SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Downloaden Sie, um offline zu lesen
2013 © Trivadis
BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN
Microsoft Azure Advanced Topics
Stefan Geiger
Gerry Keune
@trivadis.com
12.06.2014
Advanced Topics
1
2013 © Trivadis
AGENDA
1. Service Bus
2. Identity
3. SQL Database
12.06.2014
Advanced Topics
2
2013 © Trivadis
Azure Service Bus Overview
 PaaS Messaging Middleware
 All Microsoft Azure Datacenters
 Multiple Clusters (Scale-Units) per Datacenter
 Provides secure messaging and connectivity across different network
topologies
 Uses ACS to allow sending messages to and listening on endpoints
 Key Features
 Pub/Sub Reliable Messaging (Brokered Messaging)
 Relay
 Notifications
05.06.2014
Advanced Topics
3
*customer preview
2013 © Trivadis
Service Bus Relay Service
 Enables hybrid applications that span on-premises and the cloud
 Implements open format and protocols
 Supports REST and WS-*
 Exposes Service Endpoints into the Cloud
 Accessible for Cloud & On-Premise Services
 Relay Service allows communication between the client and services
behind firewalls and NAT routers
 Communication Patterns
 One-way communication,
 Publish/Subscribe
 Peer-to-Peer
 Multicast
 Direct Connections
05.06.2014
Advanced Topics
5
2013 © Trivadis
Architecture
05.06.2014
Advanced Topics
6
2013 © Trivadis
Challenges
 Addressability and discoverability
 Private addresses and Network Address Translation (NAT)
 Dynamic addresses (e.g. ISP)
 Connectivity
 Firewalls (denial of inbound connections)
 Event distribution
 Transient connectivity
05.06.2014
Advanced Topics
7
2013 © Trivadis
Service Bus Relaying Messages
05.06.2014
Advanced Topics
9
2013 © Trivadis
Security
 Messages travelling between communication parties can be secured
 [Microsoft.ServiceBus.EndToEndSecurityMode]
 Message security is independent of relay security
 Message Security Types
 None
- Disables Security
 Transport (Default)
- Message is sent through a secure channel (e.g HTTPS) to and from the relay
service. (Not Secure within AppFabric SB)
 Message
- Encrypt body of the message (X509)
 TransportWithMessageCredentials
- Combination of Transport/Message types
05.06.2014
Advanced Topics
10
2013 © Trivadis
05.06.2014
Advanced Topics
11
Demo
Service Bus Relay
2013 © Trivadis
Service Bus Brokered Messaging
 Sophisticated Pub / Sub mechanism
 Disconnected communication between producers and consumers
 Scales independently of each other since the intermediate message broker
buffers any difference
 Supports two distinct forms of brokered messages
 Queues
 Topics & Subscriptions
 Features (some not all)
 Deadlettering, Sessions, Transaction
 Scheduled Messages
 Duplicate Detection, Prefetch
05.06.2014
Advanced Topics
12
2013 © Trivadis
Message Dimension
 Max Message: 256 Kbyte
 Max Total Props: 64 Kbyte
 Includes sys props, reserve ~4 KByte
 Max Prop: No explicit limit
 Constrained by de-facto HTTP limits
if you use HTTP; ~4KB for a header max
 Max Body:
256KByte – sizeof(Props)
05.06.2014
Advanced Topics
13
2013 © Trivadis
Delivery Options
 Receive and Delete
 Fastest. Message lost if receiver crashes or transmission fails
 Peek Lock
 Message is locked when retrieved. Reappears on broker when not deleted
within lock timeout.
 Session + Peek Lock
 Message is locked along with all subsequent messages w/ same session-id
ensuring order
05.06.2014
Advanced Topics
14
Receive and Delete
2. Delete/Unlock
1. Peek/Lock
2013 © Trivadis
Service Bus Queues
 Ordered Message Log
 Ordered by arrival (broker assigns strongly monotonic sequence number to each msg)
 Timestamped on arrival (authoritative clock)
 Stored in SQL; once accepted, the message is as safe as any data in the SQL deployment
 Multiplexing with sessions
 Two modes: Pull and Forward
 Pull – delivers messages on request, allowing concurrent readers
 Forward – delivers message to single forward destination
05.06.2014
Advanced Topics
15
2013 © Trivadis
Service Bus Topics
 All features of Queues, plus Multiple, Independent Subscriptions
 Named, durably created (optional)
- Quota: Up to 2000 concurrent subscriptions
 Rules with filter conditions on msg headers
- Quota: Up to 2000 rules per subscription
- Optional action set/modify message props
