SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...Brian Culver
How will SharePoint 2010 allow organizations to collaborate and share knowledge with clients and partners? SharePoint empowers organization to build extranet sites and partner portals inexpensively and securely. Learn what exactly is claims based authentication and how can to use it. Learn about the new multi-authentication mode in SharePoint 2010. Learn how SharePoint 2010 can help your organization open its doors to its clients and partners securely.
How to deploy SharePoint 2010 to external users?rlsoft
A presentation about all the different aspects to be aware of when deploying SharePoint 2010 as an extranet platform, as well as the available options for network topologies and authentication methods.
Kermit Co. is upgrading its identity management system to address several problems: 1) employees need single sign-on across internal and cloud applications using different protocols; 2) strengthening security by adding multi-factor authentication; 3) managing external identities at scale including social logins and just-in-time provisioning; 4) exposing APIs securely and automating provisioning using rules. The WSO2 Identity Server provides an enterprise identity bus to federate identities across systems using various protocols while allowing management of internal and external identities at different assurance levels through APIs.
Websites and applications are implementing social single sign-on to allow users to login using trusted authentication providers such as Google, Facebook, and even Salesforce. Join us to learn how to configure the OpenID Connect authentication provider to allow users to authenticate at Google to access a Salesforce environment. We'll also look at how you can relieve yourself of the burden of password management by having your web app login users via Salesforce.
Comodo Code Signing Certificates allow software developers to digitally sign software files to verify their authenticity and integrity for customers. When files are signed, customers can confirm the software came from the publisher and has not been altered. Code signing provides benefits like reassuring customers, preserving a company's reputation, and being compatible with major browsers and operating systems. Comodo Code Signing Certificates enable signing of files like EXEs, DLLs, and JARs to build trust with users and protect companies' brands online.
Extending SharePoint 2010 to your customers and partnersCorey Roth
This document discusses setting up an extranet in SharePoint 2010 using forms-based authentication and claims-based authentication. It provides links to resources on how to configure an extranet, how users will authenticate using username and password, and how to populate the extranet with content from SharePoint. It also lists upcoming sessions at a conference on using claims-based authentication in SharePoint 2010.
This document discusses identity and access management solutions using Microsoft Azure Active Directory (Azure AD). It covers key capabilities of Azure AD like single sign-on, self-service password reset, directory synchronization, application management, multi-factor authentication, Windows 10 domain join, conditional access policies, and integrating with Azure Information Protection for data security. Demo sections show configuring Azure AD Connect, multi-factor authentication, Windows 10 domain join, and conditional access policies. The document promotes Azure AD Premium for comprehensive identity management, access monitoring, and data protection capabilities.
This document summarizes Comodo's certificate authority and partner programs. It outlines Comodo's capabilities such as SSL certificate issuance, subordinate CA abilities, and browser compatibility. It then describes Comodo's partner program benefits like API integration, discounted pricing, and management tools. Finally, it outlines several specific partner programs including reseller, web host reseller, affiliate, and OEM programs.
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...Brian Culver
How will SharePoint 2010 allow organizations to collaborate and share knowledge with clients and partners? SharePoint empowers organization to build extranet sites and partner portals inexpensively and securely. Learn what exactly is claims based authentication and how can to use it. Learn about the new multi-authentication mode in SharePoint 2010. Learn how SharePoint 2010 can help your organization open its doors to its clients and partners securely.
How to deploy SharePoint 2010 to external users?rlsoft
A presentation about all the different aspects to be aware of when deploying SharePoint 2010 as an extranet platform, as well as the available options for network topologies and authentication methods.
Kermit Co. is upgrading its identity management system to address several problems: 1) employees need single sign-on across internal and cloud applications using different protocols; 2) strengthening security by adding multi-factor authentication; 3) managing external identities at scale including social logins and just-in-time provisioning; 4) exposing APIs securely and automating provisioning using rules. The WSO2 Identity Server provides an enterprise identity bus to federate identities across systems using various protocols while allowing management of internal and external identities at different assurance levels through APIs.
Websites and applications are implementing social single sign-on to allow users to login using trusted authentication providers such as Google, Facebook, and even Salesforce. Join us to learn how to configure the OpenID Connect authentication provider to allow users to authenticate at Google to access a Salesforce environment. We'll also look at how you can relieve yourself of the burden of password management by having your web app login users via Salesforce.
Comodo Code Signing Certificates allow software developers to digitally sign software files to verify their authenticity and integrity for customers. When files are signed, customers can confirm the software came from the publisher and has not been altered. Code signing provides benefits like reassuring customers, preserving a company's reputation, and being compatible with major browsers and operating systems. Comodo Code Signing Certificates enable signing of files like EXEs, DLLs, and JARs to build trust with users and protect companies' brands online.
