Community Course

Managing trust relationships with multiple business identity providers (basics)

55091AC (Class Pack)
Managing trust relationships with multiple business identity providers (basics)
Decoupling cloud services from all the complexity by maintaining a direct relationship with all the identity providers is the topic of this course. Each identity provider can use its own authentication protocol and the authentication results will get normalized and once established will Access Control Services (ACS) care about authentication and authorization including provisioning of a UI for the user to choose among all the recognized identity providers. Claims will be accessible for the application developer as well as for SSO IT Pros to establish easy authentication and/or authorization without the necessity to know authentication protocols in detail. Management of different and multiple business identity providers will be handled in a unique fashion without the necessity to write different code. This relationships is called ‘normalizing attributes’ and will be realized by you via the Azure Management APIs.
Please contact your Learning Partner in order to take this course
Author: Olaf Cames

Course Duration: 3 Days

SATV: Yes

About This Course

Decoupling cloud service from all the complexity maintaining a direct relationship with all the identity providers. Any identity provider can use its own authentication protocol and the authentication results will get normalized and once established will Access Control Services (ACS) care about authentication and authorization including provisioning of a UI for the user to choose among all the recognized identity providers. Claims will be accessible for the application developer as well as for SSO ITPro to establish easy authentication and/or authorization without the necessity to know authentication protocols in detail. Management of different and multiple business identity providers will be handled in a unique fashion without the necessity to write different code. This relationship is called ‘normalizing attributes’ and will be realized by you via the Azure Management APIs.

Audience Profile

This course is intended for Architects, IT Professional (IT Pros) and Developers.

IT Professional (IT Pros) who also create software applications, build or write computer code or develop Web sites or complex macros as a secondary responsibility and Developers who create software applications, develop web sites and create complex macros. Both should have a minimum of three months programming experience in C# and have basic Visual Studio 2010 or Visual Studio 2012 or Visual Studio 2013 navigation skills as well as Architects tasked with transitioning Identity and Access from classic on-Premise or non-Azure datacenters into Microsoft Azure Cloud or tasked to build secure IaaS/PaaS Hybrids between on-premise and Microsoft Azure Cloud.

At Course Completion

  • Establish an organizational Enterprise Security Service Bus
  • Create a Relying Party
  • Establish ACS to delegate authentication
  • Forward every request from unauthenticated users to ACS
  • Broker authentication
  • Change access rules in response to programmatic events
  • Produce a securable resource
  • Configure and code Input and Output claims transformation
  • Broker Security Token Services from Yahoo and Microsoft
  • Establish a tokenized communication between Azure Namespaces and WS-Federation sign-in endpoints
  • Establish a Microsoft Azure Active Directory (MAAD) as an (additional) identity provider for any application associated/interfacing with their namespace
  • Create an Azure Identity Provider via Namespace association
  • Establish Azure Active Directory data streams into Name Space connected Applications
  • Register a MAAD Graph Database as an additional identity provider for a namespace that controls global access and SSO
  • Execute basic steps to establish MAAD as an SSO identity providers for web application