If you ever had to deal with identity within your solutions then this is the session for you. Join JP and Christos to find out how to implement authentication and authorization for your mobile apps and back-end services using the Microsoft Identity platform. We will show you how to use our libraries to quickly connect to our platform and authenticate your users in a few, basic steps. Get ready for demos and examples the highlight how the Microsoft Identity Platform allows you to create scalable and secure applications.
"Dynamic configuration in .NET", Serhii ButaFwdays
In this presentation, you will learn how to change the configuration of your programs in runtime — without deployment or restart.
First, I will talk about the internal structure and primary components of IConfiguration, and then focus on the practical aspects of working with the configuration service:
- how to adapt the program to work with a dynamic configuration;
connection of configuration providers in the Azure ecosystem: Key Vault and Azure App Configuration;
Connect a push-based configuration update model.
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 2Vinu Gunasekaran
This document summarizes a webinar about integrating Azure Active Directory B2C (AAD B2C) with applications using the Microsoft Authentication Libraries (MSAL). It discusses how MSAL can be used to acquire tokens to call protected APIs and validate tokens in web APIs and applications. It provides an overview of using MSAL in .NET Core web apps to sign users in with AAD B2C, redeem authorization codes to acquire tokens, and implement token caching for silent authentication. The document demonstrates how to build a .NET Core web app that signs users in with AAD B2C using MSAL.
Microsoft Azure IoT 手把手實作 @ K.NET by Maduka (2017-8-12)Jeff Chu
A hands-on lab exercise for Microsoft Azure IoT, help students to learn how to use IoT hub, SQL Database, Stream Analytics services to build their IoT solution.
apidays LIVE Australia 2021 - API Horror Stories from an Unnamed Coworking Co...apidays
apidays LIVE Australia 2021 - Accelerating Digital
September 15 & 16, 2021
API Horror Stories from an Unnamed Coworking Company
Phil Sturgeon, DevRel at Stoplight
Azure AD & Azure AD B2C provide identity and access management services. Azure AD is primarily for enterprise use, allowing single sign-on for Office 365, Azure, and other cloud services. It offers features like multi-factor authentication, application access control, and on-premises Active Directory synchronization. Azure AD B2C is designed more for consumer-facing apps and allows fully customizable login experiences and identity providers like social accounts and local usernames. Both services provide user management and authentication capabilities for applications.
Kasten securing access to your kubernetes applicationsLibbySchulze
The document discusses securing access to Kubernetes applications using Dex for authentication and RBAC for authorization. It provides an overview of Dex and how it can be used to authenticate users against an existing identity provider like Active Directory. It then covers Kubernetes RBAC and how it can be used to define roles and role bindings to control authorization and grant varying levels of access to different user types like cluster administrators. It includes examples of defining roles, role bindings, and checking user access using kubectl auth can-i.
70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONSDotNetCampus
Visto il successo dello scorso anno, anche quest’anno il DotNetCampus ospita un Cert Path dedicato a chi vuole avvicinarsi al mondo delle certificazioni di prodotto e di tecnologia Microsoft. Microsoft, così come altre importanti aziende sul mercato, propone diversi percorsi di certificazione che ognuno può intraprendere, anche in autonomia, per guadagnare competenza e ottenere un riconoscimento. Una certificazione è generalmente un titolo che si ottiene dopo uno o più esami conseguiti con successo in un centro di formazione abilitato. Nel Cert Path vogliamo spiegarvi come affrontare alcuni esami di base per ottenere il titolo di MCP (Microsoft Certified Professional).
[API World 2021 ] - Understanding Cloud Native DeploymentWSO2
Microservices and APIs built for digital transformation products require agile, reliable, and scalable cloud native infrastructure to truly meet customer expectations for a great "always there" user experience. Whether deployed on-premises or hosted in a public cloud, understanding and leveraging the right approach is key to success. This session takes up where the development process leaves off, tracking the standardization of containers and container orchestration for automated deployment, including current and future platform trends WSO2 and others are following.
"Dynamic configuration in .NET", Serhii ButaFwdays
In this presentation, you will learn how to change the configuration of your programs in runtime — without deployment or restart.
First, I will talk about the internal structure and primary components of IConfiguration, and then focus on the practical aspects of working with the configuration service:
- how to adapt the program to work with a dynamic configuration;
connection of configuration providers in the Azure ecosystem: Key Vault and Azure App Configuration;
Connect a push-based configuration update model.
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 2Vinu Gunasekaran
This document summarizes a webinar about integrating Azure Active Directory B2C (AAD B2C) with applications using the Microsoft Authentication Libraries (MSAL). It discusses how MSAL can be used to acquire tokens to call protected APIs and validate tokens in web APIs and applications. It provides an overview of using MSAL in .NET Core web apps to sign users in with AAD B2C, redeem authorization codes to acquire tokens, and implement token caching for silent authentication. The document demonstrates how to build a .NET Core web app that signs users in with AAD B2C using MSAL.
Microsoft Azure IoT 手把手實作 @ K.NET by Maduka (2017-8-12)Jeff Chu
A hands-on lab exercise for Microsoft Azure IoT, help students to learn how to use IoT hub, SQL Database, Stream Analytics services to build their IoT solution.
apidays LIVE Australia 2021 - API Horror Stories from an Unnamed Coworking Co...apidays
apidays LIVE Australia 2021 - Accelerating Digital
September 15 & 16, 2021
API Horror Stories from an Unnamed Coworking Company
Phil Sturgeon, DevRel at Stoplight
Azure AD & Azure AD B2C provide identity and access management services. Azure AD is primarily for enterprise use, allowing single sign-on for Office 365, Azure, and other cloud services. It offers features like multi-factor authentication, application access control, and on-premises Active Directory synchronization. Azure AD B2C is designed more for consumer-facing apps and allows fully customizable login experiences and identity providers like social accounts and local usernames. Both services provide user management and authentication capabilities for applications.
Kasten securing access to your kubernetes applicationsLibbySchulze
The document discusses securing access to Kubernetes applications using Dex for authentication and RBAC for authorization. It provides an overview of Dex and how it can be used to authenticate users against an existing identity provider like Active Directory. It then covers Kubernetes RBAC and how it can be used to define roles and role bindings to control authorization and grant varying levels of access to different user types like cluster administrators. It includes examples of defining roles, role bindings, and checking user access using kubectl auth can-i.
70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONSDotNetCampus
Visto il successo dello scorso anno, anche quest’anno il DotNetCampus ospita un Cert Path dedicato a chi vuole avvicinarsi al mondo delle certificazioni di prodotto e di tecnologia Microsoft. Microsoft, così come altre importanti aziende sul mercato, propone diversi percorsi di certificazione che ognuno può intraprendere, anche in autonomia, per guadagnare competenza e ottenere un riconoscimento. Una certificazione è generalmente un titolo che si ottiene dopo uno o più esami conseguiti con successo in un centro di formazione abilitato. Nel Cert Path vogliamo spiegarvi come affrontare alcuni esami di base per ottenere il titolo di MCP (Microsoft Certified Professional).
