Hands-On Lab. Introduction to the AppFabric Access Control Service (September 2010 Labs Release) Lab version: 1.0.0

Size: px
Start display at page:

Download "Hands-On Lab. Introduction to the AppFabric Access Control Service (September 2010 Labs Release) Lab version: 1.0.0"

Transcription

1 Hands-On Lab Introduction to the AppFabric Access Control Service (September 2010 Labs Release) Lab version: Last updated: 11/16/2010

2 CONTENTS OVERVIEW... 3 EXERCISE 1: USE ACCESS CONTROL SERVICE FOR ACCEPTING USERS FROM MULTIPLE IDENTITY PROVIDERS... 6 Task 1 Creating the Initial Solution... 6 Task 2 Signing-up for Windows Azure AppFabric Labs Access Control Service and Creating the Service Namespace Task 3 Configuring the Allowed Identity Providers, the Relying Party and the Signing Certificate. 14 Task 4 Configuring a Website to Accept Tokens from Access Control Service Exercise 1: Verification Exercise 1: Summary EXERCISE 2: USE CLAIMS FOR AUTHORIZING USERS Task 1 Visualizing the Claims from the Access Control Service Task 2 Creating Authorization Rules Task 3 Authorizing Based on the Claims Provided by Access Control Service Exercise 2: Verification Exercise 2: Summary EXERCISE 3: TAKE CONTROL OF THE SIGN-IN EXPERIENCE Task 1 Hosting a Login Page as Part of your Application Exercise 3: Verification Exercise 3: Summary SUMMARY... 45

3 Overview Connecting one application to its users is one of the most basic requirements of any solution, whether deployed on-premises, in the cloud or on both. The emergence of standards is helping to break the silos which traditionally isolate accounts stored by different web sites and business entities, however offering application access to users coming from multiple sources can still be a daunting task. As of today, if you want to open your application to users coming from Facebook, Live ID, Google and business directories the brute-force approach demands you to lean and implement four different authentication protocols. Changes in today s world happen fast and often, forcing you to keep updating your protocol implementations to chase the latest evolutions of the authentication mechanisms of the user repositories. All this can require a disproportionate amount of energy, leaving you with fewer resources to focus on your business. Figure 1 A functional view of the Access Control Service Enter the AppFabric Access Control Service (ACS). ACS offers you a way to outsource authentication and decouple your application from all the complexity of maintaining a direct relationship with all the identity providers you want to tap from. ACS takes care of engaging every identity provider with its own authentication protocol, normalizing the authentication results in a protocol supported by the.net framework tooling (namely the Windows Identity Foundation technology, or WIF) regardless of from where the user is coming from. WIF allows you in just few clicks to elect the ACS as the authentication manager for your application; from that moment on ACS takes care of everything, including providing a UI for the user to choose among all the recognized identity providers.

4 Furthermore, ACS offers you greater control over which user attributes should be assigned for every authentication event; again in synergy with WIF, those attributes (called claims) can be easily accessed for taking authorization decisions without forcing the developer do understand or even be aware of the lower level mechanisms that the authentication protocols entail. In this introductory hands-on lab you will learn how to take advantage of the ACS for outsourcing authentication, managing multiple identity sources, performing some basic authorization tasks and take control of the authentication experience. You will discover that it takes less to do it than to describe it! Objectives In this Hands-On Lab, you will learn how to: Configure your application to outsource authentication to ACS Configure ACS to include the identity providers you want to leverage Configure ACS to process incoming identities and add new claims Modify your application to consume claims from ACS and drive authroization decisions Customize the default authentication user experience provided by ACS System Requirements You must have the following items to complete this lab: Microsoft Windows Vista SP2 (32-bits or 64-bits), Microsoft Windows Server 2008 SP2 (32- bits or 64-bits), Microsoft Windows Server 2008 R2, or Microsoft Windows 7 RTM (32-bits or 64-bits) Microsoft.NET Framework 4 Microsoft Visual Studio 2010 Microsoft Windows Identity Foundation Runtime Microsoft Windows Identity Foundation SDK Microsoft Windows PowerShell Setup For convenience, much of the code used in this hands-on lab is available as Visual Studio code snippets. To check the prerequisites of the lab and install the code snippets: 1. Open a Windows Explorer window and browse to the lab s Source\Setup folder.

5 2. Double-click the Dependencies.dep file in this folder to launch the Dependency Checker tool and install any missing prerequisites and the Visual Studio code snippets. 3. If the User Account Control dialog is shown, confirm the action to proceed. Note: This process may require elevation. The.dep extension is associated with the Dependency Checker tool during its installation. For additional information about the setup procedure and how to install the Dependency Checker tool, refer to the Setup.docx document in the Assets folder of the training kit. Note: If you have never run Visual Studio before on the machine, please make sure to do so before running the setup of this lab. Note: When you first start Visual Studio, you must select one of the predefined settings collections. Every predefined collection is designed to match a particular development style and determines window layouts, editor behavior, IntelliSense code snippets, and dialog box options. The procedures in this lab describe the actions necessary to accomplish a given task in Visual Studio when using the General Development Settings collection. If you choose a different settings collection for your development environment, there may be differences in these procedures that you need to take into account. Using the Code Snippets Throughout the lab document, you will be instructed to insert code blocks. For your convenience, most of that code is provided as Visual Studio Code Snippets, which you can use from within Visual Studio 2010 to avoid having to add it manually. If you are not familiar with the Visual Studio Code Snippets, and want to learn how to use them, you can refer to the Setup.docx document in the Assets folder of the training kit, which contains a section describing how to use them. Exercises The following exercises make up this Hands-On Lab: 1. Outsource Authentication to multiple Identity Providers 2. Create claims mapping rules and add claims-driven authorization to an application 3. Take control of the Sign-In experience

6 Note: Each exercise is accompanied by a starting solution. These solutions are missing some code sections that are completed through each exercise and therefore will not necessarily work if running them directly. Inside each exercise you will also find an end folder where you find the resulting solution you should obtain after completing the exercises. You can use this solution as a guide if you need additional help working through the exercises. Estimated time to complete this lab: 45 minutes Exercise 1: Use Access Control Service for Accepting Users from Multiple Identity Providers In the first exercise you will familiarize with ACS basic settings and terminology. Your task is to secure access to a newly created ASP.NET Web site. The Web site will accept users from Google, Yahoo! and Windows Live Id. As you will see in a minute, ACS makes it real easy. Task 1 Creating the Initial Solution 1. Open Microsoft Visual Studio 2010 with administrator privileges. From Start All Programs Microsoft Visual Studio 2010, right-click on Microsoft Visual Studio 2010 and select Run as administrator. 2. Open the WebSiteACS.sln empty solution file located inside the Source\Ex01- AcceptUsersFromMultipleIPs\Begin folder of this Lab. 3. Create a new empty website. From File Add New Web Site, select Visual C# in Installed Templates section and then click on ASP.NET Web Site. Change the Web location field to use HTTP and set the value with

7 Figure 2 Add New Web Site 4. Go to Solution Explorer and delete the following folders from the web site: Account Scripts And the following files: About.aspx Global.asax Figure 3 Solution Explorer

