Introduction to the Office Dev PnP Core LibrariesEric Shupps
Â
The Office 365 Developer Patterns and Practices (PnP) team have released two libraries focused on increase developer productivity by reducing the amount of code needed when building remote applications. The Office 365 Developer PnP Core Component is a managed code library that extends and encapsulates commonly used Client Object Model operations. The Office 365 Developer PnP JavaScript Core Library is a JavaScript library that simplifies the use of the REST API. After a brief discussion of the Office 365 Developer Patterns and Practices project as a whole, we’ll move to demos showing how you get started using the Office 365 Developer PnP Core libraries.
Introduction to the Office Dev PnP Core LibrariesEric Shupps
Â
The Office 365 Developer Patterns and Practices (PnP) team have released two libraries focused on increase developer productivity by reducing the amount of code needed when building remote applications. The Office 365 Developer PnP Core Component is a managed code library that extends and encapsulates commonly used Client Object Model operations. The Office 365 Developer PnP JavaScript Core Library is a JavaScript library that simplifies the use of the REST API. After a brief discussion of the Office 365 Developer Patterns and Practices project as a whole, we’ll move to demos showing how you get started using the Office 365 Developer PnP Core libraries.
Webinar - Migrating Legacy On Premise Solutions to SharePoint Online and Wind...Eric Shupps
Â
As many organizations move away from on-premise SharePoint deployments in favor of externally hosted solutions, developers will increasingly be called upon to make legacy applications compatible with cloud-based services. In this session we will explore the various options available for creating SharePoint applications in the cloud, discuss the pros and cons of each approach, delve into the technical aspects of cloud development, and provide real-world guidance for creating an on-premise-to-cloud migration strategy.
ECS 2018: Introduction to Azure Web ApplicationsEric Shupps
Â
The Azure platform offers many opportunities for developers to build robust, cloud-first applications that integrate directly with Office 365. Learn how to leverage the power of the Microsoft cloud infrastructure to create solutions with fully-integrated single sign-on and authorization. Discover tips and tricks for rapidly building, deploying and managing Azure solutions, along with techniques for leveraging the Office 365 API’s from your cloud applications.
Pushing the Boundaries - A Deep-Dive into Real-World SharePoint Add-In and Ap...Eric Shupps
Â
You need to build solid apps that deliver real business value but the Cloud Application Model in SharePoint 2013 and Office 365 is a work in progress. How do you avoid the pitfalls and limitations that can sink a project? Where does the app model shine and where does it fall short? What hidden “gotchas” are lurking behind the scenes that you need to know about before getting started? These questions and a whole lot more will be answered in a series of deep-dive demonstrations and live-coding exercises. This is a no-holds-barred session that will show you exactly which techniques are ready for prime time and which don’t quite make the cut.
From Zero to Hero: A Real World Guide to Building High Availability SharePoin...Eric Shupps
Â
Building SharePoint farms for development and testing is easy. But building highly available farms to meet enterprise service level agreements that are fault tolerant, scalable and connected to the cloud? Not quite so easy. In this workshop you will learn how to plan, design and implement a highly availability farm architecture based upon proven techniques and practical guidance.
Understanding SharePoint Apps, authentication and authorization infrastructur...SPC Adriatics
Â
This session will teach you everything that you need to know in order to understand SharePoint Apps, authentication and authorization. Learn about the different type of Apps, the underlying Apps architecture and how to configure an on-premises environment to support Apps. Also you will learn about the different authentications options available for integrating apps, devices, and applications for on-prem scenarios, in the cloud and hybrid.
Office Development Licensing, Deployment and ALMEric Shupps
Â
An introduction to the concepts, options, restrictions and use of the licensing API's, deployment mechanisms and automated lifecycle management options in Office and SharePoint development.