[API World 2021 ] - Understanding Cloud Native DeploymentWSO2
Microservices and APIs built for digital transformation products require agile, reliable, and scalable cloud native infrastructure to truly meet customer expectations for a great "always there" user experience. Whether deployed on-premises or hosted in a public cloud, understanding and leveraging the right approach is key to success. This session takes up where the development process leaves off, tracking the standardization of containers and container orchestration for automated deployment, including current and future platform trends WSO2 and others are following.
Building a document e-signing workflow with Azure Durable FunctionsJoonas Westlin
Durable functions offer an interesting programming model for building workflows. Whether you need to sometimes split and do multiple things or wait for user input, a lot of things are possible. They do present some challenges as well, and the limitations of orchestrator functions can make working with Durable seem very complicated.
In this talk we will go through the basics of Durable Functions along with strategies for deploying and monitoring them. A sample application will be presented where users can send documents for electronic signature. A Durable Functions workflow will power the signing process.
Unity and Microsoft Azure Cognitive Services - DIGITREK21 WorkshopPablo Farías Navarro
With recent innovations in technology, AI has left the realms of science fiction and is becoming increasingly mainstream. Whether you’re interested in building games or apps, a sound understanding of the practical applications of AI will give you the edge needed to stand out from the crowd and will set you up for success.
Through this workshop, you’ll gain hands-on experience in adding AI elements into games and apps built with Unity. Using Microsoft Cognitive Services, a cloud-based AI platform, you’ll get exposure to AI features including computer vision and language recognition.
Assets and starting files will be provided for you to work with during the practical components of this 2-hour workshop. This workshop will be taught by Pablo Farias Navarro, founder of Zenva - a leading education platform to learn coding and game making. Since 2012, Pablo has been developing professional-grade courses that have helped over 1 million learners worldwide.
It happens that we have to develop several services and deploy them in Azure. They are small, repetitive but different, often not very different. Why not use code generation techniques to simplify the development and implementation of these services? Let's see with .NET comes to meet us and helps us to deploy in Azure.
This document provides an introduction and overview of PHP frameworks and the CodeIgniter framework. It discusses what frameworks are and their advantages, including efficiency, security, cost savings, and community support. The document then introduces CodeIgniter, explaining why it is a good choice, its features like MVC structure and clean URLs, and comparing it to other frameworks. It concludes with information on setting up and configuring CodeIgniter.
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 1Vinu Gunasekaran
This document discusses an Azure AD B2C webinar series on identity protocols like OAuth 2.0 and OpenID Connect. It explains how Azure AD B2C can be used to authenticate users to access multiple applications and protected resources through protocols that involve issuing JSON Web Tokens. It also mentions Microsoft authentication libraries that can be used by applications and APIs to validate access tokens and ID tokens in different platforms and languages.
Azure AD B2C Webinar Series: Custom Policies Part 1Vinu Gunasekaran
Agenda:
Introducing Custom Policies in Azure AD B2C
Custom Policy Components
Relying Party and User Journeys
Claims Definitions
Technical Profiles
Getting Started with Azure AD B2C Custom Policies
This document provides an overview of the CodeIgniter PHP framework. It discusses what a framework is and describes CodeIgniter's MVC architecture. The Model-View-Controller pattern separates application logic from presentation. CodeIgniter offers features like form validation, security filtering, and database classes. It is lightweight, fast, extensible and well documented. Basic installation involves downloading CodeIgniter files and configuring them on a local server. The document also lists modules for a sample "News Blog" project built with CodeIgniter.
The document discusses the Onion Architecture, an architectural pattern that aims to put business logic at the core of applications and reduce dependencies between layers. It describes problems with traditional 3-layer architectures where business logic can become scattered and dependent on specific technologies. The Onion Architecture inverts dependencies so that inner layers do not depend on outer layers, making the business logic portable and easier to maintain over time. Guiding principles are to use dependency inversion and push technology dependencies outward from the core business logic.
How AI is creating what's next in governmentTina Meek
Presentation from the Microsoft Azure Government user community meetup on April 24, 2019 featuring government and industry AI experts in an engaging panel discussion along with demos of innovative AI solutions. See the video replay at aka.ms/azuregovmeetupchannel.
To join and learn more about one of the largest government cloud user communities in the DC-metro region, visit www.meetup.com/DCAzureGov. The Azure Government DC user community hosts regular in-person and livestream events on cloud innovation for US government.
The document is a CV for Pragatheswarakumar K. It summarizes his professional experience including over 5 years of experience in software development using Java and related frameworks. It lists his skills in areas like Spring, AngularJS, RabbitMQ, Android development, and his past roles including senior software engineer roles at SecureW2 India Pvt Ltd and Cluster Wireless Software India Pvt Ltd developing microservices, web applications, and middleware. It also provides his educational qualifications and hobbies.
One ASP.NET provides a unified framework for building web applications using Web Forms, MVC, Web API, and SignalR. It features continuous innovation with new releases every 6 months. Developers can use any ASP.NET technology and add frameworks to projects freely. New features include improved scaffolding, Bootstrap integration, ASP.NET Identity, HTML editing and more. Web API 2 and SignalR 2.0 are decoupled from servers using OWIN. Web API supports attribute routing, CORS, and integrates with OData. Azure provides sandbox environments for application development and testing in the cloud.
Zero Credential Development with Managed Identities for Azure resourcesJoonas Westlin
Introduction to Managed Identities in Azure, what they are and how they work. Also goes through what services they can be used with in Azure, how you can use services without any keys or secrets.
Zero Credential Development with Managed IdentitiesJoonas Westlin
Keys are always needed to access services in Azure and beyond. Storing and managing keys presents many problems, for example rotating and disabling them. Keys often also allow blanket access to the service with no way to limit it. Sometimes there is only one key that needs to be shared by services, so you won't have any way to disable access from one individually. In this talk we will go through Managed Identities for Azure Resources, how they work, and how you can use them to use Azure services in a secure way without having to manage any keys yourself. We will go through a demo application which uses various Azure services through a managed identity, removing the need to use keys entirely. The source code will be available to the audience so they have samples that they can use to implement managed identities in their own applications.
Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017Eran Stiller
The slide deck for my session at TechBash 2017 on "Building an IoT Massive Multiplayer Game in 60 Minutes".
