exchange patterns, data contract serialization, security modes, instance modes, and addressing in WCF. The questions provide explanations of core WCF concepts and configuration options at an intermediate technical level.
Interoperability and Windows Communication Foundation (WCF) OverviewJorgen Thelin
The document discusses interoperability and Microsoft's commitment to it. It defines interoperability as the ability of diverse systems to connect and exchange information. Microsoft supports interoperability through its implementations of WS-* specifications in Windows Communication Foundation and by participating in standards bodies. Profiles help constrain specifications to promote out-of-the-box interoperability across industries and systems.
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGEEditor IJCTER
This document summarizes the implementation of a private cloud server for data storage without internet connectivity. The private cloud server provides software and services to clients, centralized data storage, and a private mailing system. It describes configuring the private cloud server in Microsoft Windows Server 2012, including enabling firewall rules, configuring the Hyper-V Replica Broker, and creating a self-signed certificate. The implementation allows clients to remotely access applications, operating systems, and data from any location without an internet connection. It analyzes the results, showing clients can now use both 32-bit and 64-bit applications and install operating systems remotely from the private cloud server.
This document summarizes key points from a lecture on service layers, WCF, business logic security, and regular expressions. It discusses design patterns in service layers like remote facade, data transfer object, adapter, and proxy patterns. It provides an overview of WCF including addresses, bindings, and contracts. It also covers business logic security concepts like user-based authorization and code-based authentication/authorization in .NET. Finally, it defines regular expressions and their common uses in formatting, validating, and parsing text.
introduction to Windows Comunication Foundationredaxe12
The document discusses Windows Communication Foundation (WCF) and provides an overview of its key capabilities. WCF unifies distributed application development on Windows, allows interoperability with other platforms, and maximizes developer productivity. It brings together existing Microsoft distributed technologies and supports WS-* web services standards.
WCF Basics and Security overview
WCF Overview. WCF security model. Attacks and countermeasures. (If Time Permits)
WCF exposes endpoints for clients and services to exchange messages. WCF uses addresses, bindings and contracts (ABC model). Bindings specify protocols, encodings and security. The security model includes transfer security modes (none, transport, message, mixed, both) and credentials (Windows, username/password, certificates, tokens). Common attacks include information disclosure, elevation of privilege, denial of service, and tampering. Countermeasures include configuration, authorization and message inspection.
Net framework key components - By Senthil Chinnakondatalenttransform
This document provides information on the history and key components of the .NET Framework as well as new features introduced in version 4.5. It began with version 1.0 in 2002 and the latest version is 4.5.2. The .NET Framework includes the Common Language Runtime (CLR) which manages code execution, the Common Type System (CTS) which defines supported data types, and garbage collection for automatic memory management. Version 4.5 introduced improvements such as larger array support, background garbage collection, and regular expression matching timeouts. The document also summarizes WCF concepts like contracts and bindings and describes transport, message, and transport with message credential security options.
A detailed overview presentation on Java EE Connector Architecture 1.6 (JSR 322) Technology that was released recently as part of Java EE 6.
See http://blogs.sun.com/sivakumart/entry/java_ee_connector_architecture_1 for the announcement and http://jcp.org/en/jsr/detail?id=322 for the JSR.
This presentation was originally delivered in JavaOne 2009, San Francisco and has detailed presentation notes.
Building an enterprise app in silverlight 4 and NHibernatebwullems
This document discusses building an enterprise application using Silverlight, NHibernate, and following CQRS and MVVM patterns. It recommends using OData to implement the query model in CQRS and NHibernate for the domain model. It then covers implementing the front-end using MVVM principles in Silverlight, including using view models, commands, and an event aggregator for communication between view models. Demo code is provided for various aspects like OData queries, NHibernate usage, implementing a base view model, locator pattern, MEF, and unit testing view models.
Windows Communication Foundation (WCF) is a Microsoft programming platform and runtime system for building and deploying distributed services. It provides a common platform for all .NET communication and unifies features of previous Microsoft technologies like web services, remoting, and messaging. WCF allows services to expose endpoints that can be accessed over various transports using different bindings and protocols to provide flexibility, reliability, security, and other functionality through configuration. Key concepts in WCF include endpoints, bindings, behaviors, contracts, and the service host.
