SlideShare una empresa de Scribd logo
1 de 57
AUTHENTICATION, AUTHORIZ
ATION AND IDENTITY…
IT’S MORE THAN MEETS THE EYE
Scott Hoag and Dan Usher
PRINCETON SHAREPOINT USER GROUP
• Different SharePoint discussions each
month on various topics. Announced on
meetup.com
• Meets 4th Wednesday of every month
• 6pm – 8pm
• Infragistics Office
• 2 Commerce Drive, Cranbury, NJ
• http://www.meetup.com/princetonSUG
• http://www.princetonsug.com
THANK YOU
EVENT
SPONSORS
• Platinum & Gold sponsors
have tables here in the
Fireside Lounge
• Please visit them and
inquire about their
products & services
• To be eligible for prizes
make sure your bingo card
is signed by all
Platinum/Gold
WHO ARE WE?
Scott Hoag
@ciphertxt
Applied Information Sciences
Infrastructure Consultant
scott.hoag@appliedis.com
• Dan Usher
• @binarybrewery
• Booz Allen Hamilton Incorporated
• Lead Associate
• usher_daniel@bah.com
HOUSEKEEPING
• Phones silenced, phasers set to stun
• Ask questions
• Please remember to turn in your filled out bingo cards and event evaluations for prizes.
• Follow SharePoint Saturday New Jersey on Twitter @spsnj and hashtag #spsnj
• Do not feed Scott donuts…
THINGS TO COVER
THINGS WE WON’T BE COVERING
http://go.spdan.com/kerberos2010
http://go.spdan.com/kerberos2013
http://go.spdan.com/multihopwinrm
SECURITY
SPOILER ALERT!!!
http://xkcd.com/1240/
SECURITY IN GENERAL
SECURITY IN GENERAL
SECURITY CONCERNS IN TODAY’S WORLD
IDENTIFICATION – WHAT IS?
IDENTIFICATION – TYPES OF…
HOW DO WE PROTECT IDENTITY?
AUTHENTICATION – WHAT IS?
AUTHORIZATION – WHAT IS?
• The act of authorizing.
• Permission or power granted by an authority; sanction.
• To give authority or official power to.
• To give authority for; formally sanction (an act or
proceeding).
• To establish by authority or usage.
• Sometimes we call it AuthZ.
SECURITY WITH SHAREPOINT
SECURITY WITH SHAREPOINT
AUTHN – TYPES OF…
• Windows
• NTLM/Kerberos
• Basic
• Anonymous
• Digest
• Client Certificate
• Forms-based Authentication
• Lightweight Directory Access
Protocol (LDAP)
• Microsoft SQL Server
• ASP.NET Membership and Role
Providers
AUTHN – STILL MORE TYPES OF…
• SAML Token-based Authentication
• Active Directory Federated Services
• 3rd Party Identity Provider
• Lightweight Directory Access Protocol (LDAP)
AUTHENTICATION VS. AUTHORIZATION
AUTHN VS. AUTHZ (CONTINUED)
AUTHENTICATION – CLAIM TERMINOLOGY
• Identity
• Info about a Person or Object
(AD, Google, Windows Live, Facebook
etc.)
• Claim
• Attributes of the Identity (User
ID, Email, Age etc.)
• Token
• Binary Representation of Identity
• Set of Claims and the Signature
• Relying Party (aka RP)
• Users Token
• Secure Token Service (STS)
• Issuer of Tokens for Users
• SharePoint 2010 Introduced Claims
Authentication
• What is this? http://go.spdan.com/cba
AUTHENTICATION - CLAIMS
AUTHENTICATION - CLAIMS
WHAT ABOUT CLAIMS IN WINDOWS?
WHAT DOES CLAIMS ENCODING LOOK LIKE?
http://go.spdan.com/claimsencoding
WHAT DOES CLAIMS ENCODING LOOK LIKE?
http://go.spdan.com/claimsencoding
BASICS OF SHAREPOINT CLASSIC AUTHN
Source:http://go.spdan.com/iisauth
ASP.NETAuthentication
BASICS OF SHAREPOINT CLAIMS AUTHN
1. Resource Requested
2. AuthN Request / Redirect
3. AuthN Request
4. Security Token
5. Security Token Request
6. Service Token
7. Resource Request w/Service Token
8. Resource Sent
Identity Provider
Security Token Service
aka IP-STS
SharePoint 2010
aka RP
SIDE STORY
A SHAREPOINT CONSULTANTS ENTER A BAR…
AUTHN - MEMBERSHIP & ROLE PROVIDERS
AUTHN - MEMBERSHIP & ROLE PROVIDERS
AUTHN – CUSTOM IDENTITY PROVIDER
AUTHN – CUSTOM IDENTITY PROVIDER
AUTHN - PROXY SERVER
AUTHN - DIRECT ACCESS
WINDOWS AZURE ACTIVE DIRECTORY
WINDOWS AZURE ACTIVE DIRECTORY
IDENTITY PROVIDERS
https://sts.domain.com
AUTHZ
SHAREPOINT AUTHZ
Anonymous
Authentication
Is In Site Group?
Does user have claim attribute?
Web Application / Site Collection
Secured Site / Site Collection / Content
Content Repository
Content
AUTHZ - LIMITING ACCESS CONTROL
AUTHZ - OFFICE 365 AND EXTERNAL USERS
AUTHZ - OFFICE 365 AND EXTERNAL USERS
EXPECT THE UNEXPECTED
REAL WORLD
WHAT DO I DO WHERE?
SECURITY IN THE REAL WORLD
• Expect the unexpected
• People will find a way to circumvent your
security
• Give users minimal permission
• Starting with Less is good
• Add functionality through permission as
needed
• Be prepared to secure at all levels
• Web Application
• Site Collection
• Site
• List or Library
• Item
• Use roles from Provider
• Active Directory Groups
• Membership and Role Provider Roles
• Claims
QUESTIONS
CATCH UP WITH US…
Usher_Daniel@bah.com
@binarybrewery
www.sharepointdan.com
Scott.hoag@appliedis.com
@ciphertxt
http://psconfig.com
THANK YOU
EVENT
SPONSORS
• Platinum & Gold sponsors
have tables here in the
Fireside Lounge
• Please visit them and
inquire about their
products & services
• To be eligible for prizes
make sure your bingo card
is signed by all
Platinum/Gold

