Description
This talk discusses the role of the Windows Azure AppFabric Access Control Service (ACS) in managing identity and access control for apps running on the Windows platform . ACS offers developers the means to offload most of the complexity of handling authentication, regardless of where the app will be hosted or from where it will be consumed, to a cloud-hosted service. After a brief introduction to the approach behind ACS, the talk will highlight how developers can take advantage of Windows Identity Foundation to easily connect to ACS, and will demonstrate various scenarios ACS unlocks such as enabling Windows 8 apps to authenticate users from Facebook, Google, or Windows Live ID and reusing AD accounts with apps hosted in Windows Azure without requiring Windows Azure Connect.
For more information, check out this course on Microsoft Virtual Academy:
Day:
3Code:
SAC-858TRoom:
MemphisShare
Download
Download this episode
- Low Quality MP4 (0.0 B)
- Mid Quality WMV (0.0 B)
- High Quality WMV (0.0 B)
For more information, check out this course on Microsoft Virtual Academy:
Event Homepage
More episodes in this series
Monitoring and troubleshooting Windows Azure apps
Related episodes
The keys to the cloud: Use Microsoft identities to sign in and access API from your mobile…
Secure your native and mobile applications with Microsoft identity and application…
Secure your web applications with Microsoft identity
Vittorio Bertocci at Techorama 2016
Developer Stories - Vittorio Bertocci - Identity
Azure AD
Microsoft Identity: State of the Union and Future Direction
Azure Active Directory: adding identity into your cloud-based apps (en)
Identity features in ASP.NET
Add identity into your cloud-based apps
The Discussion
-
femtobeam Thank you Vittorio. Your presentations are a pleasure to watch and you did a great job of simplifying structure for an important and complicated issue. It was great that you brought up remote medicine apps to make clear the point that Identity is important as the example you used of a heart monitor would then be relayed to a doctor (or more likely a computer program), which then fires back a signal to shock the patients heart. The need for Identity and a secure ACS across devices, browsers and sites is critical in those types of applications.
-
Lars Kemmann Agree with @femtobeam - this was a pleasure to watch and definitely simplified a complex subject.