Extending SharePoint 2010 to your customers and partnersCorey Roth
This document discusses setting up an extranet in SharePoint 2010 using forms-based authentication and claims-based authentication. It provides links to resources on how to configure an extranet, how users will authenticate using username and password, and how to populate the extranet with content from SharePoint. It also lists upcoming sessions at a conference on using claims-based authentication in SharePoint 2010.
This document discusses identity and access management solutions using Microsoft Azure Active Directory (Azure AD). It covers key capabilities of Azure AD like single sign-on, self-service password reset, directory synchronization, application management, multi-factor authentication, Windows 10 domain join, conditional access policies, and integrating with Azure Information Protection for data security. Demo sections show configuring Azure AD Connect, multi-factor authentication, Windows 10 domain join, and conditional access policies. The document promotes Azure AD Premium for comprehensive identity management, access monitoring, and data protection capabilities.
This document summarizes Comodo's certificate authority and partner programs. It outlines Comodo's capabilities such as SSL certificate issuance, subordinate CA abilities, and browser compatibility. It then describes Comodo's partner program benefits like API integration, discounted pricing, and management tools. Finally, it outlines several specific partner programs including reseller, web host reseller, affiliate, and OEM programs.
This document discusses leveraging SharePoint as an extranet solution. It provides an agenda for the presentation and discusses common challenges addressed by extranets, how SharePoint addresses those challenges, and demonstrating a customer extranet. It also discusses learning how to get started with a SharePoint extranet, including an architectural design session to plan the solution. The presentation aims to help understand extranets and how SharePoint can be used to deploy one.
Azure AD B2C Webinar Series: Custom Policies Part 1Vinu Gunasekaran
Agenda:
Introducing Custom Policies in Azure AD B2C
Custom Policy Components
Relying Party and User Journeys
Claims Definitions
Technical Profiles
Getting Started with Azure AD B2C Custom Policies
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWSAWS User Group Kochi
AWS Community Day Kochi 2019 - Technical Session
Enterprise grade security for web and mobile applications on AWS by Robin Varghese , Chief Architect - TCS
The document discusses considerations for implementing a single sign-on (SSO) strategy. It recommends first agreeing on terminology, then assessing the current authentication and authorization landscape. The document outlines a vision of SSO utopia and compares approaches of building an in-house SSO solution versus purchasing a vendor framework. It proposes a roadmap including defining terms, assessing vendors, integrating new and existing applications, and production deployment.
This document discusses configuring identity federation between SharePoint and Active Directory Federation Services (ADFS) using claims-based authentication. It provides an overview of key concepts like claims, security tokens, relying parties, and security token services. It then describes how to install and configure ADFS, set up SharePoint as a relying party, and configure claims mappings between the two systems to enable single sign-on using ADFS credentials. Additional topics covered include using Azure Access Control Service for additional identity providers and updating SharePoint when ADFS certificates are renewed.
Claims-based identity refers to establishing a user's identity outside of an application and injecting identity information into the application in a secure manner. It allows applications to obtain authenticated user information programmatically or declaratively. While it improves the user experience and development process, claims-based identity does not solve all identity and access management use cases and some platforms require more custom work to implement it.
Suresh Attanayake is a senior software engineer at WSO2 who will present on enterprise single sign-on technologies including SAML, OpenID Connect, and WS-Trust. WSO2 is an open source software company that provides an integration platform. The presentation will cover common SSO standards and protocols, how they work, and factors to consider when selecting a technology for a given environment.
Creating a Sign On with Open id connectDerek Binkley
The document discusses OpenID Connect, which is a standard for identity authentication built on OAuth 2.0. It describes the basic steps in OpenID Connect including the client requesting authentication, the authorization server authenticating the user and obtaining consent, returning an authorization code to the client, the client exchanging the code for an ID token and access token, and validating the ID token. It also addresses challenges with maintaining session state across a distributed architecture and strategies for addressing those challenges like embedding an iframe to check login status with the authorization server.
1. The implicit grant type is used for mobile apps and web applications where client secret confidentiality cannot be guaranteed. It returns the access token directly to the client instead of an authorization code.
2. The user is redirected to the authorization server to log in and authorize access. If approved, the access token is encoded in the redirect URI returned to the client.
3. The client extracts the token and can use it to access protected resources, without having to make a separate request to exchange an authorization code for a token. However, the token is exposed in the redirect URI, so it has a short lifetime.
Patterns and Antipatterns in Enterprise SecurityWSO2
To view recording of this webinar please use below URL:
Attacks against information systems is on the rise making enterprise security a major concern. It’s important to identify and address security needs such as confidentiality, integrity, availability and auditability of information. Enterprise security patterns facilitate balanced and informed decisions about security needs, as well as provide a rationale for the evolution of security needs over time. Antipatterns, which are fostered by misapplications of concepts and misunderstandings of security concerns, should be avoided. Enterprise security patterns and antipatterns solve these security concerns by addressing recurrent problems and challenges. These security patterns facilitate balanced and informed decisions about security needs, avoid the misapplication of concepts and misunderstanding of security concerns and provide a rationale for evolution of security needs over time.