Más contenido relacionado

Destacado

Building Scalable .NET Web Applications
Building Scalable .NET Web ApplicationsBuilding Scalable .NET Web Applications
Building Scalable .NET Web Applications
Buu Nguyen
 
10 performance and scalability secrets of ASP.NET websites
10 performance and scalability secrets of ASP.NET websites10 performance and scalability secrets of ASP.NET websites
10 performance and scalability secrets of ASP.NET websites
oazabir
 

Destacado (17)

Secure RESTful Web Services for ASP.NET Web API
Secure RESTful Web Services for ASP.NET Web APISecure RESTful Web Services for ASP.NET Web API
Secure RESTful Web Services for ASP.NET Web API
 
Design & Deploy a data-driven Web API in 2 hours
Design & Deploy a data-driven Web API in 2 hoursDesign & Deploy a data-driven Web API in 2 hours
Design & Deploy a data-driven Web API in 2 hours
 
End to End Security with MVC and Web API
End to End Security with MVC and Web APIEnd to End Security with MVC and Web API
End to End Security with MVC and Web API
 
Building Scalable .NET Web Applications
Building Scalable .NET Web ApplicationsBuilding Scalable .NET Web Applications
Building Scalable .NET Web Applications
 
Tips and Tricks For Faster Asp.NET and MVC Applications
Tips and Tricks For Faster Asp.NET and MVC ApplicationsTips and Tricks For Faster Asp.NET and MVC Applications
Tips and Tricks For Faster Asp.NET and MVC Applications
 
ASP.NET Core 1.0 Overview: Post-RC2
ASP.NET Core 1.0 Overview: Post-RC2ASP.NET Core 1.0 Overview: Post-RC2
ASP.NET Core 1.0 Overview: Post-RC2
 
Overview of the .Net Collection Framework and Immutable Collections
Overview of the .Net Collection Framework and Immutable CollectionsOverview of the .Net Collection Framework and Immutable Collections
Overview of the .Net Collection Framework and Immutable Collections
 
5. web api 2 aspdotnet-mvc5-slides
5. web api 2 aspdotnet-mvc5-slides5. web api 2 aspdotnet-mvc5-slides
5. web api 2 aspdotnet-mvc5-slides
 
ASP.NET Core MVC + Web API with Overview (Post RC2)
ASP.NET Core MVC + Web API with Overview (Post RC2)ASP.NET Core MVC + Web API with Overview (Post RC2)
ASP.NET Core MVC + Web API with Overview (Post RC2)
 
Scaling asp.net websites to millions of users
Scaling asp.net websites to millions of usersScaling asp.net websites to millions of users
Scaling asp.net websites to millions of users
 