8 5. Open Site.master file and remove the DIV with class named logindisplay and the NavigationMenu menu control. ASP.NET... <div class="page"> <div class="header"> <div class="title"> <h1> My ASP.NET Application </h1> </div> <div class="logindisplay"> <asp:loginview ID="HeadLoginView" runat="server" EnableViewState="false"> <AnonymousTemplate> [ <a href="~/account/login.aspx" ID="HeadLoginStatus" runat="server">log In</a> ] </AnonymousTemplate> <LoggedInTemplate> Welcome <span class="bold"><asp:loginname ID="HeadLoginName" runat="server" /></span>! [ <asp:loginstatus ID="HeadLoginStatus" runat="server" LogoutAction="Redirect" LogoutText="Log Out" LogoutPageUrl="~/"/> ] </LoggedInTemplate> </asp:loginview> </div> <div class="clear hideskiplink"> <asp:menu ID="NavigationMenu" runat="server" CssClass="menu" EnableViewState="false" IncludeStyleBlock="false" Orientation="Horizontal"> <Items> <asp:menuitem NavigateUrl="~/Default.aspx" Text="Home"/> <asp:menuitem NavigateUrl="~/About.aspx" Text="About"/> </Items> </asp:menu> </div> </div>... The code should look like the code bellow: ASP.NET... <div class="page"> <div class="header"> <div class="title"> <h1> My ASP.NET Application </h1> </div> <div class="clear hideskiplink">

9 </div> </div> Open Web.config file and remove the following sections: connectionstrings system.web/authentication system.web/membership system.web/profile system.web/rolemanager The Web.config should look like the code bellow. XML <?xml version="1.0"?> <!-- For more information on how to configure your ASP.NET application, please visit --> <configuration> <system.web> <compilation debug="false" targetframework="4.0" /> </system.web> <system.webserver> <modules runallmanagedmodulesforallrequests="true"/> </system.webserver> </configuration> Note: all this cleanup is not strictly necessary, but it helps to keep things simple and highlight the code that will be required for integrating with ACS. 7. Press F5 to run the Web site and ensure us that it works as expected. If an alert about Debugging Not Enabled appears, select Modify the Web.config file to enable debugging and click on OK.

10 Figure 4 Debugging Not Enabled Alert Figure 5 Running Application 8. The Web site is, as expected, without any access control mechanism. You can close the browser.

11 Task 2 Signing-up for Windows Azure AppFabric Labs Access Control Service and Creating the Service Namespace You are now going to subscribe to ACS. As of today ACS is offered as a preview, in a lab environment, and is available free of charge. As the service moves to production this may change, but for the time being you can freely experiment. 1. Navigate to You will be prompted for your Windows Live ID credentials if you are not already signed in. Figure 6 Portal Appfabricslabs 2. Click create a project link. Note: If you already have a project, jump to step 7.

12 Figure 7 Clicking Create a Project 3. Type a name for your project in the Sign Up page. Figure 8 Project Signing up 4. Click OK button to create you project. 5. In My Projects click on the project name. Figure 9 Selecting the Project 6. Now you will add a new Service Namespace to your project. A Service Namespace represents a namespace for the Service Bus and the AppFabric Access Control: in other words, it is the unique component of the addresses at which all your endpoints on the AppFabric service will be available. To do this, click the Add Service Namespace link.

13 Figure 10 Add Service Namespace 7. Type in a name for your Service Namespace and click the Create button. Make sure to validate the availability of the name first. Service names must be globally unique as they are in the cloud and accessible by whomever you decide to grant access. Figure 11 Creating New Service Namespace Please be patient while your service is activated. It can take a few minutes while all the necessary resources are provisioned.

14 Figure 12 Activating Service Namespace You may have to refresh the browser to show the service is active. Figure 13 Active Service Namespace Task 3 Configuring the Allowed Identity Providers, the Relying Party and the Signing Certificate 1. From the Services Namespaces list, go to the Service Namespace just created and click on Access Control link. Figure 14 Click on Access Control link 2. Review the information like the service Status, Project ID, Subscription ID, etc. Click on Manage Access Control button.

15 Figure 15 Access Control Settings 3. This launches the Access Control Service Management Portal, shown in the figure below.

16 Figure 16 Access Control Service Management Portal 4. The Management Portal offers you a global view of all the settings you can change in ACS. In the typical application development flow, such as the one you are creating in this exercise, there is a natural order you can follow for providing ACS with the information it needs to set up authentication for you. Go to Manage - Trust Relationships section and click on Identity Providers link. You will land on a page which helps you to manage the identity providers from where your application users will come from.

17 Figure 17 Identity Providers 5. Click on Add Identity Provider link and choose the identity providers you want to add in your Access Control Service namespace. Windows Live Id is there by default. For this exercise please pick Google and Yahoo! as well. Figure 18 Adding Identity Provider 6. Leave the default settings and click Save.

18 Figure 19 The Yahoo Identity Provider configuration page 7. You can follow the same steps to add Google as an Identity Provider. 8. Click on Return to Access Control Services button on the lower right corner to return to the Access Control Service Management Portal home. Figure 20 Identity Providers configured

19 9. Go to Manage - Trust Relationships section and click on Relying Party Applications link (see figure 16) in order to register your Web site with ACS. Relying Party is identity speak for application, the entity which consumes identities, whereas as you already guessed Identity Provider indicates one entity which stores identities and is capable of authenticating users. 10. Click on Add Relying Party Application and fill the form with the following values: Name: WebSiteACS Realm: Return URL: Token format: SAML 1.1 Token encryption policy: None Token lifetime (secs): 600 Identity Providers: Google, Windows Live ID, Yahoo! Rule groups: Create New Rule Group Token signing: Use service namespace certificate (typical)

20 Figure 21 Add Relying Party Application 11. Click on the Save button.

21 12. Click on Return to Access Control Services button to Access Control Service Management Portal home, go to Manage - Trust Relationships section and click on Rule Groups link in order to select the default rule group for your application. Figure 22 An example of how ACS receives a token as proof of authentication (in this case from Google, but it can come from any recognized IP) and can emit for the application a token containing the original claims Note: When a user successfully authenticates with one identity provider, ACS receives from that identity provider an artifact (called security token ) which represents the proof that authentication took place. You don t need to know the details of how a security token looks like: the only information relevant at the moment is that the token contains information about the authenticated user, the so-called claims, which help ACS to establish who the current user is. ACS can process the incoming claims in various ways: you will see a simple example of that in the next exercise. In the current exercise we will configure ACS to enforce its default behavior, that is to say making sure that your application receives the claims as they came from the original identity providers. How does it do that? The ACS itself emits a token that your application is configured to consume (as you will see in just few steps). All it needs to do is to copy the incoming claims as is into the outgoing token. 13. Click on Default Rule Group for WebSiteACS and click on Generate Rules button. Then select the identity providers you want to automatically generate rules for, based on available claim types and click Save. Different identity providers offer different claims: ACS knows that and generates the default rules accordingly.