Sample code can be found at https://github.com/estiller/iot-game
Presentation web based application|Web designing training center in coimbator...Vignesh026
Web 2.0 is the term given to describe a second generation of the World Wide Web that is focused on the ability for people to collaborate and share information online. Web 2.0 basically refers to the transition from static HTML Web pages to a more dynamic Web that is more organized and is based on serving Web applications to users. Other improved functionality of Web 2.0 includes open communication with an emphasis on Web-based communities of users, and more open sharing of information. Over time Web 2.0 has been used more as a marketing term than a computer-science-based term. Blogs, wikis, and Web services are all seen as components of Web 2.0.
Tim O'Reilly is generally credited with inventing the term, following a conference dealing with next-generation Web concepts and issues held by O'Reilly Media and Media Live International in 2004. O'Reilly Media has subsequently been energetic about trying to copyright "Web 2.0" and holds an annual conference of the same name. There is, however, some dispute about whether O'Reilly is responsible for the original coinage. Joe Firmage, for instance, used Web 2.0 to describe using the World Wide Web as a platform in 2003.
One of the most significant differences between Web 2.0 and the traditional World Wide Web (retroactively referred to as Web 1.0) is greater collaboration among Internet users and other users, content providers, and enterprises.
Originally, data was posted on Web sites, and users simply viewed or downloaded the content. Increasingly, users have more input into the nature and scope of Web content and in some cases exert real-time control over it. For example, multiple-vendor online book outlets such as BookFinder4U make it possible for users to upload book reviews as well as find rare and out-of-print books at a minimum price, and dynamic encyclopedias such allow users to create and edit the content of a worldwide information database in multiple languages. Internet forums have become more extensive and led to the proliferation of blogging. The dissemination of news evolved into RSS.
Contact: VIGNESH K S
C.No: 9688477218, 0422-4206205, 9944200078, 8754466134.
#108 Nehru Street, Ram Nagar, Gandhipuram, Coimbatore.
Web: www.cegonsoft.co.in
Empower every Azure Function to achieve more!!Massimo Bonanni
This document contains information from a presentation on Azure Functions including:
- An overview of Azure Functions and their pay-per-use model with instant scalability.
- Details on the anatomy of a function including triggers, bindings, and their associated classes.
- Explanations of the startup and runtime phases of functions and how triggers and bindings are configured.
- Recommendations to write efficient functions that avoid unnecessary resource usage.
- Links provided for additional documentation, code samples, and the speaker's contact information.
Sessione tenuta a CodeGen 2021 il 13/02/2021
Serverless è una architettura basata sugli eventi e quali migliori scenari se non quelli IoT sono fondati sugli eventi? Migliaia di device che inviano telemetrie alla nostra soluzione e che dobbiamo gestire. In questa sessione vedremo un semplice approccio a scenari di questo genere che utilizza le Durable Entities per gestire la logica associata ai device del nostro sistema. Un esempio pratico per capire pregi e difetti delle Durable Entities che possono essere utili in moltissimi scenari in cui gestire eventi è essenziale.
Matt Davy
Chief Network Architect & Executive Director
InCNTRE
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
Introduction to the Microsoft identity platform for developersChristos Matskas
This deck gives you a quick tour of some of the important features in the Microsoft Identity Platform including Azure AD and B2C. We cover the why and the how to get started with the Microsoft identity platform to securely authenticate and authorize users in your apps - any platform, any language, any cloud.
พบกับเซสชั่น "Microsoft Graph for Microsoft 365 and Power Platform" ในงาน Microsoft 365 Developer Bootcamp
- แนะนำ Microsoft Graph
- เรียนรู้การเรียกใช้งาน REST API เพื่อเข้าถึงข้อมูลบนบริการต่าง ๆ ของ Microsoft 365
โดยคุณแชมป์ Narisorn Limpaswadpaisarn (Microsoft Certified Trainer)
Azure Active Directory - An Introduction for DevelopersJohn Garland
This document provides an overview of consulting and training services from Wintellect related to Azure Active Directory. It describes that Wintellect offers both consulting services to help build software as well as on-site, virtual and on-demand training courses taught by Microsoft experts. The document includes an agenda for an introduction to Azure Active Directory for developers that will cover topics like adding authentication to an ASP.NET MVC app and calling secured APIs from various client applications.
Building a document e-signing workflow with Azure Durable FunctionsJoonas Westlin
Durable functions offer an interesting programming model for building workflows. Whether you need to sometimes split and do multiple things or wait for user input, a lot of things are possible. They do present some challenges as well, and the limitations of orchestrator functions can make working with Durable seem very complicated.
In this talk we will go through the basics of Durable Functions along with strategies for deploying and monitoring them. A sample application will be presented where users can send documents for electronic signature. A Durable Functions workflow will power the signing process.
Unity and Microsoft Azure Cognitive Services - DIGITREK21 WorkshopPablo Farías Navarro
With recent innovations in technology, AI has left the realms of science fiction and is becoming increasingly mainstream. Whether you’re interested in building games or apps, a sound understanding of the practical applications of AI will give you the edge needed to stand out from the crowd and will set you up for success.
Through this workshop, you’ll gain hands-on experience in adding AI elements into games and apps built with Unity. Using Microsoft Cognitive Services, a cloud-based AI platform, you’ll get exposure to AI features including computer vision and language recognition.
Assets and starting files will be provided for you to work with during the practical components of this 2-hour workshop. This workshop will be taught by Pablo Farias Navarro, founder of Zenva - a leading education platform to learn coding and game making. Since 2012, Pablo has been developing professional-grade courses that have helped over 1 million learners worldwide.
It happens that we have to develop several services and deploy them in Azure. They are small, repetitive but different, often not very different. Why not use code generation techniques to simplify the development and implementation of these services? Let's see with .NET comes to meet us and helps us to deploy in Azure.
This document provides an introduction and overview of PHP frameworks and the CodeIgniter framework. It discusses what frameworks are and their advantages, including efficiency, security, cost savings, and community support. The document then introduces CodeIgniter, explaining why it is a good choice, its features like MVC structure and clean URLs, and comparing it to other frameworks. It concludes with information on setting up and configuring CodeIgniter.
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 1Vinu Gunasekaran
This document discusses an Azure AD B2C webinar series on identity protocols like OAuth 2.0 and OpenID Connect. It explains how Azure AD B2C can be used to authenticate users to access multiple applications and protected resources through protocols that involve issuing JSON Web Tokens. It also mentions Microsoft authentication libraries that can be used by applications and APIs to validate access tokens and ID tokens in different platforms and languages.
Azure AD B2C Webinar Series: Custom Policies Part 1Vinu Gunasekaran
Agenda:
Introducing Custom Policies in Azure AD B2C
Custom Policy Components
Relying Party and User Journeys
Claims Definitions
Technical Profiles
Getting Started with Azure AD B2C Custom Policies
This document provides an overview of the CodeIgniter PHP framework. It discusses what a framework is and describes CodeIgniter's MVC architecture. The Model-View-Controller pattern separates application logic from presentation. CodeIgniter offers features like form validation, security filtering, and database classes. It is lightweight, fast, extensible and well documented. Basic installation involves downloading CodeIgniter files and configuring them on a local server. The document also lists modules for a sample "News Blog" project built with CodeIgniter.