This webinar will
Deep dive into enterprise security patterns and antipatterns
Explore the importance of using them
Discuss how to apply them with WSO2 Identity Server
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 1Vinu Gunasekaran
This document discusses an Azure AD B2C webinar series on identity protocols like OAuth 2.0 and OpenID Connect. It explains how Azure AD B2C can be used to authenticate users to access multiple applications and protected resources through protocols that involve issuing JSON Web Tokens. It also mentions Microsoft authentication libraries that can be used by applications and APIs to validate access tokens and ID tokens in different platforms and languages.
Microsoft Cloud Identity and Access Management Poster - AtidanDavid J Rosenthal
Unlock the power of the cloud with enterprise-level identity services for all your cloud apps.
AZURE ACTIVE DIRECTORY
Use Azure Active Directory (Azure AD) at
global scale to centrally manage employee
access and provide single sign-on to
Microsoft services such as Azure, Office 365,
Dynamics CRM, Windows Intune, and
thousands of non-Microsoft cloud apps
MULTI-FACTOR AUTHENTICATION
Use Multi-Factor Authentication to protect
access to sensitive company information
and to help protect your organization from
malicious attacks.
This document discusses building an application using Microsoft Identity Platform (formerly known as Azure Active Directory):
- Microsoft Identity Platform allows building applications with a single sign-on experience and securely accessing data from any API using tokens.
- The document outlines how to authenticate users via the implicit flow in MSAL, get tokens to call web APIs, and best practices for handling permissions and consent in an incremental way.
- It encourages developers to leverage the Office 365 developer program resources to build applications that integrate with Microsoft cloud services using single sign-on for a seamless user experience.
To view recording of this webinar please use below URL:
http://wso2.com/library/webinars/2016/05/end-to-end-identity-management/
In today’s rapidly evolving world, enterprise identity management has proven to be challenging due to the constant changes in associated systems, corporate policies and stakeholder requirements. Therefore, managing identities and their privileges among the systems need to be handled in a flexible manner to save resources when governing identities and controlling access.
There are various specifications of industry standards in this domain making it difficult to select the correct one. Some of them may address the same problem with slight variations and some may look similar but address completely different problems.
This webinar will discuss
The real problems that need to be addressed when managing enterprise identity
Key challenges when implementing concepts
How to overcome these challenges and build a future proof identity and access management system with WSO2 Identity Server
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudDanny Jessee
The document provides information about integrating Facebook authentication with SharePoint 2010. It discusses using Azure Access Control Service (ACS) to configure Facebook as an identity provider and map claims from Facebook to SharePoint. It also describes how to retrieve user data from Facebook using the access token and Graph API after authentication. The document includes code snippets and step-by-step instructions for setting up Facebook authentication with SharePoint.
This document discusses Microsoft Azure and identity management solutions from CCS Technology Group. It provides an overview of Azure Active Directory, Azure Multi-Factor Authentication, extending Active Directory to Azure, and deploying Active Directory Federation Services in Azure or on-premises. CCS Technology Group is a Microsoft partner that offers infrastructure deployment, managed services, custom cloud solutions, and custom software development.
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?Scott Hoag
Office 365 brings a host of productivity options, but one of the most overlooked components is how we'll authenticate to The Cloud™. With Microsoft Azure Active Directory driving access and authentication to our Office 365 tenants, it is important to understand how we can interact with it. Join us as we explore Cloud Identity, identity federation, directory synchronisation, and most importantly Azure and its impacts on user experience and access Office 365. Throughout this session, we'll answer the questions that impact you and how your decisions around identity shape your Office 365 experience.
This document discusses identity management options for integrating on-premises directories with Office 365. It describes scenarios for cloud identity without integration, directory synchronization using password sync or federation, and federation options like ADFS, Shibboleth, and third-party identity providers. Directory synchronization can be used to integrate Active Directory or non-AD sources with options like DirSync, FIM, and PowerShell for provisioning users.
This document discusses leveraging SharePoint as an extranet solution. It provides an agenda for the presentation and discusses common challenges addressed by extranets, how SharePoint addresses those challenges, and demonstrating a customer extranet. It also discusses learning how to get started with a SharePoint extranet, including an architectural design session to plan the solution. The presentation aims to help understand extranets and how SharePoint can be used to deploy one.