- Each rule hit yields a message
 Topic 'tail' and subscription 'head' are fully protocol compatible with
Queues
05.06.2014
Advanced Topics
17
2013 © Trivadis
Programming Options
05.06.2014
Advanced Topics
19
Apps
NetMessagingBinding
.NET Service Bus Messaging API
.NET WCF Service Model
SB Messaging Protocol
(net.tcp, proprietary)
AMQP 1.0
C/C++
(incl
Embedded)
Apache
Proton-C
HTTP(S)
PHP
client
Node.js
client
Python
client
Java/JMS
Apache
Qpid JMS
AMQP
1.0
Any
HTTP
client
2013 © Trivadis
AGENDA
1. Service Bus
2. Identity
3. SQL Database
12.06.2014
Advanced Topics
22
2013 © Trivadis
Security
 Authentication and Authorization
 Use Claims-based Identity
 Authentication and access management based on open protocols
 Reduces infrastructure dependencies
- can be hosted on-premises or in the cloud without changes
 Factoring authentication out of applications
 Identity technologies and services used with Azure
 Windows Identity Foundation (WIF)
 Active Directory Federation Services 2.0
 Azure Access Control Service
05.06.2014
Advanced Topics
23
2013 © Trivadis
Claims-based solution
 Stop building custom identification and user account databases into
every new application
 One approach to identity that works in various scenarios
 Factoring out authentication of applications
 Easy upgrade to stronger authentication methods
 Identity Federation
 WIF (Windows Identity Foundation) Framework simplifies implementing
claims-based identity in your applications
05.06.2014
Advanced Topics
24
2013 © Trivadis
Claims-based Identity Model
 User’s identity to your application as a set of claims
 Claims are attributes made by an issuer (e.g. email adress, username)
 Identity data you receive comes from a trusted source
 If you trust the issuer you will trust the claim
 claim is a statement about a user made from a authority
 Releases Application from
 Authenticating users, storing user accounts and passwords
 Calling to enterprise directories to look up user identity details.
 Integrating with identity systems from other platforms or companies.
05.06.2014
Advanced Topics
25
User Name:
Email:
Roles:
IsNETNerd:
Stefan
stefan.geiger@trivadis.com
Consultant, Trainer
true
2013 © Trivadis
Security Token
 The user delivers a set of claims to your application piggybacked along
with her request
 Token is a Serialized set of claims digitally signed by the issuing
authority
 Signature assures authenticity of claims
 Web-Service carries the claim in the security header of the SOAP
envelope.
 Browser-based Web application sends claims via an HTTP POST from the
user’s browser
 Can be cached in a cookie if a session is desired
05.06.2014
Advanced Topics
26
2013 © Trivadis
Security Token Service (STS)
 STS builds, signs, and issues security tokens
 Claims, tokens, and STSs are the foundation of claims-based identity
05.06.2014
Advanced Topics
27
Claim
List of
Trusted
STS
Token
Token
1
Authenticate user,
return token
2 Submit token
3
Verfify token’s
signature
and STS is trusted
4 Use claims in token
2013 © Trivadis
05.06.2014
Advanced Topics
28
Demo
Claims-based Authentication
2013 © Trivadis
Identity Federation
 Authenticate users across different security domains
 SAML (Security Assertion Markup Language )
 XML-based standard for exchanging authentication and authorization data
between security realms
05.06.2014
Advanced Topics
29
1 2
3
Organisation 1 Organisation 2
2013 © Trivadis
Access Control Service
 Allows you to integrate single sign on (SSO) and centralized
authorization into your web applications
05.06.2014
Advanced Topics
30
2013 © Trivadis
Access Control Service
 Out-of-the-box support for popular web identity providers including:
Windows Live ID, Google, Yahoo, and Facebook
 Support for OAuth 2.0 (draft 13), WS-Trust, and WS-Federation protocols
 Support for the SAML 1.1, SAML 2.0, and Simple Web Token (SWT) token
formats
05.06.2014
Advanced Topics
31
2013 © Trivadis
Security Best Practices
 Authentication and Authorization
 Use Claims-based Identity
 Authentication and access management based on open protocols
 Reduces infrastructure dependencies
- can be hosted on-premises or in the cloud without changes
 Factoring authentication out of applications
 Identity technologies and services used with Azure