4. What is WCF?
Stands for Windows Communication Foundation
One of the 4 pillars of .NET 3.0
Microsoft’s unified programming model (the service model)
for building Service-Oriented Applications
5. Windows Communication Foundation
WCF provides:
- an SDK for creating SOA
- a runtime for running Services on Windows
Services send and receive messages
All messages are SOAP messages
WCF takes care of all the plumbing
Slide 4
6. Why use WCF?
Interoperable and Standards based
- Supports WS-* protocols
Unified Programming Model
- Unifies previous models like .NET Remoting, ASMX web services, COM+
etc
Productive Programming Model
- Declarative
- Imperative
- Configuration based
Slide 5
7. WCF: How does it work?
SOAP (Simple Object Access Protocol) - is a protocol specification for
exchanging structured information in the implementation of Web Services
XML
9. WCF Endpoints
Every service has
Address
- Where the service is
Binding
- How to talk to the service
Contract
- What the service can do
Slide 8
11. Address
Combination of transport, server name, port & path
Transport is determined by the binding
Examples
http://localhost:8001
https://localhost:8001
net.tcp://localhost:8002/MyService
net.msmq://localhost/MyService
Slide 10
12. Bindings
Transport
- HTTP/S
- TCP
- MSMQ
Message formats and encoding
- Plain text
- Binary
- Message Transmission Optimization Mechanism (MTOM)
Communication security
- No security
- Transport security
- Message security
- Authenticating and authorizing callers
Slide 11
14. Contracts
Service contracts
- Defines operations, communications and behaviors.
Data contracts
- Defines data entities and parameter types.
Fault contracts
- Defines error types
Message contracts
- Defines message formats
Slide 13
15. Service Contracts
[ServiceContract] – Defines a ‘set’ of operations
[OperationContract] – Defines a single method
Slide 14
[ServiceContract]
public interface IService
{
[OperationContract]
string GetData(int value);
}
public class ConcreteService : IService
{
public string GetData(int value)
{ ... }
public string OtherMethod()
{ ... }
}
16. Data Contracts
[DataContract] – Specifies type as a data contract
[DataMember] – Members that are part of contract
Slide 15
[DataContract]
public class CustomType
{
[DataMember]
public bool MyFlag { get; set; }
[DataMember]
public string MyString { get; set; }
}
17. Hosting
IIS
- HTTP only
- Process recycling, failover protection, common config
WAS (Windows Activation Service)
- Can use any transport
- Vista and Windows Server 2008 only
Self hosting
- Can use any transport
- Can be hosted within Console, WinForms, etc Applications
Windows Service
- Can use any transport
Slide 16
19. WCF Security
WCF Security Provides:
Authentication – Identifying the message sender
Integrity – Signed msgs to ensure not altered
Confidentiality – Encryption
Authorization – Determines functionality entitled to execute
Your binding selection will influence the available configuration
options for the service security policy.
18
20. WCF Security
Programming WCF security is based on three steps setting the
following:
- the security mode
- a client credential type
- the credential values.
19
21. WCF Binding Comparison
20
Binding Security
Default
Transport
Protocol
Encoding
Default
Host
basicHttpBinding None,
Transport, Message,
Mixed
HTTP Text/XML, MTOM IIS, WAS
wsHttpBinding Message, Transport,
Mixed
HTTP Text/XML, MTOM IIS, WAS
netTcpBinding Transport, Message,
Mixed
TCP Binary WAS
netNamedPipeBin
ding
Transport, None Named Pipe Binary WAS
netMsmqBinding Message, Transport,
None
TCP Binary WAS
netPeerTcpBinding Transport P2P Binary -
23. Setting the Binding
1. Select one of the predefined bindings appropriate to your application
requirements.
By default, nearly every binding has security enabled.
The binding you select determines the transport. For
example, WSHttpBinding uses HTTP as the
transport; NetTcpBinding uses TCP.