22 Figure 23 Generating Rules Figure 24 Rule Generation Options

23 Figure 25 Default Rules Generated 14. Click on Return to Access Control Services button to Access Control Service Management Portal home, go to Develop Application Code section and click on Application Integration link. Here there are various URIs that come in handy when configuring your application to take advantage of ACS. 15. Go to Endpoint Reference section and copy the value for WS-Federation Metadata. You will discover what that is and what it is used for right at the beginning of the next step. Figure 26 Copying WS-Federation Metadata Task 4 Configuring a Website to Accept Tokens from Access Control Service By now you know that ACS takes care of accepting tokens in different formats via different protocols from a number of possible identity providers, and normalizes the incoming information in a different token that your Web site will consume. ACS can emit different token types on various protocols. For

24 Web sites, the default protocol is WS-Federation. There s no need to go in the fine details: suffice to say that WS-Federation is a protocol that is natively understood by Windows Identity Foundation (WIF), an extension to the.net framework that allows you to easily outsource application authentication to tokens sources such as the ACS itself. In particular, WIF extends Visual Studio with a wizard which can automatically configure your application to outsource authentication without requiring you to write a single line of code. All it needs is the address of a machine-readable description of the token source to be used: in our case, that description is the WS-Federation Metadata address you saved at the end of Task 3. In this task you will use the WIF wizard to outsource authentication to ACS. 1. Back to Visual Studio and in the Solution Explorer, right-click the project and select Add STS reference. 2. When the Federation Utility window shows up, please go through the following tasks for each step in the wizard. a. On the Welcome page click Next to continue using the pre-populated fields. Figure 27 Welcome

25 b. On the STS options page select the third radio button "Use an existing STS" option, paste the endpoint address taken from Task 3 Step 13 in STS WS-Federation metadata document location field and click Next. Figure 28 Use an Existing STS option c. On the Security token encryption page select No encryption and click Next.

26 Figure 29 Security Token encryption d. On the Offered claims page click Next.

27 Figure 30 Offered Claims Note: The WS-Federation Metadata can contain descriptions of the claims that the endpoint offers. The wizard shows those to you so that you will know what information about incoming users you will be able to process in your application. In this case ACS declares that it can release information about which identity provider was actually used for authentication and a user identifier. e. On the Summary page review the changes that will be made and click Finish. Exercise 1: Verification It s time to give your newly secured Web site a spin. In order to verify that you have correctly performed all steps in exercise one, proceed as follows: 1. Start debugging by pressing F5. The relying party application ( will redirect to the Access Control Service to authenticate. 2. Choose an Identity Provider; you will be redirected to the identity provider s Web site where you will be prompted for entering your credentials. In this example we will use Windows Live Id: choosing other options will lead to comparable experiences.

28 Figure 31 Choosing you Favorite Identity Provider 3. In the Windows Live ID website enter your Live ID and password. Figure 32 Login with Windows Live ID 4. Upon successful authentication you will be redirected to ACS (observe the address bar) which will briefly process and redirect back to your Web site.

29 5. The process is entirely transparent to the user, but the Web site is now configured to verify that a valid token from the ACS is present in the call: that is the case, hence you are granted access and the default page finally appears in the browser. Figure 33 User Authenticated 6. Close the browser. Exercise 1: Summary In the first exercise you learned the ropes of using ACS for handling authentication for you. At the same time, you learned how to use WIF for automatically configure a Web site to outsource authentication to external entities. The process is exactly the same whether you point your application to ACS, an internal identity provider such as ADFS2, and any product complying with WS-Federation. Once you outsourced authentication to ACS, you can start changing settings (such as which identity providers should be used) directly at the ACS portal without the need to touch the application code.

30 Exercise 2: Use Claims for Authorizing Users The first exercise focused on granting access to users from multiple identity providers, but didn t do much with the incoming claims. In this exercise you will get a taste of what you can do with ACS for enriching the information you have about users for driving authorization decisions, without having to store any permanent information in the application itself. Your task is simple: you will assign a role to a specific user, and you will authorize certain actions on the Web site according to it. Task 1 Visualizing the Claims from the Access Control Service WIF does an excellent job at hiding the details of the underlying protocol negotiations. Before creating rules for processing claims, it is useful to take a peek behind the curtain and see exactly what the application receives from ACS. To that purpose, you will use a debug component which is capable of visualizing the incoming tokens directly on the Web site pages. 1. Copy the completed solution of the Ex01 to Source\Ex02-EasyAuthorizationWithACS\Begin. Figure 34 Copying the completed solution from the previous exercise

31 Note: Although exercises in our hands-on labs are normally independent from each other, in this case there are shared settings in the cloud that would not make much sense to duplicate here. If you didn t go through the first exercise and you didn t set up the ACS account, namespaces and similar you will need to follow the instructions of tasks 2, 3 and 4 from exercise 1 before going further with exercise Open Microsoft Visual Studio 2010 with administrator privileges. From Start All Programs Microsoft Visual Studio 2010, right-click on Microsoft Visual Studio 2010 and select Run as administrator. 3. Open the WebSiteACS.sln solution file (copied in step 1) located inside the Source\ Ex02- EasyAuthorizationWithACS \Begin folder of this Lab. 4. Go to the Solution Explorer and open Default.aspx file. 5. From the Visual Studio Toolbox drag and drop a Security Token Visualizer Control at the bottom of the main content control: Figure 35 Security Token Visualizer Control in Toolbox ASP.NET <cc1:securitytokenvisualizercontrol ID="SecurityTokenVisualizerControl1" runat="server" /> Note: In case no code appears when you drop the control on the page, please close Visual Studio, run the Configuration Wizard again and restart Visual Studio. 6. Open Web.config file and add the savebootstraptokens attribute inside microsoft.identitymodel section: XML <microsoft.identitymodel> <service savebootstraptokens="true"> <audienceuris> 7. Start debugging by pressing F5. The application will go through the same authentication routine enabled by the steps in exercise 1.

32 8. Choose Windows Live Id and authenticate as shown in the first exercise. 9. Expand the Security Token Visualizer Control. Figure 36 Security Token Visualizer Control Note: The Security Token Visualizer Control is showing the content of the security token issued by ACS. For the purposes of this exercise you can ignore most of that: the only thing that needs your attention is the first table on top, the one labeled Issued Identity. That table contains the claims carried by the incoming token, as established by the default rules. In the case of Windows Live Id, those claims are identity provider (which indicates from which identity provider the ACS received the authentication token from) and nameidentifier (which provides an identified which is unique for that user in the context of the ACS namespace). The nameidentifier value is very important, as we can use it for telling one user from another. More specifically, the nameidentifier value can be used as the input claim for transformation rules which will assign new claims to specific users. 10. Go to Issued Identity section and save the value of the nameidentifier claim in Notepad (Claim type and Claims value). Type depending on the Identity Provider you picked in previous step. 11. Close browser. Task 2 Creating Authorization Rules 1. Navigate to You will be prompted for your Windows Live ID credentials if you are not already signed in. 2. Click the project where you created your Service Namespace (Ex01 Task 2 Step 3). 3. From the Services Namespaces list, go to the Service Namespace you created on Ex01 Task 2 Step 3, click on Access Control link and review the information like the service status, Project ID, Subscription ID, etc..

33 4. Click on Manage Access Control button to launch the Access Control Service Management Portal. Figure 37 Access Control Settings 5. Go to Manage - Trust Relationships section and click on Rule Groups link. 6. Click on the rule group associated with your Relying Party: Default Rule Group for WebSiteACS and then click Add Rule. 7. Fill the form with the following values: If Then Rule information Claim issuer / Identity Provider: Windows Live ID (And) Input claim type / Select type: (And) Input claim value / Enter value: Claim value taken from Task 1 Step 10 Output claim type / Enter type: Output claim value / Enter value: Administrator

34 Description: Administrator claim rule Figure 38 Adding Rule 8. Click Save button. The rule you just entered assigns the role claim administrator to the Windows Live Id account you used for signing in the application earlier in the exercise. The specific claim type used for indicating role is automatically mapped by WIF into traditional Windows roles, as you will see in the next task.