 Windows Identity Foundation (WIF)
 Active Directory Federation Services 2.0
 Azure Access Control Service
05.06.2014
Advanced Topics
32
2013 © Trivadis
AGENDA
1. Service Bus
2. Identity
3. SQL Database
12.06.2014
Advanced Topics
33
2013 © Trivadis
SQL Database Overview
 Relational database engine provided as Service based on SQL Server
technology
 Many SQL features are supported
 Use with On-Premise and Cloud Application
 Data access through ADO.NET or other providers
 Data manipulation using standard T-SQL statements.
 Databases in Azure are limited to either 1/500GB depending on the
edition selected
 Consider size limitation for migration scenarios
 Automatically provides High Availability “out of box”
 Transparent failover in case of failure
 Load balancing of data to ensure SLA
12.06.2014
Advanced Topics
34
2013 © Trivadis
SQL Database Network Topology
12.06.2014
Advanced Topics
35
Application
Internet
LBTDS (tcp)
TDS (tcp)
TDS (tcp)
Apps use standard SQL client
libraries: ODBC, ADO.Net, PHP, …
Load balancer forwards ‘sticky’
sessions to TDS protocol tier
Gateway Gateway Gateway Gateway Gateway Gateway
Availability: Fabric, Failover, Replication, and Load balancing
SQL SQL SQL SQL SQLSQL
Gateway: TDS protocol gateway, enforces AUTHN/AUTHZ policy; proxy to backend SQL
2013 © Trivadis
Database Replicas
12.06.2014
Advanced Topics
36
Replica 1
Replica 2
Replica 3
DB
Replica 4
2013 © Trivadis
Provisioning
12.06.2014
Advanced Topics
37
 Each account has zero or more logical
servers
 Provisioned via a common portal
 Establishes a billing instrument
 Each logical server has one or more
databases
 Contains metadata about database &
usage
 Unit of authentication, geo-location,
billing, reporting
 Generated DNS-based name
 Each database has standard SQL
objects
 Users, Tables, Views, Indices, etc
 Unit of consistency
Account
Server
Database
2013 © Trivadis
05.06.2014
Advanced Topics
38
Demo
SQL Database
2013 © Trivadis
SQL Database Management
 Microsoft Azure Management Portal
 Create and Delete Servers and Databases
 Create Credentials
 Configure Firewall settings
 Maintain databases
 Using Master Database
 System Procedures for maintaining database
 Show data usage -> billing information
 Create / Delete Databases
12.06.2014
Advanced Topics
39
2013 © Trivadis
Security
 Network Access Control
 Server is firewall protected (default no access)
 Configure using special SP sys.firewall_rule…..
 Authentication and Authorisation
 SQL Authentication (Username,Password)
 Authorisation identical to SQL Server (Roles)
 Admin Roles have special privileges
- Create / Drop Database
- Manage Logins
- Change Firewall Rules
12.06.2014
Advanced Topics
40
2013 © Trivadis
SQL Database Limitations
 Security
 SSPI authentication is not supported
 No database encryption
 Certain users are disallowed (sa, admin, administrator, guest, root)
 It isn’t possible to define another listening port rather 1433
 Backups
 Backup and restore operations are not available
- Use Import/Export
- Database clones are possible using create database statement
 Objects
 CLR. The .NET CLR isn’t available in SQL Azure
 Tables need Clustered Index
12.06.2014
Advanced Topics
41
2013 © Trivadis
SQL Database Limitations
 Miscellaneous
 No distributed transactions
 Database size limited to chosen subscription (max 500GB)
 No Service Broker
 No SQL Agent
 No Database file placement
 Reduced subset of system schema objects
12.06.2014
Advanced Topics
42
2013 © Trivadis
Data Migration
 Existing SQL Server databases cannot be restored or attached to SQL
Database
 Data migration is a manual task using tools
 Generate SQL Scripts
 SQL Server Integration Service SSIS
 BCP utility
 BACPAC Export to Blob
12.06.2014
Advanced Topics
43
2013 © Trivadis
Database Backup
 Database Copy
 Allows you to create a single copy of a source database using the
AS COPY OF argument to the CREATE DATABASE statement:
 Copy process is background task. Query DMV sys.dm_database_copies
 SQL Data Sync
 Synchronize on-premise / cloud
 Manual
 To Blob Storage
 Import / Export (bacpac)
 Bacpac (schema and data)
 Dacpac (schema only)
12.06.2014
Advanced Topics
44
2013 © Trivadis
BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN
Thank You Q & A
12.06.2014
Advanced Topics
45