The document discusses the Onion Architecture, an architectural pattern that aims to put business logic at the core of applications and reduce dependencies between layers. It describes problems with traditional 3-layer architectures where business logic can become scattered and dependent on specific technologies. The Onion Architecture inverts dependencies so that inner layers do not depend on outer layers, making the business logic portable and easier to maintain over time. Guiding principles are to use dependency inversion and push technology dependencies outward from the core business logic.
How AI is creating what's next in governmentTina Meek
Presentation from the Microsoft Azure Government user community meetup on April 24, 2019 featuring government and industry AI experts in an engaging panel discussion along with demos of innovative AI solutions. See the video replay at aka.ms/azuregovmeetupchannel.
To join and learn more about one of the largest government cloud user communities in the DC-metro region, visit www.meetup.com/DCAzureGov. The Azure Government DC user community hosts regular in-person and livestream events on cloud innovation for US government.
The document is a CV for Pragatheswarakumar K. It summarizes his professional experience including over 5 years of experience in software development using Java and related frameworks. It lists his skills in areas like Spring, AngularJS, RabbitMQ, Android development, and his past roles including senior software engineer roles at SecureW2 India Pvt Ltd and Cluster Wireless Software India Pvt Ltd developing microservices, web applications, and middleware. It also provides his educational qualifications and hobbies.
One ASP.NET provides a unified framework for building web applications using Web Forms, MVC, Web API, and SignalR. It features continuous innovation with new releases every 6 months. Developers can use any ASP.NET technology and add frameworks to projects freely. New features include improved scaffolding, Bootstrap integration, ASP.NET Identity, HTML editing and more. Web API 2 and SignalR 2.0 are decoupled from servers using OWIN. Web API supports attribute routing, CORS, and integrates with OData. Azure provides sandbox environments for application development and testing in the cloud.
Zero Credential Development with Managed Identities for Azure resourcesJoonas Westlin
Introduction to Managed Identities in Azure, what they are and how they work. Also goes through what services they can be used with in Azure, how you can use services without any keys or secrets.
Zero Credential Development with Managed IdentitiesJoonas Westlin
Keys are always needed to access services in Azure and beyond. Storing and managing keys presents many problems, for example rotating and disabling them. Keys often also allow blanket access to the service with no way to limit it. Sometimes there is only one key that needs to be shared by services, so you won't have any way to disable access from one individually. In this talk we will go through Managed Identities for Azure Resources, how they work, and how you can use them to use Azure services in a secure way without having to manage any keys yourself. We will go through a demo application which uses various Azure services through a managed identity, removing the need to use keys entirely. The source code will be available to the audience so they have samples that they can use to implement managed identities in their own applications.
Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017Eran Stiller
The slide deck for my session at TechBash 2017 on "Building an IoT Massive Multiplayer Game in 60 Minutes".
Sample code can be found at https://github.com/estiller/iot-game
Presentation web based application|Web designing training center in coimbator...Vignesh026
Web 2.0 is the term given to describe a second generation of the World Wide Web that is focused on the ability for people to collaborate and share information online. Web 2.0 basically refers to the transition from static HTML Web pages to a more dynamic Web that is more organized and is based on serving Web applications to users. Other improved functionality of Web 2.0 includes open communication with an emphasis on Web-based communities of users, and more open sharing of information. Over time Web 2.0 has been used more as a marketing term than a computer-science-based term. Blogs, wikis, and Web services are all seen as components of Web 2.0.
Tim O'Reilly is generally credited with inventing the term, following a conference dealing with next-generation Web concepts and issues held by O'Reilly Media and Media Live International in 2004. O'Reilly Media has subsequently been energetic about trying to copyright "Web 2.0" and holds an annual conference of the same name. There is, however, some dispute about whether O'Reilly is responsible for the original coinage. Joe Firmage, for instance, used Web 2.0 to describe using the World Wide Web as a platform in 2003.
One of the most significant differences between Web 2.0 and the traditional World Wide Web (retroactively referred to as Web 1.0) is greater collaboration among Internet users and other users, content providers, and enterprises.
Originally, data was posted on Web sites, and users simply viewed or downloaded the content. Increasingly, users have more input into the nature and scope of Web content and in some cases exert real-time control over it. For example, multiple-vendor online book outlets such as BookFinder4U make it possible for users to upload book reviews as well as find rare and out-of-print books at a minimum price, and dynamic encyclopedias such allow users to create and edit the content of a worldwide information database in multiple languages. Internet forums have become more extensive and led to the proliferation of blogging. The dissemination of news evolved into RSS.
Contact: VIGNESH K S
C.No: 9688477218, 0422-4206205, 9944200078, 8754466134.
#108 Nehru Street, Ram Nagar, Gandhipuram, Coimbatore.
Web: www.cegonsoft.co.in
Empower every Azure Function to achieve more!!Massimo Bonanni
This document contains information from a presentation on Azure Functions including:
- An overview of Azure Functions and their pay-per-use model with instant scalability.
- Details on the anatomy of a function including triggers, bindings, and their associated classes.
- Explanations of the startup and runtime phases of functions and how triggers and bindings are configured.
- Recommendations to write efficient functions that avoid unnecessary resource usage.
- Links provided for additional documentation, code samples, and the speaker's contact information.
Sessione tenuta a CodeGen 2021 il 13/02/2021
Serverless è una architettura basata sugli eventi e quali migliori scenari se non quelli IoT sono fondati sugli eventi? Migliaia di device che inviano telemetrie alla nostra soluzione e che dobbiamo gestire. In questa sessione vedremo un semplice approccio a scenari di questo genere che utilizza le Durable Entities per gestire la logica associata ai device del nostro sistema. Un esempio pratico per capire pregi e difetti delle Durable Entities che possono essere utili in moltissimi scenari in cui gestire eventi è essenziale.
Matt Davy
Chief Network Architect & Executive Director
InCNTRE
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
Introduction to the Microsoft identity platform for developersChristos Matskas
This deck gives you a quick tour of some of the important features in the Microsoft Identity Platform including Azure AD and B2C. We cover the why and the how to get started with the Microsoft identity platform to securely authenticate and authorize users in your apps - any platform, any language, any cloud.
พบกับเซสชั่น "Microsoft Graph for Microsoft 365 and Power Platform" ในงาน Microsoft 365 Developer Bootcamp
- แนะนำ Microsoft Graph
- เรียนรู้การเรียกใช้งาน REST API เพื่อเข้าถึงข้อมูลบนบริการต่าง ๆ ของ Microsoft 365
โดยคุณแชมป์ Narisorn Limpaswadpaisarn (Microsoft Certified Trainer)
Azure Active Directory - An Introduction for DevelopersJohn Garland
This document provides an overview of consulting and training services from Wintellect related to Azure Active Directory. It describes that Wintellect offers both consulting services to help build software as well as on-site, virtual and on-demand training courses taught by Microsoft experts. The document includes an agenda for an introduction to Azure Active Directory for developers that will cover topics like adding authentication to an ASP.NET MVC app and calling secured APIs from various client applications.