<system.serviceModel>
<services>
<service name=“LunchLearn.TestService" >
<endpoint contract="LunchLearn.ITestService“ binding="wsHttpBinding"/>
</service>
</services>
</system.serviceModel>
22
24. Setting the Security Mode
2. Select one of the security modes for the binding. Note that the binding
you select determines the available mode choices
You have three choices:
Transport
Message
TransportWithMessageCredential
<wsHttpBinding>
<binding name="wsHttp">
<security mode="Message">
<message clientCredentialType="UserName" />
</security>
</binding>
</wsHttpBinding>
23
25. Transport
Transport security depends on the mechanism that the binding you've
selected uses. For example, if you are using WSHttpBinding then the
security mechanism is Secure Sockets Layer (SSL)
Pro: Generally speaking, good throughput no matter which transport
you are using.
Con: Security is implemented in a hop-by-hop manner rather than end-
to-end.
If you decide to use transport security for HTTP (in other words,
HTTPS), you must also configure the host with an SSL certificate and
enable SSL on a port.
24
26. Message
Each message is encrypted
Pros:
End to End Security
Because the composition of the headers varies, you can include any
number of credentials for interoperability
Con:
Little bit of overhead, encrypting each message.
25
27. Setting the Client Credential Type
The choice of client credential type depends on the security
mode in place. For transport security you can require a
Windows credential or certificate
Message security supports any of the following settings
for clientCredentialType:
None
Windows
UserName
Certificate
IssuedToken
26
28. Setting the Client Credential Type
This code snippet illustrates how to select
a clientCredentialType for message security.
<wsHttpBinding>
<binding name="wsHttp">
<security mode="Message">
<message clientCredentialType=“Windows"
algorithmSuite="TripleDes" />
</security>
</binding>
</wsHttpBinding>
27
29. Role-Based Authorization
The identity of the caller is attached to the executing request thread in the form of a
security principal, accessible through the CurrentPrincipal property.
System.Threading.Thread.CurrentPrincipal
Implements System.Security.Principal.Iprincipal
This interface has two members:
A read-only Identity property that returns a reference to the IIdentity for the request.
When IsInRole() is invoked, it uses the configured RoleProvider to check if this
identity is in the specified role.
28
30. Role-Based Authorization
Using the PrincipalPermission Object
Is the user authenticated?
Is the user in a particular role?
Is a particular user calling?
[PrincipalPermission (SecurityAction.Demand, Role = "Administrators")]
public string AdminsOnly() {
// protected code
}
public string AdminsOnly() {
// unprotected code
PrincipalPermission p = new PrincipalPermission(null, "Administrators");
p.Demand();
// protected code
}
29
31. Claims-Based Identity Model
The identity model in WCF supports a rich, claims-based approach to
authorization. Can add a welcome layer of granularity.
Claims can be proof of possession of information such as an e-mail
address, birth date, or first and last name.
Custom claims can be created to indicate the ability to access specific
business entities or their storage location.
30
32. Claims-Based Identity Model
ServiceSecurityContext security = OperationContext.Current.ServiceSecurityContext;
string user = security.PrimaryIdentity.Name;
string email = null;
IEnumerable<Claim> claims = security.AuthorizationContext.ClaimSets[0].FindClaims(
ClaimTypes.Email,Rights.PossessProperty);
foreach (Claim c in claims) {
email = c.Resource as string;
}
if (string.IsNullOrEmpty(user) || email == null) throw new SecurityException(
"Unauthorized access. Email claim not found.");
31
34. Impersonation
When Windows credentials are used, the service can be configured to
impersonate callers so that the request thread operates under the
impersonated Windows token.
[OperationBehavior(Impersonation = ImpersonationOption.Allowed)]
public string DoSomething() { ... }
ImpersonationOption.NotAllowed. The caller will not be impersonated.
ImpersonationOption.Allowed. The caller will be impersonated if a Windows
credential is provided.
ImpersonationOption.Required. The caller will be impersonated and a Windows
credential must be provided to support this.
33
35. Impersonation
You can also set this for all operations by declaratively
<behaviors>
<serviceBehaviors>
<behavior name="serviceBehavior">
<serviceAuthorization
impersonateCallerForAllOperations=“true"/>
</behavior>
</serviceBehaviors>
</behaviors>
34
36. Summary
Which binding to use:
WSHttpBinding – Default security for message encryption
BasicHttpBinding
NetMsmqBinding