Webinar - Migrating Legacy On Premise Solutions to SharePoint Online and Wind...Eric Shupps
Â
As many organizations move away from on-premise SharePoint deployments in favor of externally hosted solutions, developers will increasingly be called upon to make legacy applications compatible with cloud-based services. In this session we will explore the various options available for creating SharePoint applications in the cloud, discuss the pros and cons of each approach, delve into the technical aspects of cloud development, and provide real-world guidance for creating an on-premise-to-cloud migration strategy.
ECS 2018: Introduction to Azure Web ApplicationsEric Shupps
Â
The Azure platform offers many opportunities for developers to build robust, cloud-first applications that integrate directly with Office 365. Learn how to leverage the power of the Microsoft cloud infrastructure to create solutions with fully-integrated single sign-on and authorization. Discover tips and tricks for rapidly building, deploying and managing Azure solutions, along with techniques for leveraging the Office 365 API’s from your cloud applications.
Pushing the Boundaries - A Deep-Dive into Real-World SharePoint Add-In and Ap...Eric Shupps
Â
You need to build solid apps that deliver real business value but the Cloud Application Model in SharePoint 2013 and Office 365 is a work in progress. How do you avoid the pitfalls and limitations that can sink a project? Where does the app model shine and where does it fall short? What hidden “gotchas” are lurking behind the scenes that you need to know about before getting started? These questions and a whole lot more will be answered in a series of deep-dive demonstrations and live-coding exercises. This is a no-holds-barred session that will show you exactly which techniques are ready for prime time and which don’t quite make the cut.
From Zero to Hero: A Real World Guide to Building High Availability SharePoin...Eric Shupps
Â
Building SharePoint farms for development and testing is easy. But building highly available farms to meet enterprise service level agreements that are fault tolerant, scalable and connected to the cloud? Not quite so easy. In this workshop you will learn how to plan, design and implement a highly availability farm architecture based upon proven techniques and practical guidance.
Understanding SharePoint Apps, authentication and authorization infrastructur...SPC Adriatics
Â
This session will teach you everything that you need to know in order to understand SharePoint Apps, authentication and authorization. Learn about the different type of Apps, the underlying Apps architecture and how to configure an on-premises environment to support Apps. Also you will learn about the different authentications options available for integrating apps, devices, and applications for on-prem scenarios, in the cloud and hybrid.
Office Development Licensing, Deployment and ALMEric Shupps
Â
An introduction to the concepts, options, restrictions and use of the licensing API's, deployment mechanisms and automated lifecycle management options in Office and SharePoint development.
Mastering Modern Authentication and Authorization Techniques for SharePoint, ...Eric Shupps
Â
In the cloud-first era, application development for SharePoint, Office 365 and Azure AD requires strong working knowledge of modern authentication and authorization techniques across multiple platforms. in this deep-dive session, developers will learn how to create secure, cloud-ready applications using OAuth, ADAL, and Azure AD to communication with the Microsoft Graph, SharePoint and other cloud-connected services.
Who Are You and What Do You Want? Working with OAuth in SharePoint 2013.Eric Shupps
Â
The new SharePoint 2013 App model extends native SharePoint applications into the cloud, allowing developers to write applications that interact with SharePoint data remotely. With these new capabilities come additional challenges for managing security and user authorization via OAuth. Administrators, IT professionals, and developers should attend this session to familiarize themselves with the core concepts behind OAuth in SharePoint 2013, learn how best to configure and manage OAuth in their environment, and discover how OAuth is used in the SharePoint app model.