This document discusses building an application using Microsoft Identity Platform (formerly known as Azure Active Directory):
- Microsoft Identity Platform allows building applications with a single sign-on experience and securely accessing data from any API using tokens.
- The document outlines how to authenticate users via the implicit flow in MSAL, get tokens to call web APIs, and best practices for handling permissions and consent in an incremental way.
- It encourages developers to leverage the Office 365 developer program resources to build applications that integrate with Microsoft cloud services using single sign-on for a seamless user experience.
This document provides an overview of Microsoft Azure Active Directory (Azure AD). It discusses Azure AD's capabilities for user and access management, single sign-on, multi-factor authentication, and integrating on-premises and cloud applications. It also highlights key stats such as the number of users, applications, and customers using Azure AD. Additional sections cover Azure AD's security features including identity protection, risk-based conditional access, and password protection. The document concludes by listing several Azure AD documentation links for further information.
Microsoft Graph API Webinar Application PermissionsStefan Weber
Slidedeck presented during a webinar i held on 15th November 2023 about how to consume Microsoft Graph API using application level permissions.
Webinar Recording https://youtu.be/yVK8WQz5qnU
Empower your business with automate processes + tasks using microsoft flowsRadu Vunvulea
Empower your business with automate processes + tasks using Microsoft Flows (Radu Vunvulea) - Join this session if you want to discover a tool that can be used to optimise your internal processes with just a few clicks. Microsoft Flows well integrated with Office 365 ecosystem, allowing us to remove the manual processes where human error can appear. We take a look at how we can automate the holiday approval requests end-two-end without writing a line of code (or this is what we hope ).
Architecting IoT solutions with Microsoft AzureAlon Fliess
A lecture about Azure IoT solutions that I gave in the CodeValue Architecture Next 2018 conference.
The lecture provides information about SaaS and PaaS IoT solutions as well as the smart Edge,
This document discusses AWS CodeStar and how it can help developers implement DevOps practices. AWS CodeStar allows developers to easily set up development environments, collaborate with teams, and integrate continuous delivery pipelines using AWS services like CodeCommit, CodeBuild, CodeDeploy, and CodePipeline. It provides project templates, team management features, and integrates with tools like Jira. The document demonstrates how to create a CodeStar project and use its dashboard and continuous delivery pipeline. It also provides an overview of the AWS mobile developer tools.
This session was recorded during the BizTalk Summit 2015 London event where Sameer Chabungbam from Microsoft product group explains how you can build your first connector and how you can make it work in Logic Apps.
Accelerating Software Delivery with AWS Developer Tools & AWS Mobile services...Amazon Web Services
Software release cycles are now measured in days instead of months. Cutting edge companies are continuously delivering high-quality software at a fast pace. In this session, we will cover how you begin your DevOps journey by sharing best practices and tools by the "two pizza" engineering teams at Amazon. We will showcase how you can accelerate developer productivity by implementing continuous integration and delivery workflows. We will also cover an introduction to AWS CodeCommit, AWS CodeBuild, AWS CodePipeline, and AWS CodeDeploy, the services inspired by Amazon's internal devloper tools and DevOps practice.
AWS Speaker : Ian Massingham, Sr Mgr, Technical Evangelist - Amazon Web Services
This document provides an overview of Windows Azure AppFabric. It discusses the identity and access control, service bus, and caching services that AppFabric provides. The identity service implements claims-based authentication and uses the Access Control service to integrate single sign-on with multiple identity providers. The service bus enables hybrid cloud applications through a relay that provides secure messaging. Caching improves performance by storing data in memory for low-latency access.
MS365 Dev Bootcamp Montreal 2019 - Microsoft graph introductionVincent Biret
This document introduces Microsoft Graph and describes how to build applications that connect to Microsoft services like Office 365 using the Microsoft Graph API. It provides an overview of Microsoft Graph and how it acts as a gateway to access user, group and organizational data from Microsoft services. It also describes the various authentication options for Microsoft Graph applications and code samples for building single page applications with React that are authenticated with Azure AD using the Microsoft Graph SDK.
MVP Virtual Conference - Introduction to AngularJS in an Office 365 ContextSébastien Levert
Every developer hears about AngularJS and all the magic it does for you applications. In order to kickstart you AngularJS journey, this session is an introduction to the AngularJS concepts applied to any Office 365 development. Different workloads will be targeted (Mail, Calendar, Files) and the Office 365 API will be our main datasource. We will also cover SharePoint Online specific data access (Office 365 API, REST, CSOM and Search) to meet your current development needs.
Today, every company runs many different applications that are essential for success – both internal business applications but also external-facing applications for customers and partners (such as the company website, customer self-service portal, e-commerce sites, or mobile apps).
And then, there's data. Every user interaction with any application works with data, consumes data and generates data. Today, every business collects tremendous amounts of information - and the challenge is how to turn this data into actionable insights and intelligence to provide a superior customer experience.
Capture the Cloud with Azure, delivered at Angelbeat @ Arlington VA. Learn how about Azure can help you build cloud solutions with virtual machines, web apps, mobile apps, databases and analytics.
What can you do with Azure Mobile Services? In a big solution, made up of several services, you can control your remote infrastructure looking at you events collected in a DB and you can send commands.
Similar to "Secure Mobile Apps with the Microsoft Identity Platform", Christos Matskas, John Patrick Dandison (20)
"What I learned through reverse engineering", Yuri ArtiukhFwdays
In recent years, I have gained most of my knowledge through reverse engineering, how I did it and what I learned during this period, I decided to share. All this concerns graphic programming, performance, best practices in the frontend.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
"Micro frontends: Unbelievably true life story", Dmytro PavlovFwdays
A real life story about the experience of using Micro frontends in an existing Enterprise product. Problems and their solutions on the way from the integration of a separate component to an extensible No-code platform.
"Objects validation and comparison using runtime types (io-ts)", Oleksandr SuhakFwdays
A common task in modern JS is parsing, validating and then comparing JSON objects. In this talk I will quickly go through most common ways to parse/validate and compare objects we use today and then focus more on how runtime types (based on io-ts) can help make such tasks easier and quicker to implement.
"JavaScript. Standard evolution, when nobody cares", Roman SavitskyiFwdays
Should we take a look at JavaScript when everyone is writing in TypeScript? What happens to the standard? What did we get last year? What new features can we expect this and next year? And most importantly, when will Observer be standardized?
Let's try to answer all these questions and even a little more, dream about the future, and enjoy that Observer is alive (or not).