Azure AD B2C Webinar Series: Custom Policies Part 1Vinu Gunasekaran
Agenda:
Introducing Custom Policies in Azure AD B2C
Custom Policy Components
Relying Party and User Journeys
Claims Definitions
Technical Profiles
Getting Started with Azure AD B2C Custom Policies
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWSAWS User Group Kochi
AWS Community Day Kochi 2019 - Technical Session
Enterprise grade security for web and mobile applications on AWS by Robin Varghese , Chief Architect - TCS
The document discusses considerations for implementing a single sign-on (SSO) strategy. It recommends first agreeing on terminology, then assessing the current authentication and authorization landscape. The document outlines a vision of SSO utopia and compares approaches of building an in-house SSO solution versus purchasing a vendor framework. It proposes a roadmap including defining terms, assessing vendors, integrating new and existing applications, and production deployment.
This document discusses configuring identity federation between SharePoint and Active Directory Federation Services (ADFS) using claims-based authentication. It provides an overview of key concepts like claims, security tokens, relying parties, and security token services. It then describes how to install and configure ADFS, set up SharePoint as a relying party, and configure claims mappings between the two systems to enable single sign-on using ADFS credentials. Additional topics covered include using Azure Access Control Service for additional identity providers and updating SharePoint when ADFS certificates are renewed.
Claims-based identity refers to establishing a user's identity outside of an application and injecting identity information into the application in a secure manner. It allows applications to obtain authenticated user information programmatically or declaratively. While it improves the user experience and development process, claims-based identity does not solve all identity and access management use cases and some platforms require more custom work to implement it.
Suresh Attanayake is a senior software engineer at WSO2 who will present on enterprise single sign-on technologies including SAML, OpenID Connect, and WS-Trust. WSO2 is an open source software company that provides an integration platform. The presentation will cover common SSO standards and protocols, how they work, and factors to consider when selecting a technology for a given environment.
Creating a Sign On with Open id connectDerek Binkley
The document discusses OpenID Connect, which is a standard for identity authentication built on OAuth 2.0. It describes the basic steps in OpenID Connect including the client requesting authentication, the authorization server authenticating the user and obtaining consent, returning an authorization code to the client, the client exchanging the code for an ID token and access token, and validating the ID token. It also addresses challenges with maintaining session state across a distributed architecture and strategies for addressing those challenges like embedding an iframe to check login status with the authorization server.
1. The implicit grant type is used for mobile apps and web applications where client secret confidentiality cannot be guaranteed. It returns the access token directly to the client instead of an authorization code.
2. The user is redirected to the authorization server to log in and authorize access. If approved, the access token is encoded in the redirect URI returned to the client.
3. The client extracts the token and can use it to access protected resources, without having to make a separate request to exchange an authorization code for a token. However, the token is exposed in the redirect URI, so it has a short lifetime.
Patterns and Antipatterns in Enterprise SecurityWSO2
To view recording of this webinar please use below URL:
Attacks against information systems is on the rise making enterprise security a major concern. It’s important to identify and address security needs such as confidentiality, integrity, availability and auditability of information. Enterprise security patterns facilitate balanced and informed decisions about security needs, as well as provide a rationale for the evolution of security needs over time. Antipatterns, which are fostered by misapplications of concepts and misunderstandings of security concerns, should be avoided. Enterprise security patterns and antipatterns solve these security concerns by addressing recurrent problems and challenges. These security patterns facilitate balanced and informed decisions about security needs, avoid the misapplication of concepts and misunderstanding of security concerns and provide a rationale for evolution of security needs over time.
This webinar will
Deep dive into enterprise security patterns and antipatterns
Explore the importance of using them
Discuss how to apply them with WSO2 Identity Server
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 1Vinu Gunasekaran
This document discusses an Azure AD B2C webinar series on identity protocols like OAuth 2.0 and OpenID Connect. It explains how Azure AD B2C can be used to authenticate users to access multiple applications and protected resources through protocols that involve issuing JSON Web Tokens. It also mentions Microsoft authentication libraries that can be used by applications and APIs to validate access tokens and ID tokens in different platforms and languages.
Microsoft Cloud Identity and Access Management Poster - AtidanDavid J Rosenthal
Unlock the power of the cloud with enterprise-level identity services for all your cloud apps.
AZURE ACTIVE DIRECTORY
Use Azure Active Directory (Azure AD) at
global scale to centrally manage employee
access and provide single sign-on to
Microsoft services such as Azure, Office 365,
Dynamics CRM, Windows Intune, and
thousands of non-Microsoft cloud apps
MULTI-FACTOR AUTHENTICATION
Use Multi-Factor Authentication to protect
access to sensitive company information
and to help protect your organization from
malicious attacks.
This document discusses building an application using Microsoft Identity Platform (formerly known as Azure Active Directory):
- Microsoft Identity Platform allows building applications with a single sign-on experience and securely accessing data from any API using tokens.