Weitere ähnliche Inhalte

Was ist angesagt?

Migrate to WVD and Beyond
Migrate to WVD and BeyondMigrate to WVD and Beyond
Migrate to WVD and BeyondMarius Sandbu
 
Multi-tenancy In the Cloud
Multi-tenancy In the CloudMulti-tenancy In the Cloud
Multi-tenancy In the Cloudsdevillers
 
Cloud computing 2
Cloud computing 2Cloud computing 2
Cloud computing 2Anh Nguyen
 
G07.2014 magic quadrant for enterprise file synchronization and sharing
G07.2014   magic quadrant for enterprise file synchronization and sharingG07.2014   magic quadrant for enterprise file synchronization and sharing
G07.2014 magic quadrant for enterprise file synchronization and sharingSatya Harish
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021Marius Sandbu
 
Cloud Ubuntu Open Stack Private Cloud
Cloud  Ubuntu Open Stack Private CloudCloud  Ubuntu Open Stack Private Cloud
Cloud Ubuntu Open Stack Private CloudThe World Bank
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureK.Mohamed Faizal
 
Citrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix
 
Multi-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud ComputingMulti-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud ComputingSrinath Perera
 
Citrix with Microsoft EMS
Citrix with Microsoft EMSCitrix with Microsoft EMS
Citrix with Microsoft EMSMarius Sandbu
 
Understanding IaaS Requirements & Design Cloud
Understanding IaaS Requirements & Design CloudUnderstanding IaaS Requirements & Design Cloud
Understanding IaaS Requirements & Design CloudJohn Treadway
 
Cloud Computing Use Cases Whitepaper 3 0
Cloud Computing Use Cases Whitepaper 3 0Cloud Computing Use Cases Whitepaper 3 0
Cloud Computing Use Cases Whitepaper 3 0Jason Reed
 
Seven standards of cloud computing
Seven standards of cloud computingSeven standards of cloud computing
Seven standards of cloud computingHossam Zein
 
Azure Networking - The First Technical Challenge
Azure Networking  - The First Technical ChallengeAzure Networking  - The First Technical Challenge
Azure Networking - The First Technical ChallengeAidan Finn
 
Cloud Deploying a Public Cloud on Ubuntu Open Stack
Cloud Deploying a Public Cloud on Ubuntu Open StackCloud Deploying a Public Cloud on Ubuntu Open Stack
Cloud Deploying a Public Cloud on Ubuntu Open StackThe World Bank
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingMarius Sandbu
 

Was ist angesagt? (20)

Azure security
Azure  securityAzure  security
Azure security
 
Migrate to WVD and Beyond
Migrate to WVD and BeyondMigrate to WVD and Beyond
Migrate to WVD and Beyond
 
04 Azure IAAS 101
04 Azure IAAS 10104 Azure IAAS 101
04 Azure IAAS 101
 
Multi-tenancy In the Cloud
Multi-tenancy In the CloudMulti-tenancy In the Cloud
Multi-tenancy In the Cloud
 
Cloud computing 2
Cloud computing 2Cloud computing 2
Cloud computing 2
 
G07.2014 magic quadrant for enterprise file synchronization and sharing
G07.2014   magic quadrant for enterprise file synchronization and sharingG07.2014   magic quadrant for enterprise file synchronization and sharing
G07.2014 magic quadrant for enterprise file synchronization and sharing
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021
 
Cloud Ubuntu Open Stack Private Cloud
Cloud  Ubuntu Open Stack Private CloudCloud  Ubuntu Open Stack Private Cloud
Cloud Ubuntu Open Stack Private Cloud
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft Azure
 
Citrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix Netscaler Deployment Guide
Citrix Netscaler Deployment Guide
 
Infra project report1
Infra project report1Infra project report1
Infra project report1
 
Multi-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud ComputingMulti-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud Computing
 