35 Note that you could create analogous rules for other identity providers as well. In this lab we picked Windows Live Id because you are already required to have an account with it for signing up with ACS, but there s really nothing special about ACS and Windows Live Id: you can obtain the exact same result with any other identity provider, as long as a unique user identifier claim is available. Task 3 Authorizing Based on the Claims Provided by Access Control Service Now that the new rule has been added, the Web site will receive a token with the extra role claim in it. Let s leverage the role information for granting or denying access to some Web site function, such as access to special areas of one page. 1. Back to Visual Studio and on the Solution Explorer open Styles\Site.css file. 2. Add the following CSS class: CSS.secretContent { border-style: solid; background-color: Red; padding: 5px; color: White; } 3. Open Default.aspx and add the following ASP.NET Panel control at the bottom of the main content control: ASP.NET <p> You can also find <a href=" title="msdn ASP.NET Docs">documentation on ASP.NET at MSDN</a>. </p> <asp:panel Visible="false" CssClass="secretContent" runat="server" ID="SecretContent"> Secret Content (Only administrators can access this section) </asp:panel> <cc1:securitytokenvisualizercontrol ID="SecurityTokenVisualizerControl1" runat="server"></cc1:securitytokenvisualizercontrol> 4. Open Default.aspx.cs and add the following using statement: (Code Snippet Introduction to AppFabric AC Lab - Ex02 Default.aspx.cs Usings C#)

36 C# using System.Threading; 5. Now that we added some extra UI elements, let s make sure that only administrators will be able to see it. Add the following validation inside Page_Load method: (Code Snippet Introduction to AppFabric AC Lab - Ex02 Page_Load C#) C# if (Thread.CurrentPrincipal.IsInRole("Administrator")) { this.secretcontent.visible = true; } Exercise 2: Verification In order to verify that you have correctly performed all steps in exercise two, proceed as follows: 6. Start debugging by pressing F5. The relying party application ( will redirect to the Access Control Service to authenticate. 7. Select the Windows Live ID Identity Provider and put your credentials. The usual sequence of redirects occurs, and the user is authenticated. 8. The secret content section shows up, as the current user is in the administrator role.

37 Figure 39 Administrator Role Seeing Secret Content 9. Close the browser. 10. Start debugging again by pressing F Select another Identity Provider or use a different Windows Live Id account. 12. The secret content section is no longer visible.

38 Figure 40 Other Role not Seeing Secret Content 13. Close the browser. Exercise 2: Summary In the second exercise you learned how to manipulate the claims issued by ACS for your application, and how to use that information for driving authorization decisions. The exercise was very simple, assigning a role to a specific user; however it shows the power of the claims transformation rules approach and can be easily extended to more sophisticated cases. Exercise 3: Take control of the Sign-In experience Using the WIF wizard for outsourcing authentication to ACS creates what is often referred to as blanket protection : from that moment on, any attempt from an unauthenticated user to access any page in the Web site triggers a redirection to the ACS. There are various scenarios in which that is not the effect you

39 want to achieve: for example you may want to leave some pages available also to unauthenticated users, or you may want to take finer control on the authentication experience. ACS makes it easy for you to craft your own authentication pages if you choose to, by providing you with boilerplate HTML code already geared to use the endpoints in your own namespace. You can just cut and paste the code in your app and integrate it with whatever UI elements you see fit. The last exercise of this introductory lab shows you precisely how to do that. Task 1 Hosting a Login Page as Part of your Application 1. Copy the completed solution of the Ex02 to Source\Ex03-CustomSignInExperience\Begin. Figure 41 Copying the completed solution from the previous exercise Note: Although exercises in our hands-on labs are normally independent from each other, in this case there are shared settings in the cloud that would not make much sense to duplicate here. If you didn t go through the first exercise and you didn t set up the ACS account, namespaces and similar you will need to follow the instructions of tasks 2, 3 and 4 from exercise 1 before going further with exercise 3.

40 2. Navigate to You will be prompted for your Windows Live ID credentials if you are not already signed in. 3. Click the project where you created your Service Namespace (Ex01 Task 2 Step 3). 4. From the Services Namespaces list, go to the Service Namespace created on Ex01 Task 2 Step 3 and click on Access Control link. 5. Click on Manage button to launch the Access Control Service Management Portal. 6. Go to Develop Application Code section and click on Application Integration link. Figure 42 Application Integration 7. Click on Login Pages and select your relying party application (WebSiteACS).

41 Figure 43 Login Page Integration 8. Go to Option 2: Host the login page as part of your application and click on Download Example Login Page. 9. Save the HTML file in %SystemDrive%\inetpub\wwwroot\WebSiteACS \WebSiteACS folder of this Lab. 10. Open Microsoft Visual Studio 2010 with administrator privileges. From Start All Programs Microsoft Visual Studio 2010, right-click on Microsoft Visual Studio 2010 and select Run as administrator. 11. Open the WebSiteACS.sln solution file (copied in step 1) located inside the Source\ Ex03- EasyAuthorizationWithACS\Begin folder of this Lab. 12. Go to the Solution Explorer and right-click and Add Existing Item, select the HTML file that you downloaded in step 7 (WebSiteACSLoginPageCode.html). 13. Open the HTML file that you downloaded in step 9 (WebSiteACSLoginPageCode.html).

42 14. Go to the DIV tag with ID= Banner and replace the text Sign in to WebSiteACS with My custom login page for WebSiteACS. HTML <div id="main" style="display:none"> <div id="banner" class="banner"><b>my custom login page for WebSiteACS</b></div> 15. Go to <style> section and update the following CSS classes: div.signincontent width: 1020px; height: 170px; div.banner width: 1020px; background: none repeat scroll 0 0 #4B6C9E; color: #F9F9F9; div.leftarea width: 960px; The CSS classes should look like: CSS div.signincontent { text-align: center; margin-left: auto; margin-right: auto; border: solid 1px #BBBBBB; position: relative; width: 1020px; height: 170px; } div.banner { padding-top:10px; padding-bottom:10px; text-align: center; margin-left: auto; margin-right: auto; background: none repeat scroll 0 0 #4B6C9E;

43 } color: #F9F9F9; border-top: solid 1px #BBBBBB; border-left: solid 1px #BBBBBB; border-right: solid 1px #BBBBBB; width: 1020px; div.leftarea { padding:15px 15px; width: 960px; height: 100%; position: absolute; top: 0px; left: 0px; } 16. Go to the Solution Explorer and open Web.config file. 17. Add the following section inside <configurations> node: (Code Snippet Introduction to AppFabric AC Lab - Ex03 Location - XML) XML <configuration>... <location path="websiteacsloginpagecode.html"> <system.web> <authorization> <allow users="*"/> </authorization> </system.web> </location> 18. Go to microsoft.identitymodel/service/federatedauthentication/wsfederation section and update the issuer attribute with XML The web.config should look look the code bellow. <microsoft.identitymodel> <service savebootstraptokens="true">... <federatedauthentication>

44 <wsfederation passiveredirectenabled="true" issuer=" realm=" requirehttps="true"/> <cookiehandler requiressl="true"/> </federatedauthentication> 19. Save and close Web.config file. Exercise 3: Verification In order to verify that you have correctly performed all steps in exercise three, proceed as follows: 1. Start debugging by pressing F5. The relying party application ( will redirect to the Access Control Service to authenticate. 2. Choose your favorite Identity Provider (i.e.: Live ID) from your custom login page and put your credentials. Figure 44 Custom Login Page 3. Access Control sent to our application the claims it was expecting and we are now authenticated. 4. Close the browser. Exercise 3: Summary The last exercise of the lab showed you how you can seamlessly integrate ACS authentication elements in your Web site, demonstrating that you can take advantage of ACS advanced capabilities without having to break the experience and style you want for your web applications.