10 performance and scalability secrets of ASP.NET websites
10 performance and scalability secrets of ASP.NET websites10 performance and scalability secrets of ASP.NET websites
10 performance and scalability secrets of ASP.NET websites
 
ASP.NET Mvc 4 web api
ASP.NET Mvc 4 web apiASP.NET Mvc 4 web api
ASP.NET Mvc 4 web api
 
Learning ASP.NET 5 and MVC 6
Learning ASP.NET 5 and MVC 6Learning ASP.NET 5 and MVC 6
Learning ASP.NET 5 and MVC 6
 
ASP.NET MVC Performance
ASP.NET MVC PerformanceASP.NET MVC Performance
ASP.NET MVC Performance
 
Web API or WCF - An Architectural Comparison
Web API or WCF - An Architectural ComparisonWeb API or WCF - An Architectural Comparison
Web API or WCF - An Architectural Comparison
 
Rest API Security
Rest API SecurityRest API Security
Rest API Security
 
Securing RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID ConnectSecuring RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID Connect
 

Similar a Authentication, Authorization, and Identity – More than meets the eye…

SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
Liam Cleary [MVP]
 
SharePoint Cincinnati 2015 Exposing Line of Business data with SharePoint
SharePoint Cincinnati 2015 Exposing Line of Business data with SharePointSharePoint Cincinnati 2015 Exposing Line of Business data with SharePoint
SharePoint Cincinnati 2015 Exposing Line of Business data with SharePoint
Scott_Brickey
 
Practical Federated Identity
Practical Federated Identity Practical Federated Identity
Practical Federated Identity
WSO2
 
unit 1 Federated Identity Management_4.pptx
unit 1 Federated Identity Management_4.pptxunit 1 Federated Identity Management_4.pptx
unit 1 Federated Identity Management_4.pptx
zmulani8
 

Similar a Authentication, Authorization, and Identity – More than meets the eye… (20)

Getting Started with Office 365
Getting Started with Office 365Getting Started with Office 365
Getting Started with Office 365
 
SharePoint Saturday Austin - Share point authentication and authorization
SharePoint Saturday Austin - Share point authentication and authorizationSharePoint Saturday Austin - Share point authentication and authorization
SharePoint Saturday Austin - Share point authentication and authorization
 
SharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San FranciscoSharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San Francisco
 
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
 
Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...
 
SharePoint Cincinnati 2015 Exposing Line of Business data with SharePoint
SharePoint Cincinnati 2015 Exposing Line of Business data with SharePointSharePoint Cincinnati 2015 Exposing Line of Business data with SharePoint
SharePoint Cincinnati 2015 Exposing Line of Business data with SharePoint
 
The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)
 
Practical Federated Identity
Practical Federated Identity Practical Federated Identity
Practical Federated Identity
 
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
 
SharePoint Saturday Utah - Do you claim to be from the Azure Sky?
SharePoint Saturday Utah - Do you claim to be from the Azure Sky?SharePoint Saturday Utah - Do you claim to be from the Azure Sky?
SharePoint Saturday Utah - Do you claim to be from the Azure Sky?
 
ESPC15 - Extending Authentication and Authorization
ESPC15 - Extending Authentication and AuthorizationESPC15 - Extending Authentication and Authorization
ESPC15 - Extending Authentication and Authorization
 
SharePoint Hybrid Search - What is it really?
SharePoint Hybrid Search - What is it really?SharePoint Hybrid Search - What is it really?
SharePoint Hybrid Search - What is it really?
 
SharePoint MeetUp - hybrid search - 121016
SharePoint MeetUp - hybrid search - 121016SharePoint MeetUp - hybrid search - 121016
SharePoint MeetUp - hybrid search - 121016
 
Cloud identity management meetup 150108
Cloud identity management meetup 150108Cloud identity management meetup 150108
Cloud identity management meetup 150108
 
unit 1 Federated Identity Management_4.pptx
unit 1 Federated Identity Management_4.pptxunit 1 Federated Identity Management_4.pptx
unit 1 Federated Identity Management_4.pptx
 
Envision it Webinar - Extranet Identity Management and Authentication for Sha...
Envision it Webinar - Extranet Identity Management and Authentication for Sha...Envision it Webinar - Extranet Identity Management and Authentication for Sha...
Envision it Webinar - Extranet Identity Management and Authentication for Sha...
 