Citrix with Microsoft EMS
Citrix with Microsoft EMSCitrix with Microsoft EMS
Citrix with Microsoft EMS
 
Understanding IaaS Requirements & Design Cloud
Understanding IaaS Requirements & Design CloudUnderstanding IaaS Requirements & Design Cloud
Understanding IaaS Requirements & Design Cloud
 
Cloud Computing Use Cases Whitepaper 3 0
Cloud Computing Use Cases Whitepaper 3 0Cloud Computing Use Cases Whitepaper 3 0
Cloud Computing Use Cases Whitepaper 3 0
 
Seven standards of cloud computing
Seven standards of cloud computingSeven standards of cloud computing
Seven standards of cloud computing
 
Azure Networking - The First Technical Challenge
Azure Networking  - The First Technical ChallengeAzure Networking  - The First Technical Challenge
Azure Networking - The First Technical Challenge
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud Deploying a Public Cloud on Ubuntu Open Stack
Cloud Deploying a Public Cloud on Ubuntu Open StackCloud Deploying a Public Cloud on Ubuntu Open Stack
Cloud Deploying a Public Cloud on Ubuntu Open Stack
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User Computing
 

Ähnlich wie Session 4: Fortgeschrittene Themen

Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930
Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930
Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930A10 Networks
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...IEEEGLOBALSOFTTECHNOLOGIES
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesIEEEFINALYEARPROJECTS
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft CloudEuropean Collaboration Summit
 
Azure Services Platform Oc Event Ned
Azure Services Platform Oc Event NedAzure Services Platform Oc Event Ned
Azure Services Platform Oc Event NedWes Yanaga
 
Becoming a Microsoft Specialist in Microsoft Azure Infrastructure
Becoming a Microsoft Specialist in Microsoft Azure InfrastructureBecoming a Microsoft Specialist in Microsoft Azure Infrastructure
Becoming a Microsoft Specialist in Microsoft Azure InfrastructureSyed Irtaza Ali
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEcscpconf
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanNCCOMMS
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfBenAissaTaher1
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13Cohesive Networks
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and IntegrationsCloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrationspaulfallon
 
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2SkillFactory
 

Ähnlich wie Session 4: Fortgeschrittene Themen (20)

Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930
Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930
Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issues
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Yongsan presentation 2
Yongsan presentation 2Yongsan presentation 2
Yongsan presentation 2
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
Azure Services Platform Oc Event Ned
Azure Services Platform Oc Event NedAzure Services Platform Oc Event Ned
Azure Services Platform Oc Event Ned
 
Azure F5 Solutions
Azure F5 SolutionsAzure F5 Solutions
Azure F5 Solutions
 
Becoming a Microsoft Specialist in Microsoft Azure Infrastructure
Becoming a Microsoft Specialist in Microsoft Azure InfrastructureBecoming a Microsoft Specialist in Microsoft Azure Infrastructure
Becoming a Microsoft Specialist in Microsoft Azure Infrastructure
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
 
Project
ProjectProject
Project
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdf
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Paper1
Paper1Paper1
Paper1
 
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and IntegrationsCloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
 
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
 

Mehr von Digicomp Academy AG

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Digicomp Academy AG
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Digicomp Academy AG
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Digicomp Academy AG
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutDigicomp Academy AG
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutDigicomp Academy AG
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xDigicomp Academy AG
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Digicomp Academy AG
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinDigicomp Academy AG
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Digicomp Academy AG
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattDigicomp Academy AG
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogDigicomp Academy AG
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnDigicomp Academy AG
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingDigicomp Academy AG
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessDigicomp Academy AG
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Digicomp Academy AG
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceDigicomp Academy AG
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudDigicomp Academy AG
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slidesDigicomp Academy AG
 

Mehr von Digicomp Academy AG (20)

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handout
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit x
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe Klein
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING Expertendialog
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital Business
 
Minenfeld IPv6
Minenfeld IPv6Minenfeld IPv6
Minenfeld IPv6
 
Was ist design thinking
Was ist design thinkingWas ist design thinking
Was ist design thinking
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slides
 

Kürzlich hochgeladen

How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 

Kürzlich hochgeladen (20)