45 Summary By completing this Hands-On Lab you have learned how to: Configure your application to outsource authentication to ACS Configure ACS to include the identity providers you want to leverage Configure ACS to process incoming identities and add new claims Modify your application to consume claims from ACS and drive authorization decisions Customize the default authentication user experience provided by ACS The notion of outsourcing authentication to an external entity, instead of taking care of the details yourself, is an extremely powerful one. Windows Identity Foundation makes it easy to configure.net applications to trust their authentication needs to external authorities. The AppFabric Access Control Service is a great service to outsource authentication to, as it can easily abstract away the complexity of dealing with mutiple identity providers such as Windows Live Id, Facebook, Google, Yahoo! and even business providers such as directories enhanced by Active Directory Federation Services or equivalent. Furthermore, ACS offers powerful tools for manipulating the way in which the user s identity is processed before reaching your application. This introductory lab barely begun to explore the capabilities of ACS. Here we focused on Web sites, but ACS can handle just as well SOAP and REST web services; we used the portal, but ACS offers a rich management API which can be used to automate provisioning tasks; we focused on Web identities, but ACS offers comprehensive support for business identity providers and processing capabilites for the richer claims set they generate. If you are interested in knowing more about those capabilites, please refer to the upcoming intermerdiate and advanced hands-on labs.

Lab 4: ASP.NET 2.0 Membership, Login Controls, and Role Management

Lab 4: ASP.NET 2.0 Membership, Login Controls, and Role Management Lab 4: ASP.NET 2.0 Membership, Login Controls, and Role Management Forms authentication is a popular means of securing Internet applications. In ASP.NET s brand of forms authentication, you designate a

More information

Hands-On Lab. Part 1: Introduction to the AppFabric Service Bus. Lab version: Last updated: 11/16/2010. Page 1

Hands-On Lab. Part 1: Introduction to the AppFabric Service Bus. Lab version: Last updated: 11/16/2010. Page 1 Hands-On Lab Part 1: Introduction to the AppFabric Service Bus Lab version: 2.0.0 Last updated: 11/16/2010 Page 1 CONTENTS OVERVIEW... 3 GETTING STARTED: CREATING A SERVICE PROJECT... 6 Task 1 Creating

More information

Hands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1

Hands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1 Hands-On Lab Windows Azure Virtual Machine Roles Lab version: 2.0.0 Last updated: 12/14/2010 Page 1 CONTENTS OVERVIEW... 3 EXERCISE 1: CREATING AND DEPLOYING A VIRTUAL MACHINE ROLE IN WINDOWS AZURE...

More information

CONFIGURING AD FS AS A THIRD-PARTY IDP IN VMWARE IDENTITY MANAGER: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

CONFIGURING AD FS AS A THIRD-PARTY IDP IN VMWARE IDENTITY MANAGER: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE GUIDE MARCH 2019 PRINTED 28 MARCH 2019 CONFIGURING AD FS AS A THIRD-PARTY IDP IN VMWARE IDENTITY MANAGER: VMWARE WORKSPACE ONE VMware Workspace ONE Table of Contents Overview Introduction Audience AD FS

More information

Azure Developer Immersion Getting Started

Azure Developer Immersion Getting Started Azure Developer Immersion Getting Started In this walkthrough, you will get connected to Microsoft Azure and Visual Studio Team Services. You will also get the code and supporting files you need onto your

More information

Bringing Together One ASP.NET

Bringing Together One ASP.NET Bringing Together One ASP.NET Overview ASP.NET is a framework for building Web sites, apps and services using specialized technologies such as MVC, Web API and others. With the expansion ASP.NET has seen

More information

CHAPTER2 UNDERSTANDING WINDOWSAZURE PLATFORMARCHITECTURE

CHAPTER2 UNDERSTANDING WINDOWSAZURE PLATFORMARCHITECTURE CHAPTER2 UNDERSTANDING WINDOWSAZURE PLATFORMARCHITECTURE CONTENTS The Windows Azure Developer Portal Creating and running Projects in the Azure Development Platform Using Azure Application Templates for

More information

D9.2.2 AD FS via SAML2

D9.2.2 AD FS via SAML2 D9.2.2 AD FS via SAML2 This guide assumes you have an AD FS deployment. This guide is based on Windows Server 2016. Third Light support staff cannot offer assistance with 3rd party tools, so while the

More information

Azure Developer Immersions API Management

Azure Developer Immersions API Management Azure Developer Immersions API Management Azure provides two sets of services for Web APIs: API Apps and API Management. You re already using the first of these. Although you created a Web App and not

More information

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server... Oracle Access Manager Configuration Guide for On-Premises Version 17 October 2017 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing

More information

Cloud Enabling.NET Client Applications ---

Cloud Enabling.NET Client Applications --- Cloud Enabling.NET Client Applications --- Overview Modern.NET client applications have much to gain from Windows Azure. In addition to the increased scalability and reliability the cloud has to offer,

More information

.NET SAML Consumer Value-Added (VAM) Deployment Guide

.NET SAML Consumer Value-Added (VAM) Deployment Guide .NET SAML Consumer Value-Added (VAM) Deployment Guide Copyright Information SecureAuth is a copyright of SecureAuth Corporation. SecureAuth s IdP software, appliances, and other products and solutions,

More information

Hands-On Lab. Introduction to SQL Azure. Lab version: Last updated: 12/15/2010

Hands-On Lab. Introduction to SQL Azure. Lab version: Last updated: 12/15/2010 Hands-On Lab Introduction to SQL Azure Lab version: 2.0.0 Last updated: 12/15/2010 Contents OVERVIEW... 3 EXERCISE 1: PREPARING YOUR SQL AZURE ACCOUNT... 5 Task 1 Retrieving your SQL Azure Server Name...

More information

SelectSurvey.NET Developers Manual

SelectSurvey.NET Developers Manual Developers Manual (Last updated: 5/6/2016) SelectSurvey.NET Developers Manual Table of Contents: SelectSurvey.NET Developers Manual... 1 Overview... 2 Before Starting - Is your software up to date?...

