Managing trust relationships with multiple business identity providers

Corso

A Milano

Prezzo da consultare

Chiama il centro

Hai bisogno di un coach per la formazione?

Ti aiuterà a confrontare vari corsi e trovare l'offerta formativa più conveniente.

Descrizione

  • Tipologia

    Corso

  • Luogo

    Milano

  • Inizio

    Scegli data

Establish first steps to build an organizational Enterprise Security Service Bus Create a Relying Party Establish ACS to delegate authentication Forwarding every request from unauthenticated users to ACS

Sedi e date

Luogo

Inizio del corso

Milano
Visualizza mappa
viale Piero e Alberto Pirelli 6, 20126

Inizio del corso

Scegli dataIscrizioni aperte

Domande e risposte

Aggiungi la tua domanda

I nostri consulenti e altri utenti potranno risponderti

Chi vuoi che ti risponda?

Inserisci i tuoi dati per ricevere una risposta

Pubblicheremo solo il tuo nome e la domanda

Opinioni

Materie

  • Web master
  • Security
  • MAN
  • Api
  • Management
  • Broker
  • Active Directory
  • E-business

Programma

Broker authentication


Change access rules in response to programmatic events


For this Lab has a dedicated Cloud Service in VBIC’s virtual cloud classroom been issued


Every student is using his dedicated developer environment and in addition has been granted Co-administrator access privileges in VBIC’s Enterprise Cloud Access Suite and every student has therefore been granted an organizational account and executes this training as organizational member of VBIC.


Create a new Microsoft Azure Service Namespace


Base this namespace inside of a selected region


Scope this namespace global for planetary validity and reach


Removal of pre-COA (Cloud Oriented Architecture) pattern from a standard WEB Site project


Apply standard procedures aimed to establish Access Control Services (ACS) as a broker service


Design this service to handle authentication and authorization, including provisioning of a UI for the user to choose among all the recognized identity providers


Identity terms used in the ACS Management Portal referencing items in the Microsoft Azure Management Portal


Binding and bridging IaaS/PaaS items from the Microsoft Azure Management Portal with PaaS/SaaS items from the ACS Management Portal


Create an identity consuming Relying Party that is an identity term for a cloud service, a term in the Microsoft Azure Management Portal for a PaaS component encapsulating IaaS components


Storage of identities and services capable to authenticate users


Creation of Identity Provider


Design ACS namespaces to interface with more than one storage or authentication services for users


Reuse of pre-factored URIs to integrate multiple identity providers into your cloud service for authentication and authorization purposes


Establish WS-Federation Metadata endpoints


Create a document interface describing the WS-Federation STS that ACS exposes in a Microsoft Azure namespace


Program that every authentication request will be forwarded to Azure ACS and to return to the application you currently program, e.g. a Web Site


Execution of a combination of tasks shared between ITPro and Developer


Design functional workflows between Microsoft Azure IaaS and Microsoft Azure PaaS


Configure the ACS management portal to provide a variety of multiple identity provider (IP)


Configuration of multiple and parallel IP interfaces to ACS


Establish management and direct binding between Users, Azure Cloud Services and Identity provider Interface


Provide public brokering services between IPs and Cloud Services


Add Identity providers as IaaS via Microsoft Azure Management Portals well as PaaS programmatically via Visual Studio (VSTO) while both are brokered by Azure Access Control Services


Configure transformation of Claims input before it reaches the final recipient; the relying application.


Create and edit rule groups manually using the ACS Management Portal and programmatically via (VST)


Create and edit rule groups no longer manually using the ACS Management Portal but programmatically


Reapply steps learned by utilizing configuration in ACS Management Portal now via code and programming the ACS Management Service


Create a dedicated interface for a programmatic approach and secure it with a password


After completing this module, students will be able to:


Hands on create first steps in order to establish an organizational Enterprise Security Service Bus


Create a Relying Party


Establish ACS to delegate authentication


Forward every request from unauthenticated users to ACS


Broker authentication


Change access rules in response to programmatic events


Advanced procedures aimed to decouple cloud service from all the complexity while maintaining a direct relationship with a multiplicity of identity providers is the core learning unit of this module. Any identity provider can use its own authentication protocol and the authentication results will get normalized and once established will Access Control Services ACS care about authentication and authorization, including providing a UI for the user of this multiple identity SSO system enabling them to choose among all the Azure recognized identity providers. Claims will be accessible for the developer to establish easy authorization without the necessity to know authentication protocols in detail. Management of different and multiple business identity providers will be handled in a unique fashion without the necessity to write different code. This relationship is called ‘normalizing attributes’ and will be realized by you via the Microsoft Azure Portal and the management API. In addition to the exercise already executed that did provide know how to integrate business directories into a Federate Identity meshwork will you now do a selection of the very same steps to task Microsoft Azure to serve users coming from Facebook or Microsoft Live ID if they want to use your web site.


Hands-on establish advanced steps to create an organizational Enterprise Security Service Bus


Create a Relying Party


Establish ACS to delegate authentication


Forwarding every request from unauthenticated users to ACS


Create a simple cloud service


Interface a cloud service with multiplicity of identity provider


Decoupled a cloud service from all the complexity of having to maintaining a direct relationship with a multiplicity of identity provider


For this Lab has a new dedicated Cloud Service in VBIC’s virtual cloud classroom been issued


Every student is using his dedicated developer environment and in addition has been granted Co-administrator access privileges in VBIC’s Enterprise Cloud Access Suite and every student has therefore been granted an organizational account and executes this training as organizational member of VBIC.