Azure Networking, Azure Storage, Enterprise Azure Active Directory, Daemon or Server application authentication workflow, Worker processes, Daemon, Daemon application to Web API, Azure Active Directory in old azure portal, ASM, Azure active directory and Mutl-tenant applications, Sharding, Federation, Shared singe, RBAC, Differences between AAD and AD DS, Azure AD Subscription models, Azure Domain Names, Manage Users, Groups,Co-Admin Role, Default Azure Active Directory, Adding access to another azure subscription. Contributor, Owner , Roles in Azure Subscriptions, Roles, MFA, Multi-Factor Authentication, How does MFA works, Scenarios for Azure MFA, Setting up MFA in Azure AD, Setting MFA, Azure Authenticator, Hybrid AD solutions, AD DS, Federated Trust, Domain Controller, AD, AAD Connecter, AD FS, AAD, Active Directory Password synchronization, Benefits of Active Directory, Active Directory Replication, vulnerabilities with multiple Domain Controller, Azure AD features, Synchronization with AD Connect, Write-back policies, Azure AD Health COnnect, Installing Azure AD COnnect Health,Integrating Azure AD and SaaS Applications, Benefits of using SaaS Solutions with your products, Benefits of SaaS Solutions, Azure Marketplace, DropBox Integrations with AAD, New Relic Integrations, New Relic, Dropbox, Azure AD Enterprise Application, VSTS integration for Automated Builds, Federation Overview, Claims, Single Sign On, Federated Trusts, Claim based authentications, Federated trusts, Claims Processing, Web Application Proxy, ADFS Proxy, ADFS 2.0 Proxy, How does ADFS proxy works for internal users, How does ADFS proxy works for internal users,Azure AD B2C Directory, B2C applications, Business 2 Customers application, 3rd Party Authentication, Bearer Token, OAuth, 3rd Party Identity Provider, OAuth server, Azure AD B2C Authentication & Authorization, Implementing Azure AD B2C Directory, Setting up Single Sign On with Facebook, Google, Microsoft. Linkedin, SignUP Policies, SignIN Policies, Email SignUp, SignUpSignIN PolicyID, Configuring Application with Azure Application ID,Modern Applications, Requirements for Modern Apps, API, Logic Applications, Mobile App, Web App, Function App, Go To Market, Microsoft Application Platform, App Service Plan, App Service Environment - Private Infrastructure, Why use App Service, App service Features & Capabilities, Azure App Service, Virtual Machine, Service Fabric & Cloud Services Comparison, Creating a Mobile App, Swagger UI, API Apps, API management, API APPS & API Management, Implementing API APP via Visual Studio,
[Eric Shupps] The Azure platform offers many opportunities for developers to build robust, cloud-first applications that integrate directly with Office 365. Learn how to leverage the power of the Microsoft cloud infrastructure to create solutions with fully-integrated single sign-on and authorization. Discover tips and tricks for rapidly building, deploying and managing Azure solutions, along with techniques for leveraging the Office 365 API’s from your cloud applications.
In this session we are joined by Miao Jiang who is a Program Manager on the API Management Team. Miao will share with us some of the latest things that the Azure API Management Team have been working on and how we can use this to build great API solutions.
Once you integrated with AD for one reason (SSO, one specific workload, etc), gaining access to the rest of the platform (other workloads, different dev stack, etc) is nearly free. Most common tasks take far less code and config than people think! Microsoft Graph makes it possible to do interesting things most people don’t realize, with less effort than anticipated. Come learn how to leverage what you've already done to drive additional business value at scale.
Securing ap is oauth and fine grained access controlAaronLieberman5
Â
API security is always a major consideration, but most API developers feel like they are not equipped with the skills necessary to properly secure an API.
In this presentation, we will talk about how some common API gateway security mechanisms can work effectively to secure a MuleSoft API. We will start with key concepts of API security such as zero trust, OAuth 2.0, and access control. Then, we will demonstrate a secure method to protect your APIs using OAuth 2.0 and token introspection to achieve access control on a MuleSoft API. The solution will demonstrate how to use the combination of MuleSoft security policies and a powerful identity provider in PingFederate by Ping Identity to achieve API security on MuleSoft APIs.
No API security session is complete without discussing different methods of API security and lessons learned from working through the demo so we will close with discussing various options that can be used to achieve similar results for API security and what the benefits or downfalls are of each option.