More information

Best Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate

Best Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate White Paper PlateSpin Transformation Manager PlateSpin Migrate Best Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate Updated for PlateSpin Transformation Manager 1.1 and PlateSpin

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

TECHNICAL GUIDE SSO SAML Azure AD

TECHNICAL GUIDE SSO SAML Azure AD 1 TECHNICAL GUIDE SSO SAML Azure AD At 360Learning, we don t make promises about technical solutions, we make commitments. This technical guide is part of our Technical Documentation. Version 1.0 2 360Learning

More information

HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE

HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HIFIS Development Team May 16, 2014 Contents INTRODUCTION... 2 HIFIS 4 SYSTEM DESIGN... 3

More information

Quick Start Guide. This guide will help you get started with Kentico CMS for ASP.NET. It answers these questions:

Quick Start Guide. This guide will help you get started with Kentico CMS for ASP.NET. It answers these questions: Quick Start Guide This guide will help you get started with Kentico CMS for ASP.NET. It answers these questions:. How can I install Kentico CMS?. How can I edit content? 3. How can I insert an image or

More information

Configuration Guide - Single-Sign On for OneDesk

Configuration Guide - Single-Sign On for OneDesk Configuration Guide - Single-Sign On for OneDesk Introduction Single Sign On (SSO) is a user authentication process that allows a user to access different services and applications across IT systems and

More information

Managing trust relationships with multiple business identity providers (basics) 55091A; 3 Days, Instructor-led

Managing trust relationships with multiple business identity providers (basics) 55091A; 3 Days, Instructor-led Managing trust relationships with multiple business identity providers (basics) 55091A; 3 Days, Instructor-led Course Description Decoupling cloud service from all the complexity maintaining a direct relationship

More information

How to Use ADFS to Implement Single Sign-On for an ASP.NET MVC Application

How to Use ADFS to Implement Single Sign-On for an ASP.NET MVC Application How to Use ADFS to Implement Single Sign-On for an ASP.NET MVC Application With Azure s Access Control service retiring next month, I needed to find another way to use an on-premise Active Directory account

More information

Lab 5: ASP.NET 2.0 Profiles and Localization

Lab 5: ASP.NET 2.0 Profiles and Localization Lab 5: ASP.NET 2.0 Profiles and Localization Personalizing content for individual users and persisting per-user data has always been a non-trivial undertaking in Web apps, in part due to the stateless

More information

IBM InfoSphere Information Server Single Sign-On (SSO) by using SAML 2.0 and Tivoli Federated Identity Manager (TFIM)

IBM InfoSphere Information Server Single Sign-On (SSO) by using SAML 2.0 and Tivoli Federated Identity Manager (TFIM) IBM InfoSphere Information Server IBM InfoSphere Information Server Single Sign-On (SSO) by using SAML 2.0 and Tivoli Federated Identity Manager (TFIM) Installation and Configuration Guide Copyright International

More information

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) You can find the most up-to-date technical documentation

More information

This walkthrough assumes you have completed the Getting Started walkthrough and the first lift and shift walkthrough.

This walkthrough assumes you have completed the Getting Started walkthrough and the first lift and shift walkthrough. Azure Developer Immersion In this walkthrough, you are going to put the web API presented by the rgroup app into an Azure API App. Doing this will enable the use of an authentication model which can support

More information

Microsoft ADFS Configuration

Microsoft ADFS Configuration Microsoft ADFS Configuration Side 1 af 12 1 Information 1.1 ADFS KMD Secure ISMS supports ADFS for integration with Microsoft Active Directory by implementing WS-Federation and SAML 2. The integration

More information

Snapshot Best Practices: Continuous Integration

Snapshot Best Practices: Continuous Integration Snapshot Best Practices: Continuous Integration Snapshot provides sophisticated and flexible tools for continuously keeping Salesforce accounts, developer projects, and content repositories synchronized.

More information

Azure Application Deployment and Management: Service Fabric Create and Manage a Local and Azure hosted Service Fabric Cluster and Application

Azure Application Deployment and Management: Service Fabric Create and Manage a Local and Azure hosted Service Fabric Cluster and Application Azure Application Deployment and Management: Service Fabric Create and Manage a Local and Azure hosted Service Fabric Cluster and Application Overview This course includes optional practical exercises

More information

Sign-up Forms Builder for Magento 2.x. User Guide

Sign-up Forms Builder for Magento 2.x. User Guide eflyermaker Sign-up Forms Builder 2.0.5 for Magento 2.x User Guide 2 eflyermaker Dear Reader, This User-Guide is based on eflyermaker s Signup-Form Builder Plugin for Magento ecommerce. What follows is

More information

DYNAMICS AX 2012 R3 ENTERPRISE PORTAL SETUP WITH AUTH0

DYNAMICS AX 2012 R3 ENTERPRISE PORTAL SETUP WITH AUTH0 DYNAMICS AX 2012 R3 ENTERPRISE PORTAL SETUP WITH AUTH0 Introduction This document walks through the setup of Dynamics AX 2012 R3 Enterprise Portal with Auth0 as the identity provider instead of Azure Access

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

Configuring Alfresco Cloud with ADFS 3.0

Configuring Alfresco Cloud with ADFS 3.0 Configuring Alfresco Cloud with ADFS 3.0 Prerequisites: You have a working domain on your Windows Server 2012 and successfully installed ADFS. For these instructions, I created: alfresco.me as a domain

More information

Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure. Deployment Guide

Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure. Deployment Guide Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure Deployment Guide v1.0 May 2018 Introduction This document describes how to set up Pulse Connect Secure for SP-initiated

More information

Azure for On-Premises Administrators Practice Exercises

Azure for On-Premises Administrators Practice Exercises Azure for On-Premises Administrators Practice Exercises Overview This course includes optional practical exercises where you can try out the techniques demonstrated in the course for yourself. This guide

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902 Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Colligo Console. Administrator Guide

Colligo Console. Administrator Guide Colligo Console Administrator Guide Contents About this guide... 6 Audience... 6 Requirements... 6 Colligo Technical Support... 6 Introduction... 7 Colligo Console Overview... 8 Colligo Console Home Page...

More information

SAP Jam Communities What's New 1808 THE BEST RUN. PUBLIC Document Version: August

SAP Jam Communities What's New 1808 THE BEST RUN. PUBLIC Document Version: August PUBLIC Document Version: August 2018 2018-10-26 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Release Highlights....3 1.1 Anonymous access to public communities....4

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

Hands-On Lab. Introduction to the Windows Azure AppFabric Service Bus Futures. Lab version: Last updated: 11/16/2010. Page 1

Hands-On Lab. Introduction to the Windows Azure AppFabric Service Bus Futures. Lab version: Last updated: 11/16/2010. Page 1 Hands-On Lab Introduction to the Windows Azure AppFabric Service Bus Futures Lab version: 1.0.0 Last updated: 11/16/2010 Page 1 CONTENTS OVERVIEW... 3 GETTING STARTED: CREATING A SERVICE PROJECT... 5 Task

More information

OU EDUCATE TRAINING MANUAL

OU EDUCATE TRAINING MANUAL OU EDUCATE TRAINING MANUAL OmniUpdate Web Content Management System El Camino College Staff Development 310-660-3868 Course Topics: Section 1: OU Educate Overview and Login Section 2: The OmniUpdate Interface

More information

MICROSOFT VISUAL STUDIO 2010 Overview

MICROSOFT VISUAL STUDIO 2010 Overview MICROSOFT VISUAL STUDIO 2010 Overview Visual studio 2010 delivers the following key ADVANCES: Enabling emerging trends Every year the industry develops new technologies and new trends. With Visual Studio

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

SharePoint 20488: Developing Microsoft SharePoint Server 2013 Core Solutions. Upcoming Dates. Course Description. Course Outline

SharePoint 20488: Developing Microsoft SharePoint Server 2013 Core Solutions. Upcoming Dates. Course Description. Course Outline SharePoint 20488: Developing Microsoft SharePoint Server 2013 Core Solutions Get the skills to design, manage and deploy SharePoint Development platform features in this 5-day instructor lead course. This

More information

Kendo UI. Builder by Progress : Using Kendo UI Designer

Kendo UI. Builder by Progress : Using Kendo UI Designer Kendo UI Builder by Progress : Using Kendo UI Designer Copyright 2017 Telerik AD. All rights reserved. December 2017 Last updated with new content: Version 2.1 Updated: 2017/12/22 3 Copyright 4 Contents

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Nintex Forms 2010 Help

Nintex Forms 2010 Help Nintex Forms 2010 Help Last updated: Monday, April 20, 2015 1 Administration and Configuration 1.1 Licensing settings 1.2 Activating Nintex Forms 1.3 Web Application activation settings 1.4 Manage device

More information

Salesforce External Identity Implementation Guide

Salesforce External Identity Implementation Guide Salesforce External Identity Implementation Guide Salesforce, Summer 17 @salesforcedocs Last updated: September 28, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29 Oracle Access Manager Configuration Guide 16 R1 March 2016 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 8 Installing Oracle HTTP Server...