How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 

Session 4: Fortgeschrittene Themen

  • 1. 2013 © Trivadis BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN Microsoft Azure Advanced Topics Stefan Geiger Gerry Keune @trivadis.com 12.06.2014 Advanced Topics 1
  • 2. 2013 © Trivadis AGENDA 1. Service Bus 2. Identity 3. SQL Database 12.06.2014 Advanced Topics 2
  • 3. 2013 © Trivadis Azure Service Bus Overview  PaaS Messaging Middleware  All Microsoft Azure Datacenters  Multiple Clusters (Scale-Units) per Datacenter  Provides secure messaging and connectivity across different network topologies  Uses ACS to allow sending messages to and listening on endpoints  Key Features  Pub/Sub Reliable Messaging (Brokered Messaging)  Relay  Notifications 05.06.2014 Advanced Topics 3 *customer preview
  • 4. 2013 © Trivadis Service Bus Relay Service  Enables hybrid applications that span on-premises and the cloud  Implements open format and protocols  Supports REST and WS-*  Exposes Service Endpoints into the Cloud  Accessible for Cloud & On-Premise Services  Relay Service allows communication between the client and services behind firewalls and NAT routers  Communication Patterns  One-way communication,  Publish/Subscribe  Peer-to-Peer  Multicast  Direct Connections 05.06.2014 Advanced Topics 5
  • 6. 2013 © Trivadis Challenges  Addressability and discoverability  Private addresses and Network Address Translation (NAT)  Dynamic addresses (e.g. ISP)  Connectivity  Firewalls (denial of inbound connections)  Event distribution  Transient connectivity 05.06.2014 Advanced Topics 7
  • 7. 2013 © Trivadis Service Bus Relaying Messages 05.06.2014 Advanced Topics 9
  • 8. 2013 © Trivadis Security  Messages travelling between communication parties can be secured  [Microsoft.ServiceBus.EndToEndSecurityMode]  Message security is independent of relay security  Message Security Types  None - Disables Security  Transport (Default) - Message is sent through a secure channel (e.g HTTPS) to and from the relay service. (Not Secure within AppFabric SB)  Message - Encrypt body of the message (X509)  TransportWithMessageCredentials - Combination of Transport/Message types 05.06.2014 Advanced Topics 10
  • 9. 2013 © Trivadis 05.06.2014 Advanced Topics 11 Demo Service Bus Relay
  • 10. 2013 © Trivadis Service Bus Brokered Messaging  Sophisticated Pub / Sub mechanism  Disconnected communication between producers and consumers  Scales independently of each other since the intermediate message broker buffers any difference  Supports two distinct forms of brokered messages  Queues  Topics & Subscriptions  Features (some not all)  Deadlettering, Sessions, Transaction  Scheduled Messages  Duplicate Detection, Prefetch 05.06.2014 Advanced Topics 12
  • 11. 2013 © Trivadis Message Dimension  Max Message: 256 Kbyte  Max Total Props: 64 Kbyte  Includes sys props, reserve ~4 KByte  Max Prop: No explicit limit  Constrained by de-facto HTTP limits if you use HTTP; ~4KB for a header max  Max Body: 256KByte – sizeof(Props) 05.06.2014 Advanced Topics 13
  • 12. 2013 © Trivadis Delivery Options  Receive and Delete  Fastest. Message lost if receiver crashes or transmission fails  Peek Lock  Message is locked when retrieved. Reappears on broker when not deleted within lock timeout.  Session + Peek Lock  Message is locked along with all subsequent messages w/ same session-id ensuring order 05.06.2014 Advanced Topics 14 Receive and Delete 2. Delete/Unlock 1. Peek/Lock
  • 13. 2013 © Trivadis Service Bus Queues  Ordered Message Log  Ordered by arrival (broker assigns strongly monotonic sequence number to each msg)  Timestamped on arrival (authoritative clock)  Stored in SQL; once accepted, the message is as safe as any data in the SQL deployment  Multiplexing with sessions  Two modes: Pull and Forward  Pull – delivers messages on request, allowing concurrent readers  Forward – delivers message to single forward destination 05.06.2014 Advanced Topics 15
  • 14. 2013 © Trivadis Service Bus Topics  All features of Queues, plus Multiple, Independent Subscriptions  Named, durably created (optional) - Quota: Up to 2000 concurrent subscriptions  Rules with filter conditions on msg headers - Quota: Up to 2000 rules per subscription - Optional action set/modify message props - Each rule hit yields a message  Topic 'tail' and subscription 'head' are fully protocol compatible with Queues 05.06.2014 Advanced Topics 17