- The document outlines how to authenticate users via the implicit flow in MSAL, get tokens to call web APIs, and best practices for handling permissions and consent in an incremental way.
- It encourages developers to leverage the Office 365 developer program resources to build applications that integrate with Microsoft cloud services using single sign-on for a seamless user experience.
To view recording of this webinar please use below URL:
http://wso2.com/library/webinars/2016/05/end-to-end-identity-management/
In today’s rapidly evolving world, enterprise identity management has proven to be challenging due to the constant changes in associated systems, corporate policies and stakeholder requirements. Therefore, managing identities and their privileges among the systems need to be handled in a flexible manner to save resources when governing identities and controlling access.
There are various specifications of industry standards in this domain making it difficult to select the correct one. Some of them may address the same problem with slight variations and some may look similar but address completely different problems.
This webinar will discuss
The real problems that need to be addressed when managing enterprise identity
Key challenges when implementing concepts
How to overcome these challenges and build a future proof identity and access management system with WSO2 Identity Server
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudDanny Jessee
The document provides information about integrating Facebook authentication with SharePoint 2010. It discusses using Azure Access Control Service (ACS) to configure Facebook as an identity provider and map claims from Facebook to SharePoint. It also describes how to retrieve user data from Facebook using the access token and Graph API after authentication. The document includes code snippets and step-by-step instructions for setting up Facebook authentication with SharePoint.
This document discusses Microsoft Azure and identity management solutions from CCS Technology Group. It provides an overview of Azure Active Directory, Azure Multi-Factor Authentication, extending Active Directory to Azure, and deploying Active Directory Federation Services in Azure or on-premises. CCS Technology Group is a Microsoft partner that offers infrastructure deployment, managed services, custom cloud solutions, and custom software development.
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?Scott Hoag
Office 365 brings a host of productivity options, but one of the most overlooked components is how we'll authenticate to The Cloud™. With Microsoft Azure Active Directory driving access and authentication to our Office 365 tenants, it is important to understand how we can interact with it. Join us as we explore Cloud Identity, identity federation, directory synchronisation, and most importantly Azure and its impacts on user experience and access Office 365. Throughout this session, we'll answer the questions that impact you and how your decisions around identity shape your Office 365 experience.
This document discusses identity management options for integrating on-premises directories with Office 365. It describes scenarios for cloud identity without integration, directory synchronization using password sync or federation, and federation options like ADFS, Shibboleth, and third-party identity providers. Directory synchronization can be used to integrate Active Directory or non-AD sources with options like DirSync, FIM, and PowerShell for provisioning users.
Premier Webcast - Identity Management with Windows Azure ADuberbaum
The document provides an overview of Azure Active Directory and identity management in the cloud. It begins with an agenda for the webcast and discusses how identity has changed as applications have moved to the cloud. It then covers key Azure Active Directory features like single sign-on, multi-factor authentication, access management, and its platform for developers. The document demonstrates how Azure Active Directory can provide identity services for cloud, mobile, and on-premises applications and connects directories.
This document provides an overview of Microsoft Azure Active Directory (Azure AD). It discusses Azure AD's capabilities for user and access management, single sign-on, multi-factor authentication, and integrating on-premises and cloud applications. It also highlights key stats such as the number of users, applications, and customers using Azure AD. Additional sections cover Azure AD's security features including identity protection, risk-based conditional access, and password protection. The document concludes by listing several Azure AD documentation links for further information.
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365Scott Hoag
Looking to reduce the number of post-it notes you see stuck around the office? Seeking to automate your user creation processes for Office 365? Or maybe you're interested in single sign-on for everything you host in the cloud? Are you questioning what a cloud identity is?
This session will take you through the basics of identity in the Microsoft Cloud and show you to how to set up and configure Office 365 with Azure Active Directory using the Azure Active Directory Synchronization Connect tools.
O365con14 - moving from on-premises to online, the road to followNCCOMMS
This document provides links to numerous Microsoft technical support and documentation pages related to Office 365, Azure Active Directory, identity management, multi-factor authentication, and directory synchronization. The pages cover topics such as configuring directory synchronization between on-premises Active Directory and Azure AD, managing user identities and authentication in hybrid cloud environments, and using multi-factor authentication to secure access to Office 365 applications and services.
Hitchhiker's Guide to Azure AD - SPS St Louis 2018Max Fritz
Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access management service. It provides identity management capabilities for cloud, mobile, and on-premises applications. Azure AD uses the same Active Directory that many organizations already have on-premises but extends it to cloud services. It allows single sign-on for access to Office 365, Azure, and thousands of SaaS applications. Azure AD Premium provides additional advanced capabilities for security, access management, application management, and identity protection.