Moving to the cloud with Office 365
Moving to the cloud with Office 365Moving to the cloud with Office 365
Moving to the cloud with Office 365
 
Implementing and Managing Office 365 - Jacksonville IT Pro Camp 2017
Implementing and Managing Office 365  -  Jacksonville IT Pro Camp 2017Implementing and Managing Office 365  -  Jacksonville IT Pro Camp 2017
Implementing and Managing Office 365 - Jacksonville IT Pro Camp 2017
 
CIS 2015- User-Authorized Discovery- George Fletcher
CIS 2015- User-Authorized Discovery- George FletcherCIS 2015- User-Authorized Discovery- George Fletcher
CIS 2015- User-Authorized Discovery- George Fletcher
 
2019 - Tech Talk DC - Token-based security for web applications using OAuth2 ...
2019 - Tech Talk DC - Token-based security for web applications using OAuth2 ...2019 - Tech Talk DC - Token-based security for web applications using OAuth2 ...
2019 - Tech Talk DC - Token-based security for web applications using OAuth2 ...
 

Más de Scott Hoag

Más de Scott Hoag (20)

SharePoint Conference 2018 - Understanding Office 365 Usage Reporting
SharePoint Conference 2018 - Understanding Office 365 Usage ReportingSharePoint Conference 2018 - Understanding Office 365 Usage Reporting
SharePoint Conference 2018 - Understanding Office 365 Usage Reporting
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
 
Global Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security CenterGlobal Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security Center
 
Global Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityGlobal Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network Security
 
SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...
SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...
SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...
 
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
 
JAXSPUG April 2016 - Staying in the Know with Office 365
JAXSPUG April 2016 - Staying in the Know with Office 365JAXSPUG April 2016 - Staying in the Know with Office 365
JAXSPUG April 2016 - Staying in the Know with Office 365
 
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
 
SPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePointSPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
 
SPSNYC SharePoint Worst Practices
SPSNYC SharePoint Worst PracticesSPSNYC SharePoint Worst Practices
SPSNYC SharePoint Worst Practices
 
March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...
March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...
March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...
 
SYDSP - Office 365 and Cloud Identity - What does it mean for me?
SYDSP  - Office 365 and Cloud Identity - What does it mean for me?SYDSP  - Office 365 and Cloud Identity - What does it mean for me?
SYDSP - Office 365 and Cloud Identity - What does it mean for me?
 
SPSVB - Office 365 and Hybrid Solutions... what works for my organization?
SPSVB - Office 365 and Hybrid Solutions... what works for my organization?SPSVB - Office 365 and Hybrid Solutions... what works for my organization?
SPSVB - Office 365 and Hybrid Solutions... what works for my organization?
 
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
 
SPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePointSPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
 
SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...
SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...
SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...
 
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
 
SPSCBR - Pitfalls of Migrating to SharePoint 2013
SPSCBR - Pitfalls of Migrating to SharePoint 2013SPSCBR - Pitfalls of Migrating to SharePoint 2013
SPSCBR - Pitfalls of Migrating to SharePoint 2013
 
Office 365 and Cloud Identity – What Does It Mean For Me?
Office 365 and Cloud Identity – What Does It Mean For Me?Office 365 and Cloud Identity – What Does It Mean For Me?
Office 365 and Cloud Identity – What Does It Mean For Me?
 
Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Authentication, Authorization, and Identity – More than meets the eye…

Notas del editor

  1. Dan
  2. Dan
  3. Dan/Scott
  4. Scott
  5. Scott
  6. Scott
  7. Dan
  8. Scott
  9. Dan
  10. Dan
  11. Scott
  12. Scott
  13. Danger Waterfall ahead
  14. Scott----- Meeting Notes (7/23/12 23:35) -----Thinking about administrators for SharePoint - what access do they have?
  15. Dan
  16. Dan
  17. Dan
  18. Dan
  19. Dan/Scott
  20. ScottStandards based: Wide SupportEasy to configure? Multiple Web Config changes, Web Application Changes and then of course the actual configuration of your identity provider
  21. Scott
  22. Dan
  23. Scott
  24. Scott
  25. Dan
  26. Dan
  27. Dan/Scott
  28. Dan
  29. Scott
  30. Scott
  31. Scott
  32. Scott
  33. Dan
  34. Dan
  35. DanCurious how to manage Windows Azure Active Directory through PowerShell? http://technet.microsoft.com/en-us/library/jj151815.aspx
  36. DanCurious how to manage Windows Azure Active Directory through PowerShell? http://technet.microsoft.com/en-us/library/jj151815.aspx
  37. Scott
  38. Scott
  39. ScottDifferent security boundaries and the permissions that can be applied to them.
  40. Dan
  41. Dan
  42. Dan
  43. Scott
  44. Dan
  45. Scott