"How Preply reduced ML model development time from 1 month to 1 day",Yevhen Y...Fwdays
Case study of how small team in Preply started with inheriting an existing ranking model to being able to produce a model per day. In this talk we'll cover steps to take if you find yourself in a similar situation: what kind of technology and processes can you introduce in order to achieve a great speedup in a development speed.
"GenAI Apps: Our Journey from Ideas to Production Excellence",Danil TopchiiFwdays
In my talk, I will tell about the world of GenAI services beyond GPT-wrappers and how we developed and scaled GenAI-centric applications. I'll share personal experiences about the obstacles, lessons, and strategic tools and methodologies that were key in taking GenAI applications from 0 to 1. I'll talk about the challenges we faced when launching LLM-based and image generative applications and delivering them to end users, and what conclusions and solutions were made.
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
Python engineers are introduced to the transformative potential of Large Language Models (LLMs) in the realm of advanced data analysis and the application of Semantic Kernel techniques. We will talk about how LLMs like ChatGPT can be integrated into Python environments to automate data processing, enhance predictive modeling, and unlock deeper insights from complex datasets. The session will delve into practical strategies for embedding Semantic Kernel methods within Python projects, illustrating how these advanced techniques can refine the accuracy of machine learning models by embedding domain-specific knowledge directly into the analysis process. Attendees will leave with a clear roadmap for leveraging the combined power of LLMs and Semantic Kernels, equipped with actionable knowledge to drive innovation in their data analysis projects and beyond, marking a significant leap forward in the evolution of Python engineering practices.
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
Federated learning. Algorithmic solution to the problem of privacy preserving ML. Pieces involved to support the training with NVIDIA Flare as example. How newest legislation affects federated learning.
"What is a RAG system and how to build it",Dmytro SpodaretsFwdays
Today, large language models are becoming an integral part of almost every IT solution. However, their use is often accompanied by certain limitations, such as the relevance of information or its depth and specificity. One of the ways to overcome these limitations is the method of working with LLMs - RAG (Retrieval Augmented Generation).
In an ideal world, you would write Python code and then it would work perfectly. But unfortunately, it doesn't work in this manner. In my talk, I'll cover how to efficiently debug your programs, especially in cloud environments or inside Kubernetes.
MLOps (Machine Learning Operations) is a recent buzzword, that trends a lot. Let's figure out together how maintaining applications with machine learning components is significantly different from maintaining applications without them.
We will look into MLOps best practices and typical problems and their implementations/solutions in real world production.
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
Ever seen a code base where understanding a simple method meant jumping through tangled class hierarchies? We all have! And while "Favor composition over inheritance!" is almost as old as object-oriented programming, strictly avoiding all types of subclassing leads to verbose, un-Pythonic code. So, what to do?
The discussion on composition vs. inheritance is so frustrating because far-reaching design decisions like this can only be made with the ecosystem in mind – and because there's more than one type of subclassing!
Let's take a dogma-free stroll through the types of subclassing through a Pythonic lens and untangle some patterns and trade-offs together. By the end, you'll be more confident in deciding when subclassing will make your code more Pythonic and when composition will improve its clarity.
"Distributed graphs and microservices in Prom.ua", Maksym KindritskyiFwdays
The current architecture of Prom.ua is built on microservices and GraphQL API, but it was not always like that. In this talk, I'll tell you how far we've come and how we've made using graphs in a microservice architecture convenient and simple. I will talk about the problems we faced and how we overcame them, made our development process more accessible, deployments faster, and the remains of the monolith less loaded.
"Rethinking the existing data loading and processing process as an ETL exampl...Fwdays
ETL stands for extract, transform, load. It's a process that combines data from different sources into a single repository for further processing, analysis, and utilization.
This talk provides an example of how pandas can be used to solve ETL tasks as a stage in the evolution of the data intake component. This involves preliminary validation, filtering, and conversion of data according to a set of business rules and internal representation, with intermediate combination with other sources.
"How Ukrainian IT specialist can go on vacation abroad without crossing the T...Fwdays
I’m confident that many IT professionals are currently facing the same situation I was in a few months ago. Mobilization, uncertainty. How can I be maximally beneficial to the country with my experience and continue professional development in such circumstances? Since the onset of the full-scale invasion, I've been actively volunteering and assisting the army. Mobilization became the next logical step.
I want to share:
My journey in IT, volunteering, and the beginning of my service in the Armed Forces
Impressions from the first few months
Which Soft Skills are helpful in this context
I aim to dispel myths about the mobilization process and projects of the Armed Forces. Address your questions
And yes, military personnel can travel abroad during their leave.
"The Strength of Being Vulnerable: the experience from CIA, Tesla and Uber", ...Fwdays
The leader must be strong all the time. The leader cannot afford to make mistakes, let alone fail in front of their team. Is that really true? Nick Gicinto, a cybersecurity leader with over 25 years of experience, who has worked for the CIA and has built security systems from scratch at Tesla and Uber, fully hiring teams for these projects, will talk about the importance of being vulnerable to build trust within a team.
"[QUICK TALK] Radical candor: how to achieve results faster thanks to a cultu...Fwdays
Sharing open feedback can be difficult because it equals much work on yourself. However, feedback needs attention and a special place in the corporate culture. It helps to grow dynamically, build a team of like-minded people and achieve powerful results.
In the presentation, I will talk about:
The ability to work with feedback as a soft, solid skill in developing technical specialists.
A list of difficulties that prevent quality work with feedback.
The 4A Framework is a tool for successful giving and receiving feedback.
I will also help specialists learn the following:
Form constructive feedback and understand how and when to give it.
Work analytically with the received feedback.
Feel free to share your thoughts and be heard.
"[QUICK TALK] PDP Plan, the only one door to raise your salary and boost care...Fwdays
Will discuss:
Current communication challenges, including mishaps and toxic versus productive interactions.
Ever wondered about PDP? It’s likely because its relevance to career planning, even outside your current company, hasn’t been fully spotlighted.
Exploring how PDP functions within career planning, applicable even if you’re eyeing an exit.
“Who do I aspire to become?”
Summarizing key points with a reference to a practical form you can download to use.
"4 horsemen of the apocalypse of working relationships (+ antidotes to them)"...Fwdays
This talk will reveal four destructive communication patterns that can undermine team spirit, reduce productivity and cause conflict, and offer effective strategies for neutralizing them.
Let's start with exciting storytelling about a fictional team of developers working on Scrum. You will learn about situations that their team member noticed during team meetings.
Next, we will analyze "The Gottman Four Horsemen" model, which describes the four "horsemen of the apocalypse" of work relationships: criticism, defensiveness, contempt, and stonewalling. For each of these patterns, specific "antidotes" will be offered that allow you to build healthier and more productive relationships in the team.