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Coveo Platform 7.0. Microsoft SharePoint Legacy Connector Guide

Coveo Platform 7.0. Microsoft SharePoint Legacy Connector Guide Coveo Platform 7.0 Microsoft SharePoint Legacy Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds

More information

Developing Microsoft SharePoint Server 2013 Core Solutions

Developing Microsoft SharePoint Server 2013 Core Solutions Developing Microsoft SharePoint Server 2013 Core Solutions 20488B; 5 days, Instructor-led Course Description In this course, students learn core skills that are common to almost all SharePoint development

More information

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1 Administering Workspace ONE in VMware Identity Manager Services with AirWatch VMware AirWatch 9.1.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

[ Getting Started with Analyzer, Interactive Reports, and Dashboards ] ]

[ Getting Started with Analyzer, Interactive Reports, and Dashboards ] ] Version 5.3 [ Getting Started with Analyzer, Interactive Reports, and Dashboards ] ] https://help.pentaho.com/draft_content/version_5.3 1/30 Copyright Page This document supports Pentaho Business Analytics

More information

Real-Time SignalR. Overview

Real-Time SignalR. Overview Real-Time SignalR Overview Real-time Web applications feature the ability to push server-side content to the connected clients as it happens, in real-time. For ASP.NET developers, ASP.NET SignalR is a

More information

COURSE 20488B: DEVELOPING MICROSOFT SHAREPOINT SERVER 2013 CORE SOLUTIONS

COURSE 20488B: DEVELOPING MICROSOFT SHAREPOINT SERVER 2013 CORE SOLUTIONS Page 1 of 10 ABOUT THIS COURSE In this course, students learn core skills that are common to almost all SharePoint development activities. These include working with the server-side and client-side object

More information

Configuring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: May 2015

Configuring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: May 2015 Configuring Claims-based Authentication for Microsoft Dynamics CRM Server Last updated: May 2015 This document is provided "as-is". Information and views expressed in this document, including URL and other

More information

Hands-On Lab. Introduction to SQL Azure. Lab version: Last updated: 11/16/2010

Hands-On Lab. Introduction to SQL Azure. Lab version: Last updated: 11/16/2010 Hands-On Lab Introduction to SQL Azure Lab version: 2.0.0 Last updated: 11/16/2010 Contents OVERVIEW... 3 EXERCISE 1: PREPARING YOUR SQL AZURE ACCOUNT... 6 Task 1 Retrieving your SQL Azure Server Name...

More information

MS 20488: Developing Microsoft SharePoint Server 2013 Core Solutions Duration: 5 Days Method: Instructor-Led

MS 20488: Developing Microsoft SharePoint Server 2013 Core Solutions Duration: 5 Days Method: Instructor-Led MS 20488: Developing Microsoft SharePoint Server 2013 Core Solutions Duration: 5 Days Method: Instructor-Led Certification: Microsoft Certified Solutions Developer [MCSD]: Exam 70-488 Course Description

More information

Hands-On Lab. Developing Identity-Driven Silverlight Applications. Lab version: 1.0.0

Hands-On Lab. Developing Identity-Driven Silverlight Applications. Lab version: 1.0.0 Hands-On Lab Developing Identity-Driven Silverlight Applications Lab version: 1.0.0 Last updated: 1/21/2011 CONTENTS OVERVIEW... 3 EXERCISE 1: SINGLE SIGN ON, CLAIMS-DRIVEN EXPERIENCE AND SERVICE AUTHORIZATION

More information

Course 20488A: Developing Microsoft SharePoint Server 2013 Core Solutions

Course 20488A: Developing Microsoft SharePoint Server 2013 Core Solutions Course 20488A: Developing SharePoint Server 2013 Core Solutions Delivery Method: Instructor-led (classroom) Duration: 5 Days Level: 300 COURSE OVERVIEW About this Course In this course, students learn

More information

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO July 2017 Contents Introduction...3 The Integrated Solution...3 Prerequisites...4 Configuration...4 Set up BIG-IP APM to be a SAML IdP...4 Create a self-signed certificate for signing SAML assertions...4

More information

Dreamweaver MX The Basics

Dreamweaver MX The Basics Chapter 1 Dreamweaver MX 2004 - The Basics COPYRIGHTED MATERIAL Welcome to Dreamweaver MX 2004! Dreamweaver is a powerful Web page creation program created by Macromedia. It s included in the Macromedia

More information

Salesforce External Identity Implementation Guide

Salesforce External Identity Implementation Guide Salesforce External Identity Implementation Guide Salesforce, Spring 17 @salesforcedocs Last updated: March 11, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

Skills Management Automated Install and Upgrade Guide

Skills Management Automated Install and Upgrade Guide Skills Management 9.0.0 Automated Install and Upgrade Guide Information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys

More information

Microsoft Architecting Microsoft Azure Solutions.

Microsoft Architecting Microsoft Azure Solutions. Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API

More information

Drupal Cloud Getting Started Guide Creating a Lab site with the MIT DLC Theme

Drupal Cloud Getting Started Guide Creating a Lab site with the MIT DLC Theme Introduction Drupal Cloud Getting Started Guide Creating a Lab site with the MIT DLC Theme In this Getting Started Guide, you can follow along as a website is built using the MIT DLC Theme. Whether you

More information

Five9 Plus Adapter for Agent Desktop Toolkit

Five9 Plus Adapter for Agent Desktop Toolkit Cloud Contact Center Software Five9 Plus Adapter for Agent Desktop Toolkit Administrator s Guide September 2017 The Five9 Plus Adapter for Agent Desktop Toolkit integrates the Five9 Cloud Contact Center

More information

Designing the Home Page and Creating Additional Pages

Designing the Home Page and Creating Additional Pages Designing the Home Page and Creating Additional Pages Creating a Webpage Template In Notepad++, create a basic HTML webpage with html documentation, head, title, and body starting and ending tags. From

More information

Introduction. Overview of HCM. HCM Dashboard CHAPTER

Introduction. Overview of HCM. HCM Dashboard CHAPTER CHAPTER 1 This chapter describes the Hosted Collaboration Mediation (HCM) software. It includes: Overview of HCM, page 1-1 Terminology Used in HCM, page 1-2 HCM Dashboard Architecture, page 1-3 Starting

More information

Cloud Secure Integration with ADFS. Deployment Guide

Cloud Secure Integration with ADFS. Deployment Guide Cloud Secure Integration with ADFS Deployment Guide Product Release 8.3R3 Document Revisions 1.0 Published Date October 2017 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose CA 95134 http://www.pulsesecure.net