Introduction to the Microsoft identity platform for developersChristos Matskas
This deck gives you a quick tour of some of the important features in the Microsoft Identity Platform including Azure AD and B2C. We cover the why and the how to get started with the Microsoft identity platform to securely authenticate and authorize users in your apps - any platform, any language, any cloud.
Windows Azure Multi-Factor Authentication provides an additional layer of security beyond passwords for accessing applications. It works by requiring two or more authentication factors, such as something you know (a password) and something you have (a registered mobile phone). The solution can integrate with on-premises applications and services using an on-premises server, and with cloud applications using Azure Active Directory. Users register their phones through a portal for authentication via calls, texts, or mobile app notifications. The solution is affordable and easy to use compared to hardware tokens since it leverages existing mobile phones.
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?Scott Hoag
Office 365 brings a host of productivity options, but one of the most overlooked components is how we'll authenticate to the Cloud. With Azure Active Directory (AAD) driving access and authentication to our Office 365 tenants, it is important to understand how we can interact with it. Join us as we explore Cloud Identity, Identity Federation, Directory Synchronization and most importantly Azure and its impacts on user experience and access of Office 365. Throughout this session, we'll answer the questions that impact you and how your decisions around identity shape your Office 365 experiences.
Are you looking for a better strategy to implement Office 365 but already have an on premise SharePoint 2013 or SharePoint 2010 implementation? If so this session is for you to understand how both systems can help solve distinct business problems that your organization might want to leverage SharePoint to address.
Office 365 brings SharePoint to the cloud to allow for the best of both the worlds together to simplify and enhance the SharePoint experience while significantly reducing costs. Office 365 allows more flexibility and greater business agility. It helps leveraging familiar tools for simple deployment, and user experiences as well as a leaner, controlled model for enterprises.
Topics covered include
• An overview of Office 365 & SharePoint 2013 On Premise: Better together!
• Use cases to consider for each environment?
• Impact to your Infrastructure
• Key Considerations
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365Scott Hoag
Looking to reduce the number of post-it notes you see stuck around the office? Seeking to automate your user creation processes for Office 365? Or maybe you’re interested in single sign-on for everything you host in the cloud? Are you questioning what a cloud identity is? This session will take you through the basics of identity in the Microsoft Cloud and show you how to set up and configure Office 365 with Azure Active Directory using the Azure Active Directory Synchronization Connect tools.
SYDSP - Office 365 and Cloud Identity - What does it mean for me?Scott Hoag
Office 365 brings a host of productivity options, but one of the most overlooked components is how we'll authenticate to The Cloud™. With Microsoft Azure Active Directory driving access and authentication to our Office 365 tenants, it is important to understand how we can interact with it. Join us as we explore Cloud Identity, identity federation, directory synchronisation, and most importantly Azure and its impacts on user experience and access Office 365. Throughout this session, we'll answer the questions that impact you and how your decisions around identity shape your Office 365 experience.
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019Kumton Suttiraksiri
การเพิ่มความปลอดภัยของการ Authentication ในรูปแบบต่างๆ โดย Azure Active Directory (AAD)
เช่น MFA (Multi Factor Authentication), Conditional Access and Windows Hello for Business
โดยคุณธัญพล ษณะนาคินทร์
Microsoft MVP (Azure)
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
Key components of the Enterprise Mobility Suite are Azure AD Premium, Windows Intune and Azure Rights Management.
Learn from Peter De Tender, Microsoft Infrastructure Architect, MCT and MVP not only what the Microsoft Enterprise Mobility Suite is, but also how one can deploy it in an enterprise organization. By attending this session, you will gain the knowledge to optimize the adoption of IT, BYOD and SaaS as the core cloud solution components. Key concepts that will be covered are identity and access management, mobile device management and data protection.
In this webinar, we will walk through how we can utilize password less authentication method in Azure AD by means of which you skip the password and do all your identity verification on your phone.
"Secure Mobile Apps with the Microsoft Identity Platform", Christos Matskas, ...Fwdays
If you ever had to deal with identity within your solutions then this is the session for you. Join JP and Christos to find out how to implement authentication and authorization for your mobile apps and back-end services using the Microsoft Identity platform. We will show you how to use our libraries to quickly connect to our platform and authenticate your users in a few, basic steps. Get ready for demos and examples the highlight how the Microsoft Identity Platform allows you to create scalable and secure applications.
Similar to SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Active Directory Premium (20)
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
3. MVP Office Servers and Services
Nuno Árias Silva
Blog: www.nuno-silva.net
Email : email@nuno-silva.net
Twitter : NunoAriasSilva
Facebook : nunoarias
LinkedIn : nunoarias
I advise my clients to be proactive in adopting new
Microsoft technologies that help them to reach business
needs and to accomplish their goals.
Has more than 19 years working on IT, with Master in
Information Technologies, last projects have more focus in
Office 365, Infrastructures and Security within Microsoft
Infrastructure Products.