Configure claims input coming from Yahoo and Microsoft IDs into ACS


Transformed input to output claims


Configure delivery of transformed output claims towards your relying party application


Establish trust relationship between your claims-aware application and the Azure Access Control Services


Establish ACS as a trusted Brokering Service between Microsoft Azure, Yahoo and Microsoft


After completing this module, students will be able to:


First step to establish an organizational Enterprise Security Service Bus


Create a Relying Party


Establish ACS to delegate authentication


Forwarding every request from unauthenticated users to ACS


In this module a pre-existing Microsoft Azure Active Directory (MAAD) repository is available in VBIC’s virtual classroom, consisting of users to be interfaced to a namespace and released for application to be linked to this Access Control namespace. As a result will the Microsoft Azure Active Directory be available as an (additional) identity provider for any application associated/interfacing with this namespace. Applications that are connected to your access control namespace become interfaced with the VBIC provided Microsoft Azure Active Directory (MAAD). MAAD generated tokens will be transformed into ACS tokens, available for authentication and authorization purposes for user identities, application identities and data identities. You’ll define the recipient for the success token, signaling a positive authentication event, as a URL address, parameterized as an App. You’ll further define countermeasure preventing man-in-the-middle attacks by defining the App ID URI, by utilizing a control parameter that has to be delivered with the MAAD token. The MAAD user token must be delivered in conjunction with the entityID of the Access Control namespace, otherwise ACS would interpret it as a token reused from a man-in-the-middle attack. As ACS does not call the Graph API is there no SSO with read or write access to MAAD at all, just MAAD providing additional identities via token, based on a fixed selection in ACS. Calling MAAD Graph API and establishing a global SSO and a multitenant Single Sign-Up read or write access to MAAD is covered in Course 55086AC - Enterprise SSO - cloud audited deployment for distributed onsite-offsite development.


Establish a tokenized communication between Azure Namespaces and WS-Federation sign-in endpoints


Establish a Microsoft Azure Active Directory (MAAD) as an (additional) identity provider for any application associated/interfacing with your namespace


For this Lab has a new dedicated Cloud Service in VBIC’s virtual cloud classroom been issued


Every student is using his dedicated developer environment and in addition has been granted Co-administrator access privileges in VBIC’s Enterprise Cloud Access Suite and every student has therefore been granted an organizational account and executes this training as organizational member of VBIC.


Interface with a pre-existing Microsoft Azure Active Directory (MAAD) repository


Bind users of MAAD to a namespace


Released binding as an application to be linked to this Access Control namespace


Configure Microsoft Azure Active Directory as an (additional) identity provider for any application associated/interfacing with this namespace


Program and configure a generic interface aimed that all applications developed so far connect to your access control namespace and become interfaced with the VBIC provided Microsoft Azure Active Directory (MAAD)


Transform MAAD generated tokens into ACS tokens, available for authentication and authorization purposes for user identities, application identities and data identities


Define the recipient for the success token, signaling a positive authentication event, as a URL address, parameterized as an App


Define countermeasures preventing man-in-the-middle attacks by defining the App ID URI and by utilizing a control parameter that has to be delivered with the MAAD token


Configure and code man-in-the-middle countermeasures


Design MAAD to provide additional identities via token based on a fixed selection in ACS as an alternative to complex SSO setups


Configure a customized selection


Establish an additional security token service (STS) as an additional Identity Provider


Bind a custom STS to MAAD


Bind MAAD to a custom STS and establish a customized STS selection as MAAD claims identity


Use MAAD as part of all other registered identity provider for the Access Control namespace


Utilize operational standard procedures to execute and showcase MAAD selection during development of a web app


Execute operational procedures for Key Management required between Azure and Visual Studio in order to associate the app with your Access Control namespace


After completing this module, students will be able to:


Establish a tokenized communication between Azure Namespaces and WS-Federation sign-in endpoints


Establish Microsoft Azure Active Directory (MAAD) as an (additional) identity provider for any application associated/interfacing with their namespace


Add French, German, English and Italian as a multilingual integration of traditional ASP.NET Web Sites into your Enterprise Security Service Bus (ESSB)


Code a multilingual Enterprise Security Service Bus (ESSB)


For this Lab has a new dedicated Cloud Service in VBIC’s virtual cloud classroom been issued


Every student is using his dedicated developer environment and in addition has been granted Co-administrator access privileges in VBIC’s Enterprise Cloud Access Suite and every student has therefore been granted an organizational account and executes this training as organizational member of VBIC.


After completing this module, students will be able to:


The Assessment is only optional, only if time permits, voluntary at the discretion of the student and does not have a solution folder as there are many ways to achieve the to be assessed target of evaluation and is subject of evaluation by instructor or VBIC staff


If assessment is taken by students will student receive either an assessment from instructor about assessment passing during class or will receive a follow up email for assessment validation result from/by VBIC staff, 5 days after last day of class.


Chiama il centro

Hai bisogno di un coach per la formazione?

Ti aiuterà a confrontare vari corsi e trovare l'offerta formativa più conveniente.

Managing trust relationships with multiple business identity providers

Prezzo da consultare