More information

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8 Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

COURSE 20487B: DEVELOPING WINDOWS AZURE AND WEB SERVICES

COURSE 20487B: DEVELOPING WINDOWS AZURE AND WEB SERVICES ABOUT THIS COURSE In this course, students will learn how to design and develop services that access local and remote data from various data sources. Students will also learn how to develop and deploy

More information

Developing Microsoft SharePoint Server 2013 Core Solutions

Developing Microsoft SharePoint Server 2013 Core Solutions Course 20488B: Developing Microsoft SharePoint Server 2013 Core Solutions Page 1 of 8 Developing Microsoft SharePoint Server 2013 Core Solutions Course 20488B: 4 days; Instructor-Led Introduction In this

More information

Roxen Content Provider

Roxen Content Provider Roxen Content Provider Generation 3 Templates Purpose This workbook is designed to provide a training and reference tool for placing University of Alaska information on the World Wide Web (WWW) using the

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

DE-2310 Developing Web Applications Using Microsoft Visual Studio 2008 SP1

DE-2310 Developing Web Applications Using Microsoft Visual Studio 2008 SP1 DE-2310 Developing Web Applications Using Microsoft Visual Studio 2008 SP1 Summary Duration 5 Days Audience Developers Level 100 Technology Microsoft Visual Studio 2008 Delivery Method Instructor-led (Classroom)

More information

Oracle Access Manager Configuration Guide

Oracle Access Manager Configuration Guide Oracle Access Manager Configuration Guide 16 R2 September 2016 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

More information

Setup Guide for AD FS 3.0 on the Apprenda Platform

Setup Guide for AD FS 3.0 on the Apprenda Platform Setup Guide for AD FS 3.0 on the Apprenda Platform Last Updated for Apprenda 6.5.2 The Apprenda Platform leverages Active Directory Federation Services (AD FS) to support identity federation. AD FS and

More information

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation Enhancing cloud applications by using external authentication services After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of

More information

Chapter 9. Web Applications The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill

Chapter 9. Web Applications The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 9 Web Applications McGraw-Hill 2010 The McGraw-Hill Companies, Inc. All rights reserved. Chapter Objectives - 1 Explain the functions of the server and the client in Web programming Create a Web

More information

Table Basics. The structure of an table

Table Basics. The structure of an table TABLE -FRAMESET Table Basics A table is a grid of rows and columns that intersect to form cells. Two different types of cells exist: Table cell that contains data, is created with the A cell that

More information

Community Edition. Web User Interface 3.X. User Guide

Community Edition. Web User Interface 3.X. User Guide Community Edition Talend MDM Web User Interface 3.X User Guide Version 3.2_a Adapted for Talend MDM Web User Interface 3.2 Web Interface User Guide release. Copyright This documentation is provided under

More information

Introduction to IBM Rational HATS For IBM System i (5250)

Introduction to IBM Rational HATS For IBM System i (5250) Introduction to IBM Rational HATS For IBM System i (5250) Introduction to IBM Rational HATS 1 Lab instructions This lab teaches you how to use IBM Rational HATS to create a Web application capable of transforming

More information

NETOP PORTAL ADFS & AZURE AD INTEGRATION

NETOP PORTAL ADFS & AZURE AD INTEGRATION 22.08.2018 NETOP PORTAL ADFS & AZURE AD INTEGRATION Contents 1 Description... 2 Benefits... 2 Implementation... 2 2 Configure the authentication provider... 3 Azure AD... 3 2.1.1 Create the enterprise

More information

We start by providing you with an overview of the key feature of the IBM BPM Process Portal.

We start by providing you with an overview of the key feature of the IBM BPM Process Portal. Lab 1 Process Portal 1.1 Overview This lab exercise will make you familiar with the key capabilities of the ready-to-use Process Portal included with IBM Business Process Manager (BPM). You will experience

More information

Before you start proceeding with this tutorial, we are assuming that you are already aware about the basics of Web development.

Before you start proceeding with this tutorial, we are assuming that you are already aware about the basics of Web development. About the Tutorial This tutorial will give you an idea of how to get started with SharePoint development. Microsoft SharePoint is a browser-based collaboration, document management platform and content

More information

Web Sites in Production

Web Sites in Production Web Sites in Production Overview Windows Azure offers secure and flexible development, deployment and scaling options for any size web application. Leverage your existing tools to create and deploy applications

More information

Microsoft Expression Web Quickstart Guide

Microsoft Expression Web Quickstart Guide Microsoft Expression Web Quickstart Guide MS-Expression Web Quickstart Guide Page 1 of 24 Expression Web Quickstart Guide (20-Minute Training) Welcome to Expression Web. When you first launch the program,

More information

OPC-UA Tutorial. A Guide to Configuring the TOP Server for OPC-UA

OPC-UA Tutorial. A Guide to Configuring the TOP Server for OPC-UA OPC-UA Tutorial A Guide to Configuring the TOP Server for OPC-UA Page 2 of 40 Table of Contents INTRODUCTION 4 Introduction to OPC UA 4 Introduction to TOP Server 5 Intended Audience 5 Prerequisites 6

More information

New World ERP-eSuite

New World ERP-eSuite New World ERP-eSuite 2018.1 INSTALLATION GUIDE April 9, 2018 Review important information for installing this release: SSL is required for esuite Services and Website servers. 2018 Tyler Technologies.

More information

TECHNICAL GUIDE SSO SAML. At 360Learning, we don t make promises about technical solutions, we make commitments.

TECHNICAL GUIDE SSO SAML. At 360Learning, we don t make promises about technical solutions, we make commitments. TECHNICAL GUIDE SSO SAML At 360Learning, we don t make promises about technical solutions, we make commitments. This technical guide is part of our Technical Documentation. 2 360Learning is a Leading European

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager.

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager. IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS VMware Identity Manager February 2017 V1 1 2 Table of Contents Overview... 5 Benefits of BIG-IP APM and Identity

More information

Syncfusion Report Platform. Version - v Release Date - March 22, 2017

Syncfusion Report Platform. Version - v Release Date - March 22, 2017 Syncfusion Report Platform Version - v2.1.0.8 Release Date - March 22, 2017 Overview... 5 Key features... 5 Create a support incident... 5 System Requirements... 5 Report Server... 5 Hardware Requirements...

More information

Microsoft Windows Servers 2012 & 2016 Families

Microsoft Windows Servers 2012 & 2016 Families Version 8 Installation Guide Microsoft Windows Servers 2012 & 2016 Families 2301 Armstrong St, Suite 2111, Livermore CA, 94551 Tel: 925.371.3000 Fax: 925.371.3001 http://www.imanami.com Installation Guide

More information

Configuring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: June 2014

Configuring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: June 2014 Configuring Claims-based Authentication for Microsoft Dynamics CRM Server Last updated: June 2014 This document is provided "as-is". Information and views expressed in this document, including URL and

More information

SharePoint User Manual

SharePoint User Manual SharePoint User Manual Developed By The CCAP SharePoint Team Revision: 10/2009 TABLE OF CONTENTS SECTION 1... 5 ABOUT SHAREPOINT... 5 1. WHAT IS MICROSOFT OFFICE SHAREPOINT SERVER (MOSS OR SHAREPOINT)?...

More information