  • 15. 2013 © Trivadis Programming Options 05.06.2014 Advanced Topics 19 Apps NetMessagingBinding .NET Service Bus Messaging API .NET WCF Service Model SB Messaging Protocol (net.tcp, proprietary) AMQP 1.0 C/C++ (incl Embedded) Apache Proton-C HTTP(S) PHP client Node.js client Python client Java/JMS Apache Qpid JMS AMQP 1.0 Any HTTP client
  • 16. 2013 © Trivadis AGENDA 1. Service Bus 2. Identity 3. SQL Database 12.06.2014 Advanced Topics 22
  • 17. 2013 © Trivadis Security  Authentication and Authorization  Use Claims-based Identity  Authentication and access management based on open protocols  Reduces infrastructure dependencies - can be hosted on-premises or in the cloud without changes  Factoring authentication out of applications  Identity technologies and services used with Azure  Windows Identity Foundation (WIF)  Active Directory Federation Services 2.0  Azure Access Control Service 05.06.2014 Advanced Topics 23
  • 18. 2013 © Trivadis Claims-based solution  Stop building custom identification and user account databases into every new application  One approach to identity that works in various scenarios  Factoring out authentication of applications  Easy upgrade to stronger authentication methods  Identity Federation  WIF (Windows Identity Foundation) Framework simplifies implementing claims-based identity in your applications 05.06.2014 Advanced Topics 24
  • 19. 2013 © Trivadis Claims-based Identity Model  User’s identity to your application as a set of claims  Claims are attributes made by an issuer (e.g. email adress, username)  Identity data you receive comes from a trusted source  If you trust the issuer you will trust the claim  claim is a statement about a user made from a authority  Releases Application from  Authenticating users, storing user accounts and passwords  Calling to enterprise directories to look up user identity details.  Integrating with identity systems from other platforms or companies. 05.06.2014 Advanced Topics 25 User Name: Email: Roles: IsNETNerd: Stefan stefan.geiger@trivadis.com Consultant, Trainer true
  • 20. 2013 © Trivadis Security Token  The user delivers a set of claims to your application piggybacked along with her request  Token is a Serialized set of claims digitally signed by the issuing authority  Signature assures authenticity of claims  Web-Service carries the claim in the security header of the SOAP envelope.  Browser-based Web application sends claims via an HTTP POST from the user’s browser  Can be cached in a cookie if a session is desired 05.06.2014 Advanced Topics 26
  • 21. 2013 © Trivadis Security Token Service (STS)  STS builds, signs, and issues security tokens  Claims, tokens, and STSs are the foundation of claims-based identity 05.06.2014 Advanced Topics 27 Claim List of Trusted STS Token Token 1 Authenticate user, return token 2 Submit token 3 Verfify token’s signature and STS is trusted 4 Use claims in token
  • 22. 2013 © Trivadis 05.06.2014 Advanced Topics 28 Demo Claims-based Authentication
  • 23. 2013 © Trivadis Identity Federation  Authenticate users across different security domains  SAML (Security Assertion Markup Language )  XML-based standard for exchanging authentication and authorization data between security realms 05.06.2014 Advanced Topics 29 1 2 3 Organisation 1 Organisation 2
  • 24. 2013 © Trivadis Access Control Service  Allows you to integrate single sign on (SSO) and centralized authorization into your web applications 05.06.2014 Advanced Topics 30
  • 25. 2013 © Trivadis Access Control Service  Out-of-the-box support for popular web identity providers including: Windows Live ID, Google, Yahoo, and Facebook  Support for OAuth 2.0 (draft 13), WS-Trust, and WS-Federation protocols  Support for the SAML 1.1, SAML 2.0, and Simple Web Token (SWT) token formats 05.06.2014 Advanced Topics 31
  • 26. 2013 © Trivadis Security Best Practices  Authentication and Authorization  Use Claims-based Identity  Authentication and access management based on open protocols  Reduces infrastructure dependencies - can be hosted on-premises or in the cloud without changes  Factoring authentication out of applications  Identity technologies and services used with Azure  Windows Identity Foundation (WIF)  Active Directory Federation Services 2.0  Azure Access Control Service 05.06.2014 Advanced Topics 32