Finally, we'll look at why this topic is critical to team productivity, drawing on Google's "Project Aristotle" research. Special attention will be paid to the concept of psychological safety, which is a key factor in the success of high-performance teams.
This talk will not only provide valuable insights and tools for improving communication and management in Tech teams, but will also help each member better understand their own contribution to the overall success of the team.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
"Secure Mobile Apps with the Microsoft Identity Platform", Christos Matskas, John Patrick Dandison
1.
2. Christos Matskas
Program Manager @ Microsoft
@christosmatskas
"Inspiring developers to build better,
more secure software"
Passionate about technology,
fitness and weightlifting
6. What developers ask for with
identity and access management
How easy is it to quickly get started and
build authentication into my applications?
Does it support or integrate well with the
platform, language and tools I use?
Does it support advanced security
capabilities out-of-the-box, so I don’t
have to build it?
Can I leverage my company’s existing
identity and access management solution
to save costs?
7. Microsoft identity platform for developers
Simplifying authentication and authorization so you can focus on building innovative applications
Simplify sign-in to
your app and reach
millions of users
Protect access to your
app to only
authorized users
Meet enterprise
security and compliance
requirements
Customize, extend or
connect your apps to APIs
such as Microsoft Graph
Reduce sign-in friction Safeguard access
Comply with IT
Access organizational data
8. Microsoft identity platform for developers
A toolkit to integrate identity and authentication into your apps
Microsoft Authentication Libraries
For clients and services
Azure portal and
Microsoft Graph App API
OIDC Certified Endpoints
Web API
Including Microsoft Graph,
Azure, and your own APIs
Customer and Partner accounts
Azure AD External Identities (includes Azure AD B2C)
Personal accounts
MSA
Work and school accounts
Azure AD
18. Come as you are
Bring your own developer tools, services &
platforms
19. Identity
Any language
Any cloud
Amazon Web
Services
Google Cloud
Platform
DigitalOcean
Bring your own developer tools, services and platforms
Java
Python
…or on-prem and many more…
Bitbucket
IntelliJ IDEA
PyCharm
Javascript
Serverless
Kubernetes
Bare metal
20. GitHub
Visual Studio
Visual Studio Code
Identity
Azure services
Microsoft 365 platform
Teams
SharePoint
Exchange
Integrated with Microsoft’s developer ecosystem
Power Automate
Power Apps
Power Virtual Agents
App Service
Azure Kubernetes Service
Functions
… …
21. Leverage System Browser for authentication in order
to support single sign-on for your mobile app.
22. Best in class authentication libraries that work
with your platform or language of choice or use
our OIDC certified endpoint.
Develop in your favorite language
Applications using MSAL are secure by default
and can comply with security policies
implemented by IT.
Secure by default
Secure access to users and data from Microsoft
Graph, Azure or your own protected APIs.
Build richer experiences
23.
24. Microsoft Graph API
Microsoft Graph
data connect
Connectors
Microsoft Identity
Azure platform
Your local data
Microsoft 365
People Chats Files Devices Mail Events
Lists Security Searc
h
Alerts
Search
Conversations Portals Timeline
Documents
Extend Microsoft 365 experiences
Web
apps
Bots and
agents
Device
and native
Daemon
apps
Workflow
automation
Analytics
apps
Build your experience
28. 🆔Identity for all developers
😴 Tired: multiple libraries & APIs to learn,
protocols to understand
- Sign in: ASP.NET Core openid middleware
- You configure OpenIdConnect middleware
- You build controllers & views to initiate challenges
- Uses Azure AD v1 endpoints
- Build-your-own audience validator
- Getting tokens & calling APIs with MSAL
- Requires configuring MSAL yourself
- Requires a token cache
- Requires hooking into openid middleware events
- API developers validating incoming tokens
- JwtBearer middleware
- OBO API developers also need MSAL
⚡ Wired: single library for everyone, no
protocol intimacy required
- Sign in with Microsoft.Identity.Web
- OpenIdConnect middleware configured
- Controllers & views included
- Uses Azure AD v2 endpoints
- Includes audience validator for all Microsoft clouds
- Getting tokens & calling APIs with MSAL
- MSAL configured by Identity.Web
- In memory by default, also uses IDistributedCache
- authorization_code redemption already configured
- API developers validating incoming tokens
- JwtBearer middleware configured
- MSAL for OBO configured by Identity.Web
29. Where does this new library fit?
Microsoft.Identity.Web
Microsoft.AspNetCore.Authentication.AzureAD.UI
Microsoft.AspNetCore.Authentication.*
OpenIdConnect
Authentication
Cookie
Authentication
JwtBearer
Authentication
UI
AccountController Account views
MSAL
30. Development experience
Old hat
- Sign in: ASP.NET Core openid middleware
- .AddAuthentication().AddAzureAd();
- Getting tokens & calling APIs: MSAL
- new ConfidentialClientApplication().With…
- OpenIdConnectEvents.AuthorizationCodeReceived(MsalO
bj.AcquireTokenByAuthorizationCodeAsync)
- Msal.TokenCache.BeforeAccess/.AfterAccess
- API developers validating incoming tokens
- .AddAuthentication().AddAzureAdBearer()
- (see above for getting tokens with MSAL)
New hat
- Sign in:
- .AddMicrosoftIdentityWebAppAuthentication()
- Getting tokens & calling APIs
- .EnableTokenAcquisitionToCallDownstreamApi()
- API developers validating incoming tokens
- .AddMicrosoftIdentityWebApiAuthentication()
- .EnableTokenAcquisitionToCallDownstreamApi()
First, if you have a password database, it’s time to not have that anymore, period. Move ASAP
DESIGN: potential visual refresh after data refreshed
ADAM: confirm any data updates
Talk Track:
FUTURE-FACING
Microsoft is one of the largest identity providers. The scale of our solution is vast:
Azure AD is a truly global identity service that operates at hyper-scale
Over 100 thousand organizations trust Azure AD
We manage over 254M Monthly active users, with an average of 30 billion daily authentication requests [For comparison, Okta has about 8B authentications PER YEAR.]
So let’s start with some of the asks and needs that developers have when it comes to identity and access management (IAM) solutions?
Developers in your organization are likely looking for a couple things when it comes to sign-in and authentication:
How quickly can I get started to build authentication into my apps. Authentication isn’t something many developers have expertise in. Developers are looking to get their app running with authentication and signing-in users quickly so they can focus on the core value of the app or services.
Is the identity platform well integrated with the tools, languages and platforms I use. Does it support mobile platforms? Does it support the programming languages I use? And is it well integrated into my workflow and the dev tools services I use.
Is the platform feature rich and will it support continuous identity innovation and security. Developers don’t want to get in the business of building IAM features into their app or storing username and passwords. That’s best left to experts.
