1 / 26

.NET Services

.NET Services. John Shewchuk Technical Fellow Microsoft Corporation. Azure Services Platform. Microsoft Dynamics CRM Services. Microsoft SharePoint Services. .NET Services Three key takeaways. Powerful building blocks to help with Access Control and Application Messaging Easy to use

perry
Télécharger la présentation

.NET Services

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. .NET Services John Shewchuk Technical Fellow Microsoft Corporation

  2. Azure Services Platform Microsoft Dynamics CRM Services Microsoft SharePoint Services

  3. .NET ServicesThree key takeaways • Powerful building blocks to help with Access Control and Application Messaging • Easy to use • Based on open standards

  4. demo Using .NET Services

  5. Demo - Access Control Facebook 3 Browser Yahoo 7 1 8 2 9 5* 4* www.chefsintl.com acs.chefsintl.com 6 Google App Engine .NET Access Control Service * To keep the diagram simpler the redirection through the browser is not shown

  6. Demo - Service Bus Browser .NETService Bus 1 2 www.chefsintl.com 3 3 Google App Engine Windows “Toast” AJAX web site

  7. The Roadmap Updated CTPs Pricing & SLA Confirmation Commercial Availability First CTP Spring 2009 Fall 2009 Fall 2008 Summer 2009

  8. .NET Service Bus

  9. Service Bus Challenges • You want to make it easy and secure for partners to integrate with your application • But you don’t always know ahead of time the characteristics or scale of the integration • Plus partners and customers have devices and services running behind firewalls Approach • Provide a highly-available “Service Bus” based on standard Internet protocols

  10. The Service Bus Pattern Applications, Workflows, … Federated Identity and Access Control Service Registry Application Messaging Patterns Connectivity Fabric Your Services Clients On-Premises Cloud Services Desktop, RIA, Web Billing Storage ESB Desktop, RIA, Web Web, Desktop, RIAs, … … Compute Corp Service

  11. Service Bus Capabilties • Connectivity Fabric • NAT / firewall traversal • Mobile & intermittently connected receivers • Application Messaging • Bi-directional / peer-to-peer communication • Publish and subscribe – multicast to receivers through a stable URI • Cloud buffering – web integration, “queues”, … • Service Registry • Stable URIs for services • Discovery – supports Atom pub, … • Service Bus Workflows • Simple hosted message processing activities • Conditional behavior, fire events, transform messages, send mail, …

  12. Demos Mulitcast Chat

  13. Five Cool Service Bus Tricks • Create a custom, peer-to-peer Instant Messenger application in ~20 lines • Pop a “toast” when you have a new customer order • “Slingbox” your videos from home • Easy, secure, web-based sharing from mobile devices • Integrate and orchestrate corporate billing and fulfillment systems

  14. .NET Access Control

  15. Access Control Challenges • Lots of identity providers, many vendors, protocol variability – tricky to get it all right • Access checks strewn throughout applications • Hard to be agile, compliant, and flexible Approach • Federate a wide-range of identity providers and technologies – pluggable too • Factor out access control logic into manageable collection of rules

  16. The Access Control Pattern 3. Map input claims to output claims based on access control rules 1. Define access control rules Your Access Control Project 4. Return token (output claims from 3) 0. Trust exchanged; secrets, certs 2. Send token (Initial claims; e.g. identity) 6. Check for claims Your App (Relying Party) User (Application) 5. Send token w/ request

  17. Demos Secure Calculation

  18. Access Control Capabilties • A hosted security token service • The output security token contains claims computed from claims in incoming tokens • Define and manage rules to map claims to claims • Create and manage scopes; e.g. URLs • Create and manage claim types • Create and manage signing and encryption keys • Create and manage rules within an application scope • Rules can be chained; e.g. Bob  Manager, Manager  Edit – enables RBAC or more • Manage permissions on scopes; e.g. delegation • Standards based – works with Java, Ruby, PHP, …

  19. 5 Cool Access Control Tricks • Share a private Warcraft guild page with friends at Facebook/Yahoo in a few lines • Sell ad space in games and enable subleasing • Give enterprise users automatic access to a python-based training application • Generate access control reports across multiple applications and roles • Give friends permission to let their friends access the party pictures

  20. .NET Services in Practice

  21. Demo ScrumWall Dan Scarfe CEO Dot Net Solutions

  22. Demo CinemaMIX Todd Holmquist-Sutherland Principal Program Manager / Architect CSD Technical Strategy Team, Microsoft

  23. Next Steps • Get going with Azure CTPs • Register for a free Azure account • Download the SDKs • http://www.azure.com • Learn more about .NET Services • Access Control – Justin Smith – 2:30 – this room • Service Bus - Clemens Vasters – 4:25 – this room

  24. Please Complete an Evaluation FormYour feedback is important! • Evaluation forms can be found on each chair • Temp Staff at the back of the room have additional evaluation form copies

  25. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related