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...CA Technologies
Â
CA Single Sign-On (CA SSO) is constantly evolving, incorporating the latest technologies in secure Web access management. In order to stay secure and competitive, CA SSO makes greater use of the CA Access Gateway (formerly CA SiteMinder Secure Proxy Server). This presentation provides a comprehensive overview of the new features in CA Single Sign On.
For more information on CA Security solutions, please visit: http://bit.ly/10WHYDm
Five Things You Gotta Know About Modern IdentityMark Diodati
Â
Modern identity supports the new world built on device-independent, location-anywhere access. New-school provisioning and authentication are requiremed. Its protocols are increasingly built upon frameworks like REST and JSON; examples include SCIM, OAuth OpenID Connect and FIDO. Modern identity leverages IDaaS and identity bridges to manage users and applications across the hybrid cloud.
Mastering Modern Authentication and Authorization for SharePoint and Office A...Eric Shupps
Â
In the cloud-first era, application development for SharePoint, Office 365 and Azure AD requires strong working knowledge of modern authentication and authorization techniques across multiple platforms. In this deep-dive session, developers will learn how to create secure, cloud-ready applications using OAuth, ADAL, and Azure AD to communicate with the Microsoft Graph, SharePoint, and other cloud-connected services.
Oauth Nightmares Abstract OAuth Nightmares Nino Ho
Â
https://www.hackmiami.com/hmc5-speakers-day-2
OAuth is one of the most popular authorization frameworks in use today. All major platforms such as Google, Facebook, Box etc support it and you are probably thinking of implementi ng OAuth for your product/platform.We are not debating the popularity of the protocol or the limitations that come with it. We are here to help you implement it securely. When you use OAuth, there are three pieces - The Platform , the Application (using the platform) and the User (of the application). We will go over the common flaws we have seen in applications built on a OAuth platform which can lead to complete account takeover, how they can be a security engineer's nightmare, and how to fix them. We will go over security controls that the platform can put in place to help mitigate security vulnerabilities. We will also cover how bad design decisions, if chained with otherwise lower risk vulnerabilities can result in gaping holes in your OAuth implementation. You will leave this session with a deep understanding of how OAuth implementation should be secured both for a platform and in an application and things to test for during a security evaluation of OAuth implementations.
Similar to SPUnite17 Introduction to Azure Web Applications (20)
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Â
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Â
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Â
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Â
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Â
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview​
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Â
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Â
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
10. Bound to single AD domain
Cannot be accessed by other domains
Simplified authorization model
Owned by single authorizing domain
Accessible by any Azure AD domain
Authorized by Azure admin for individual domains
App owner must manage tenant registration
13. Developers cannot modify login experience
User interface is suboptimal
Access to resources requires permission definition
OAuth tokens for O365
POST to app with user/tenant details
App launcher in O365
Users notified of app availability in alerts
14. Authorization
Exchange
authorization codes
for access tokens
Refresh tokens enable
long-lived sessions
Designed for native
clients and server-side
API’s
Client
Credential
Requires app
authorization consent
from administrator
Shared secrets or
certificates used to
request tokens
Designed for service
apps and server-to-
server scenarios
Implicit
Retrieve access tokens
directly from single
endpoint
No refresh tokens
(local session
management only)
Designed for SPA's
(requires manifest
modification)
15. Manifest: oauth2AllowImplicitFlow = true (SPA, JavaScript)
Token and authorization endpoints
Tenant ID = “common” for multi-tenant
WSFED “common” endpoint
Non-customizable consent page in MSFT domain
GET: https://login.microsoftonline.com/common/oauth2/authorize?client_id={client
ID}& response_type=token&redirect_uri={redirect URI}
16. Application
Delegated
Minimum: “Sign in and read user profile”
Beware permission level restrictions
Exchange Yammer Azure AD
SharePoint Online Power BI Azure Management
O365 Management Skype