55091 Managing trust relationships with multiple business identity providers (basics)

Displaying courses for United States [Change]

Overview

Decoupling cloud service from all the complexity maintaining a direct relationship with all the identity providers.

Objectives

After completing this course, students will be able to:
  • Establish an organizational Enterprise Security Service Bus
  • Create a Relying Party
  • Establish ACS to delegate authentication
  • Forward every request from unauthenticated users to ACS
  • Broker authentication
  • Change access rules in response to programmatic events
  • Produce a securable resource
  • Configure and code Input and Output claims transformation
  • Broker Security Token Services from Yahoo and Microsoft
  • Establish a tokenized communication between Azure Namespaces and WS-Federation sign-in endpoints
  • Establish a Microsoft Azure Active Directory (MAAD) as an (additional) identity provider for any application associated/interfacing with their namespace
  • Create an Azure Identity Provider via Namespace association
  • Establish Azure Active Directory data streams into Name Space connected Applications
  • Register a MAAD Graph Database as an additional identity provider for a namespace that controls global access and SSO
  • Execute basic steps to establish MAAD as an SSO identity providers for web application

Audience

This course is intended for Architects, IT Professional (IT Pros) and Developers. IT Professional (IT Pros) who also create software applications, build or write computer code or develop Web sites or complex macros as a secondary responsibility and Developers who create software applications, develop web sites and create complex macros. Both should have a minimum of three months programming experience in C# and have basic Visual Studio 2010 or Visual Studio 2012 or Visual Studio 2013 navigation skills as well as Architects tasked with transitioning Identity and Access from classic on-Premise or non-Azure datacenters into Microsoft Azure Cloud or tasked to build secure IaaS/PaaS Hybrids between on-premise and Microsoft Azure Cloud.

Syllabus

Integration of traditional ASP.NET Web Sites into Enterprise Security Service Bus (ESSB)

  • Establish first steps to build an organizational Enterprise Security Service Bus
  • Create a Relying Party
  • Establish ACS to delegate authentication
  • Forwarding every request from unauthenticated users to ACS
  • Broker authentication
  • Change access rules in response to programmatic events
  • Lab : Logon with your VBIC OA
  • Lab : First step to establish an organizational Enterprise Security Service Bus
  • Lab : ACS to delegate authentication
  • Lab : Relying Party
  • Lab : Forwarding every request from unauthenticated users to ACS
  • Lab : Brokering authentication
  • Lab : Change access rules in response to programmatic events

Integration of public identity provider into Enterprise Security Service Bus (ESSB)

  • Hands-on establish advanced steps to create an organizational Enterprise Security Service Bus
  • Create a Relying Party
  • Establish ACS to delegate authentication
  • Forwarding every request from unauthenticated users to ACS
  • Lab : Produce a securable resource
  • Lab : Logon with your VBIC OA
  • Lab : Input and Output claims transformation
  • Lab : Brokering Security Token Services from Yahoo and Microsoft

Develop and publish applications that integrate with Microsoft Azure Active Directory (MAAD)

  • Establish a tokenized communication between Azure Namespaces and WS-Federation sign-in endpoints
  • Establish a Microsoft Azure Active Directory (MAAD) as an (additional) identity provider for any application associated/interfacing with your namespace
  • Lab : Logon with your VBIC OA
  • Lab : Azure Identity Provider via Namespace association
  • Lab : Establish Azure Active Directory data streams into Name Space connected Applications
  • Lab : MAAD Graph Database registration as an additional identity provider for your namespace that controls global access and SSO
  • Lab : MAAD identity providers as SSO for web application

Assessment (if time permits): Add French, German, English and Italian as a multilingual integration of traditional ASP.NET Web Sites into your Enterprise Security Service Bus (ESSB)

  • Code a multilingual Enterprise Security Service Bus (ESSB)
  • Lab : Logon with your VBIC OA
  • Lab : Repeat Module 1 from Step 1 until step 146
  • Lab : Modify Module 1 so your ESSB becomes multilingual and supports local STS claims originating from Italian, French, German and English office locations or customers in these countries.
  • Lab : Task 4: Inform your instructor and VBIC Help Desk if you have reached step 146 while accomplished Lab 3. Logout and close your RDP session.

Training provider

Teaching mode:
Classroom - Instructor Led
Online - Instructor Led
Duration: 3 days
Gooroo has partnered with the global leaders in IT training to give you access to quality training, personalised to you, targeted at increasing your job opportunities and salary.

Our pricing

We do not display pricing as Gooroo members qualify for special discounts not available elsewhere. You must enquire through Gooroo to get this benefit.

New courses are happening all the time

Our partner's expert training consultant will provide you with the times and all the details you need. Enquire today.

Top skills covered in this course

Active Directory
United States
This skill has an average salary of
US$85,526
and is mentioned in
0.87%
of job ads in this area.
Microsoft Azure
United States
This skill has an average salary of
US$114,716
and is mentioned in
1.03%
of job ads in this area.
System administration
United States
This skill has an average salary of
US$90,651
and is mentioned in
0.87%
of job ads in this area.
Database
United States
This skill has an average salary of
US$80,275
and is mentioned in
11.85%
of job ads in this area.