If my company is using an IAM solution for their employees, can I use that solution when building my applications to help save costs? Can I use the IAM solution that my company uses to sign-in users to Office 365 with my applications? Microsoft has the leading enterprise IAM solution with Azure AD, which is built-in with Office 365 that you can also leverage for the apps you build.
Leverage the Microsoft identity platform when building applications. Why?
Same time and focus on core product differentiation. Lower cost of development – no more building infra to store username and passwords
Better user experience – allow users to use their preferred identity to sign in to their applications.
Ensure Platform security and get the latest in identity innovation without building it
And on top of that when you integrate with Microsoft identity platform, you’re able to access users and data in the MS cloud. Which enables you to build rich applications.
So what does the Microsoft identity platform consist of?
You have:
One portal to register all your applications
One set of Microsoft Authentication libraries for building web, mobile and desktop apps with your favorite programming langague
One endpoint, that is standards compliant, that sign-in any Microsoft identity, which allows compatibility with third-party libraries.
Secure access to APIs – from Microsoft Graph to Azure resources to your own protected APIs
This gives you the ability to authenticate any Microsoft identity including work or school accounts or personal accounts. And your application can sign any external user such as customers and partners social identities and local accounts.
And our platform supports open industry standards. So if you have an existing application based on industry standards it’s straightforward to connect your application.
Depending on ISV…. talk about B2C if they it’s a qualified opportunity in that they are looking to embed auth system into an app they are building.
Eliminating friction in the end-user experience is a top priority for organizations and developers engaging consumers, customers, or citizens. With Azure AD B2C, organizations and developers have the flexibility to tailor the identity experience of their customer-facing apps and services so it’s aligned with their brand and business requirements—without sacrificing security.
Seamless and secure sign-in experiences: With Azure AD B2C, you can provide simple, reliable, and secure SSO access to customer-facing apps with customers using their preferred, already-established social, enterprise, or local account identities, while also protecting your customers and data.
Customize the user journey: Azure AD B2C sign-up and sign-in policies allow you to control behavior by configuring settings, such as account types that consumers use, attributes that are collected from the consumer during sign-up, multi-factor authentication (MFA) usage, and the look and feel of all registration and authentication pages.
Design the user experience: Designed to offer you flexibility and control, these customization capabilities include white-label features that allow you to design the entire user experience to blend seamlessly with your web and mobile applications.
Organizations may leverage Azure AD B2C to connect external users to external web and mobile apps using a wide range of social identity providers, OpenID Connect, and OAuth 2.0.
Every company wants to digitally transform and we see organizations reaping real, tangible benefits - the positive outcomes are truly amazing.
One group of people that is a catalyst for digital transformation are developers. Developers are the builders of our era, creating the ideas and writing the code that enables digital transformation for organizations around the world. They are at the heart of innovation.
It’s why the Microsoft identity platform is woven into the tools, service and platform developer use today. From IDEs like Visual Studio, to popular Azure services like App Service, Functions or Kubernetes to low code solution like power apps, the Microsoft identity platform is integrated into the workflows of these services.
We want to enable any developer to easily get started with the Microsoft identity platform using the tools and services they know and love.
Every company wants to digitally transform and we see organizations reaping real, tangible benefits - the positive outcomes are truly amazing.
One group of people that is a catalyst for digital transformation are developers. Developers are the builders of our era, creating the ideas and writing the code that enables digital transformation for organizations around the world. They are at the heart of innovation.
It’s why the Microsoft identity platform is woven into the tools, service and platform developer use today. From IDEs like Visual Studio, to popular Azure services like App Service, Functions or Kubernetes to low code solution like power apps, the Microsoft identity platform is integrated into the workflows of these services.
We want to enable any developer to easily get started with the Microsoft identity platform using the tools and services they know and love.
Here are some ways you can integrate and support SSO. You can use your protocol of choice.
For OpenID Connect and OAuth: use OIDC and Oauth when developing new apps. This simplifies app configuration, has easy-to-use SDKs, and enables your application to use Microsoft Graph.
For existing apps that are SAML based we support SAML integration.
For your mobile apps – be sure to support system Browser for authentication in order to support single sign-on with Azure AD
-----
Integrate single sign-on with OpenID Connect/OAuth or SAML
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/what-is-single-sign-on
Add sign-in with Microsoft button to your application
https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-add-branding-in-azure-ad-apps
Customize sign-in and sign-up experiences with Azure AD B2C
https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-add-branding-in-azure-ad-apps
With our Microsoft Authentication libraries – often referred to as MSAL – we’ve made adding authentication into your apps easy. With our MSAL libraries you can sign-in users and acquire security tokens to call protected APIs.
The Microsoft Authentication Libraries represent our best developer experience for easily integrating authentication into a diverse set of applications. For building modern applications that authenticate Microsoft identities, your app should be using our most advanced and up-to-date libraries and protocols. Our MSAL libraries support a variety of platforms and languages - .NET, Javascript, Java, Python, Angular, iOS, Android and we also recently released Microsoft.identity.web which is the glue between ASP.NET Core and MSAL.NET.
When you use our MSAL libraries you applications are secure by default. MSAL makes it easy to implement the right authentication protocols and allows developers to get the latest identity innovations such as passwordless, Conditional Access and additional security features into applications with just a few lines of code.
On top of that you can securely access to users and data in the Microsoft Cloud such as data in Microsoft Graph or Azure. You can also call your own protected API.
So let’s take a look how easy it is to get started.
Use Microsoft Graph to build experiences around the user's unique context to help them be more productive. Imagine an app that...
As you may have noticed throughout the discussion and the others today, we are very focused on identity and it’s at the center of focus. And identity allows you to build new experiences by connecting to Microsoft Graph comes.
Microsoft Graph is the Microsoft 365 data that describes patterns of productivity, identity, and security in an organization, accessed through a unified API endpoint. It connects apps and devices with powerful cloud services – and puts them all to work for you.
With the Graph API, you can build custom solutions which both leverage a customers organization’s data, directly from the source, as well as create a personalized experience directly in the flow of your users’ work.
Once you signed-in a user and authenticated you can start to access data in Microsoft Graph.
It's best to think of Microsoft Graph as an API gateway that unifies the many REST API offerings we have as a company. Today, Microsoft Graph brings together more than 25 incredibly important APIs including Azure Active Directory, productivity APIs like Exchange and OneDrive, security and management APIs like Intune and Security Graph, Windows APIs like Rome and Cloud Print, and much, much more.
By leveraging the Microsoft Graph you can build better apps with:
Rich context. Get rich context for your applications, such as who someone's manager is, whether they are out of office, or what documents they've been working on.
Deep insights. Access deep insights generated from usage patterns, such as trending documents, best team meeting times, or who people typically work with.
Real-time updates. Respond to changes in Microsoft Graph data in real time. Reschedule a meeting based on responses, notify others when a file is modified, or continue a process after it's been approved.