  • 27. 2013 © Trivadis AGENDA 1. Service Bus 2. Identity 3. SQL Database 12.06.2014 Advanced Topics 33
  • 28. 2013 © Trivadis SQL Database Overview  Relational database engine provided as Service based on SQL Server technology  Many SQL features are supported  Use with On-Premise and Cloud Application  Data access through ADO.NET or other providers  Data manipulation using standard T-SQL statements.  Databases in Azure are limited to either 1/500GB depending on the edition selected  Consider size limitation for migration scenarios  Automatically provides High Availability “out of box”  Transparent failover in case of failure  Load balancing of data to ensure SLA 12.06.2014 Advanced Topics 34
  • 29. 2013 © Trivadis SQL Database Network Topology 12.06.2014 Advanced Topics 35 Application Internet LBTDS (tcp) TDS (tcp) TDS (tcp) Apps use standard SQL client libraries: ODBC, ADO.Net, PHP, … Load balancer forwards ‘sticky’ sessions to TDS protocol tier Gateway Gateway Gateway Gateway Gateway Gateway Availability: Fabric, Failover, Replication, and Load balancing SQL SQL SQL SQL SQLSQL Gateway: TDS protocol gateway, enforces AUTHN/AUTHZ policy; proxy to backend SQL
  • 30. 2013 © Trivadis Database Replicas 12.06.2014 Advanced Topics 36 Replica 1 Replica 2 Replica 3 DB Replica 4
  • 31. 2013 © Trivadis Provisioning 12.06.2014 Advanced Topics 37  Each account has zero or more logical servers  Provisioned via a common portal  Establishes a billing instrument  Each logical server has one or more databases  Contains metadata about database & usage  Unit of authentication, geo-location, billing, reporting  Generated DNS-based name  Each database has standard SQL objects  Users, Tables, Views, Indices, etc  Unit of consistency Account Server Database
  • 32. 2013 © Trivadis 05.06.2014 Advanced Topics 38 Demo SQL Database
  • 33. 2013 © Trivadis SQL Database Management  Microsoft Azure Management Portal  Create and Delete Servers and Databases  Create Credentials  Configure Firewall settings  Maintain databases  Using Master Database  System Procedures for maintaining database  Show data usage -> billing information  Create / Delete Databases 12.06.2014 Advanced Topics 39
  • 34. 2013 © Trivadis Security  Network Access Control  Server is firewall protected (default no access)  Configure using special SP sys.firewall_rule…..  Authentication and Authorisation  SQL Authentication (Username,Password)  Authorisation identical to SQL Server (Roles)  Admin Roles have special privileges - Create / Drop Database - Manage Logins - Change Firewall Rules 12.06.2014 Advanced Topics 40
  • 35. 2013 © Trivadis SQL Database Limitations  Security  SSPI authentication is not supported  No database encryption  Certain users are disallowed (sa, admin, administrator, guest, root)  It isn’t possible to define another listening port rather 1433  Backups  Backup and restore operations are not available - Use Import/Export - Database clones are possible using create database statement  Objects  CLR. The .NET CLR isn’t available in SQL Azure  Tables need Clustered Index 12.06.2014 Advanced Topics 41
  • 36. 2013 © Trivadis SQL Database Limitations  Miscellaneous  No distributed transactions  Database size limited to chosen subscription (max 500GB)  No Service Broker  No SQL Agent  No Database file placement  Reduced subset of system schema objects 12.06.2014 Advanced Topics 42
  • 37. 2013 © Trivadis Data Migration  Existing SQL Server databases cannot be restored or attached to SQL Database  Data migration is a manual task using tools  Generate SQL Scripts  SQL Server Integration Service SSIS  BCP utility  BACPAC Export to Blob 12.06.2014 Advanced Topics 43
  • 38. 2013 © Trivadis Database Backup  Database Copy  Allows you to create a single copy of a source database using the AS COPY OF argument to the CREATE DATABASE statement:  Copy process is background task. Query DMV sys.dm_database_copies  SQL Data Sync  Synchronize on-premise / cloud  Manual  To Blob Storage  Import / Export (bacpac)  Bacpac (schema and data)  Dacpac (schema only) 12.06.2014 Advanced Topics 44
  • 39. 2013 © Trivadis BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN Thank You Q & A 12.06.2014 Advanced Topics 45