GFI
Manager - Infrastructure Services
nuno.a.silva@gfi.pt
6. Identity for Microsoft cloud services
User
Microsoft Account
Ex: alice@outlook.com
User
Organizational Account
Ex: alice@contoso.com
Microsoft Account Microsoft Azure Active Directory
7. Federated identitySynchronized identity
Cloud identity
On-premises
directory
Zero on-premises
servers
On-premises
directory
Directory sync with
password sync
On-premises
identity
Between zero and three additional on-premises
servers depending on the number of users
On-premises
identity
Between two and eight on-premises servers and networking
configuration depending on the sign-in availability requirements
Directory
sync
Federation
Office 365 Identity Models
8. Hyper scale Infrastructure is the enabler
27 Regions Worldwide, 22 ONLINE…huge capacity around the world…growing every year
100+ datacenters
Top 3 networks in the world
2.5x AWS, 7x Google DC Regions
G Series – Largest VM in World, 32 cores, 448GB Ram, SSD…
Operational
Announced/
Central US
Iowa
West US
California
East US
Virginia
US Gov
Virginia
North Central US
Illinois
US Gov
Iowa
South Central US
Texas
Brazil South
Sao Paulo State
West Europe
Netherlands
China North *
Beijing
China South *
Shanghai
Japan East
Tokyo, Saitama
Japan West
Osaka
India South
Chennai
East Asia
Hong Kong
SE Asia
Singapore
Australia South East
Victoria
Australia East
New South Wales
* Operated by 21Vianet
India Central
Pune
Canada East
Quebec City
Canada Central
Toronto
India West
Mumbai
Germany North East
Magdeburg
Germany Central
Frankfurt
United Kingdom
Regions
North Europe
Ireland
East US 2
Virginia
New
11. What is Multi-Factor Authentication?
Multiple factors are required for sign-In
Familiar to consumer cloud service users such as the Microsoft Account
Simple block to password compromise from another country
Addresses regulatory compliance and high risk user scenarios
AKA two-factor, 2FA, MFA, strong authentication
Two or more of the following factors:
Something you know – a password or PIN
Something you have – a phone, credit card or hardware token
Something you are – a fingerprint, hand geometry, retinal scan or other biometric
Stronger when using two different channels (out-of-band)
Types of multi-factor authentication:
Hardware OTP Tokens
Certificates
Smart Cards
Phone-Based Authentication:
Phone Call, Text Message, and Push
Software OTP Tokens
12. What is Multi-Factor Authentication?
Powered by PhoneFactor, acquired
by Microsoft in 2012
Trusted by thousands of enterprises
to authenticate employee, customer,
and partner access
Secures applications and identities
in the cloud and on-premises
13. Now Included with Office 365
Multi-Factor Authentication for Office 365
Announced on the Office Tech Blog
http://blogs.office.com/2014/02/10/multi-factor-authentication-for-office-365/
Included in all Office 365 SKUs for Sign-In users at no additional cost
Except Small Business SKUs and Dedicated SKUs
Extends what is currently available for Office 365 tenant admins
Admins can now enable all Sign-In users for Multi-Factor Authentication
Does not replace Microsoft Azure Multi-Factor Authentication
14. Mobile Apps
Enterprise authentication using any phone
Text MessagesPhone Calls
Push Notification
One-Time-Passcode
(OTP) Token
Out-of-Band* Call Text
One-Time Passcode
(OTP) by Text
*Out of band refers to completing
the second factor through a
different channel than the first
factor.
16. • Provides Office rich client login as
alternative to Multi-Factor
Authentication
• 16 characters randomly generated,
viewed once
• Up to 40. Use one on multiple
applications or different one for each
application
App Passwords
17. Specific Scenarios
Federated Users
Office 365 resources just needs Multi-Factor Authentication for Office 365
Use Azure Multi-Factor Authentication Server for other ADFS connected applications
Hybrid
On-premises server applications require Azure Multi-Factor Authentication Server
Example: MSIT Lync on-premises and Exchange Online
PowerShell
Create a service account which is an administrator and control access
20. Office client Multi-Factor
Authentication Futures
Updated Office 2013 clients to support Multi-Factor
Authentication
No need for App Passwords in updated clients
If you can authenticate in a web browser, then you can authenticate in Office clients
Outlook, Lync, Word, Excel, PowerPoint, PowerShell, OneDrive for Business
Clients will also support
Federation Identity Providers using SAML/P protocol
US DoD Common Access Card (CAC)
US Federal Personal Identity Verification card (PIV)
21. • Build on top of Active Directory Authentication
Library (ADAL)
• ADAL implements simple OAuth protocol that AAD
and ADFS 3.0 understand
• Office does OAuth to those endpoints
• Those endpoints implement a number of protocols
with other IdPs (SAML-P 2.0, WS-Fed)
• AAD and ADFS issue OAuth tokens based on the
results that Office uses against its workloads
Office client Multi-Factor Authentication
22. The MFA Flow Azure
Active
Directory
1
2
www-authenticate: Bearer
authorization_uri:
https://login.windows.ne
t
Federated
tenant
Secure
Token
Service
4 Do federated sign-in
using SAML-P, WS-Fed,
etc.
SAML token
5 Validate assertions
Hand back token for 365
JWT token
3 Auth against
https://login.windows.net
...
6 JWT token
Office
1. Office makes a request to a service
which supports new MFA flow
2. Service instructs Office to visit an STS
which speaks a simple standards based
protocol (OAuth)
3. Office instructs AD library to launch
web browser control
4. MFA and federation magic happens
transparent to Office
5. Office gets back simple tokens that it
caches for future communication with
its services
6. Office sends token to service
25. Azure MFA Requires a Microsoft Azure subscription
Use of Office 365 with Azure MFA requires a link from the Microsoft Azure subscription to the Office 365 tenant
Having MFA for Office 365 does not reduce Microsoft Azure MFA subscription costs
Microsoft Azure Multi-Factor Authentication
26. Multi-Factor Authentication for Office 365 compared
to Microsoft Azure MFA
Multi-Factor Authentication
for Office 365
Microsoft Azure Multi-
Factor Authentication
Administrators can Enable/Enforce MFA to end-users Yes Yes
Use Mobile app (online and OTP) as second authentication factor Yes Yes
Use Phone call as second authentication factor Yes Yes
Use SMS as second authentication factor Yes Yes
App passwords for non-browser clients (e.g., Outlook, Lync) Yes Yes
Default Microsoft greetings during authentication phone calls Yes Yes
Remember Me (Public Preview coming in June) Yes Yes
IP Whitelist (currently in Public Preview) Yes
Custom greetings during authentication phone calls Yes
Fraud alert Yes
Event Confirmation Yes
Security Reports Yes
Block/Unblock Users Yes
One-Time Bypass Yes
Customizable caller ID for authentication phone calls Yes
MFA Server – MFA for on-premises applications Yes
MFA SDK – MFA for custom apps Yes
27. Windows Server
AD or Other LDAP
On-Premises Apps
RADIUS
LDAP
IIS
RDS/VDI
Multi-Factor
Authentication
Server
Multi-Factor
Authentication
Service
Cloud Apps
Users must also authenticate using their phone
or mobile device before access is granted.2
Microsoft Azure
Active Directory
Users sign in from any device using
their existing username/password.
1
Authentication Process
28. How to Enable
To create a Multi-Factor
Auth Provider sign into the
Windows Azure
Management Portal and go
to Active DirectoryMFA
Server Providers. Create a
new provider by providing a
name, usage model for
billing and link it to your
directory unless being used
for on-premises applications
only.
30. • Office 365 SKUs include Multi-Factor Authentication
• Users are Enabled and then Enforced
• Users can create App Passwords for client apps
• Updated Office 2013 clients
• Office 365 tenants can be connected to Azure
• Azure Multi-Factor Authentication has additional
features
Summary
31. The updated authentication are available now
Introduction to ADAL based authentication
The ADAL based authentication stack enables the
Office 2013 clients to engage in browser-based
authentication (also known as passive
authentication) where the user is directed to a
web page from the identity provider to
authenticate. The above screenshot shows the
default web page from Azure Active Directory
(Azure AD), which is used by Office 365.
32. Azure Multi-Factor Authentication
http://azure.microsoft.com/en-us/services/multi-factor-authentication/
Securing access to cloud services - Information for Administrators
http://technet.microsoft.com/en-us/library/dn394289.aspx
Azure Active Directory Editions
http://msdn.microsoft.com/library/azure/dn532272.aspx
How to Setup
http://blogs.msdn.com/b/mvpawardprogram/archive/2015/03/23/office-365-multi-
factor-authentication-with-microsoft-azure-active-directory.aspx
Support Links
Why this Slide:
This is SUCH a big investment – it’s a game for only very few. It’s not new for us – we have been doing this for our own services and our consumer/web properties for 20+ years
Key Points:
Where are we – EVERYWHERE…!
How big is this - $15+ B and counting – this is serious, we continue to bet big and you can count on us
Talk about DC innovation – DC Efficiency and Gen 5 data centers.
Scale – at this scale you do get efficiencies – the main one being POWER
Remember our “strategy” – we will be in the major places, but not everywhere – we have Azure Stack/Hosters for that.
Transition to NEXT Slide: This is the physical infrastructure that Azure sits on, now lets talk about Azure the PLATFORM