SlideShare une entreprise Scribd logo
1  sur  39
Télécharger pour lire hors ligne
2013 © Trivadis
BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN
Microsoft Azure Advanced Topics
Stefan Geiger
Gerry Keune
@trivadis.com
12.06.2014
Advanced Topics
1
2013 © Trivadis
AGENDA
1. Service Bus
2. Identity
3. SQL Database
12.06.2014
Advanced Topics
2
2013 © Trivadis
Azure Service Bus Overview
 PaaS Messaging Middleware
 All Microsoft Azure Datacenters
 Multiple Clusters (Scale-Units) per Datacenter
 Provides secure messaging and connectivity across different network
topologies
 Uses ACS to allow sending messages to and listening on endpoints
 Key Features
 Pub/Sub Reliable Messaging (Brokered Messaging)
 Relay
 Notifications
05.06.2014
Advanced Topics
3
*customer preview
2013 © Trivadis
Service Bus Relay Service
 Enables hybrid applications that span on-premises and the cloud
 Implements open format and protocols
 Supports REST and WS-*
 Exposes Service Endpoints into the Cloud
 Accessible for Cloud & On-Premise Services
 Relay Service allows communication between the client and services
behind firewalls and NAT routers
 Communication Patterns
 One-way communication,
 Publish/Subscribe
 Peer-to-Peer
 Multicast
 Direct Connections
05.06.2014
Advanced Topics
5
2013 © Trivadis
Architecture
05.06.2014
Advanced Topics
6
2013 © Trivadis
Challenges
 Addressability and discoverability
 Private addresses and Network Address Translation (NAT)
 Dynamic addresses (e.g. ISP)
 Connectivity
 Firewalls (denial of inbound connections)
 Event distribution
 Transient connectivity
05.06.2014
Advanced Topics
7
2013 © Trivadis
Service Bus Relaying Messages
05.06.2014
Advanced Topics
9
2013 © Trivadis
Security
 Messages travelling between communication parties can be secured
 [Microsoft.ServiceBus.EndToEndSecurityMode]
 Message security is independent of relay security
 Message Security Types
 None
- Disables Security
 Transport (Default)
- Message is sent through a secure channel (e.g HTTPS) to and from the relay
service. (Not Secure within AppFabric SB)
 Message
- Encrypt body of the message (X509)
 TransportWithMessageCredentials
- Combination of Transport/Message types
05.06.2014
Advanced Topics
10
2013 © Trivadis
05.06.2014
Advanced Topics
11
Demo
Service Bus Relay
2013 © Trivadis
Service Bus Brokered Messaging
 Sophisticated Pub / Sub mechanism
 Disconnected communication between producers and consumers
 Scales independently of each other since the intermediate message broker
buffers any difference
 Supports two distinct forms of brokered messages
 Queues
 Topics & Subscriptions
 Features (some not all)
 Deadlettering, Sessions, Transaction
 Scheduled Messages
 Duplicate Detection, Prefetch
05.06.2014
Advanced Topics
12
2013 © Trivadis
Message Dimension
 Max Message: 256 Kbyte
 Max Total Props: 64 Kbyte
 Includes sys props, reserve ~4 KByte
 Max Prop: No explicit limit
 Constrained by de-facto HTTP limits
if you use HTTP; ~4KB for a header max
 Max Body:
256KByte – sizeof(Props)
05.06.2014
Advanced Topics
13
2013 © Trivadis
Delivery Options
 Receive and Delete
 Fastest. Message lost if receiver crashes or transmission fails
 Peek Lock
 Message is locked when retrieved. Reappears on broker when not deleted
within lock timeout.
 Session + Peek Lock
 Message is locked along with all subsequent messages w/ same session-id
ensuring order
05.06.2014
Advanced Topics
14
Receive and Delete
2. Delete/Unlock
1. Peek/Lock
2013 © Trivadis
Service Bus Queues
 Ordered Message Log
 Ordered by arrival (broker assigns strongly monotonic sequence number to each msg)
 Timestamped on arrival (authoritative clock)
 Stored in SQL; once accepted, the message is as safe as any data in the SQL deployment
 Multiplexing with sessions
 Two modes: Pull and Forward
 Pull – delivers messages on request, allowing concurrent readers
 Forward – delivers message to single forward destination
05.06.2014
Advanced Topics
15
2013 © Trivadis
Service Bus Topics
 All features of Queues, plus Multiple, Independent Subscriptions
 Named, durably created (optional)
- Quota: Up to 2000 concurrent subscriptions
 Rules with filter conditions on msg headers
- Quota: Up to 2000 rules per subscription
- Optional action set/modify message props
- Each rule hit yields a message
 Topic 'tail' and subscription 'head' are fully protocol compatible with
Queues
05.06.2014
Advanced Topics
17
2013 © Trivadis
Programming Options
05.06.2014
Advanced Topics
19
Apps
NetMessagingBinding
.NET Service Bus Messaging API
.NET WCF Service Model
SB Messaging Protocol
(net.tcp, proprietary)
AMQP 1.0
C/C++
(incl
Embedded)
Apache
Proton-C
HTTP(S)
PHP
client
Node.js
client
Python
client
Java/JMS
Apache
Qpid JMS
AMQP
1.0
Any
HTTP
client
2013 © Trivadis
AGENDA
1. Service Bus
2. Identity
3. SQL Database
12.06.2014
Advanced Topics
22
2013 © Trivadis
Security
 Authentication and Authorization
 Use Claims-based Identity
 Authentication and access management based on open protocols
 Reduces infrastructure dependencies
- can be hosted on-premises or in the cloud without changes
 Factoring authentication out of applications
 Identity technologies and services used with Azure
 Windows Identity Foundation (WIF)
 Active Directory Federation Services 2.0
 Azure Access Control Service
05.06.2014
Advanced Topics
23
2013 © Trivadis
Claims-based solution
 Stop building custom identification and user account databases into
every new application
 One approach to identity that works in various scenarios
 Factoring out authentication of applications
 Easy upgrade to stronger authentication methods
 Identity Federation
 WIF (Windows Identity Foundation) Framework simplifies implementing
claims-based identity in your applications
05.06.2014
Advanced Topics
24
2013 © Trivadis
Claims-based Identity Model
 User’s identity to your application as a set of claims
 Claims are attributes made by an issuer (e.g. email adress, username)
 Identity data you receive comes from a trusted source
 If you trust the issuer you will trust the claim
 claim is a statement about a user made from a authority
 Releases Application from
 Authenticating users, storing user accounts and passwords
 Calling to enterprise directories to look up user identity details.
 Integrating with identity systems from other platforms or companies.
05.06.2014
Advanced Topics
25
User Name:
Email:
Roles:
IsNETNerd:
Stefan
stefan.geiger@trivadis.com
Consultant, Trainer
true
2013 © Trivadis
Security Token
 The user delivers a set of claims to your application piggybacked along
with her request
 Token is a Serialized set of claims digitally signed by the issuing
authority
 Signature assures authenticity of claims
 Web-Service carries the claim in the security header of the SOAP
envelope.
 Browser-based Web application sends claims via an HTTP POST from the
user’s browser
 Can be cached in a cookie if a session is desired
05.06.2014
Advanced Topics
26
2013 © Trivadis
Security Token Service (STS)
 STS builds, signs, and issues security tokens
 Claims, tokens, and STSs are the foundation of claims-based identity
05.06.2014
Advanced Topics
27
Claim
List of
Trusted
STS
Token
Token
1
Authenticate user,
return token
2 Submit token
3
Verfify token’s
signature
and STS is trusted
4 Use claims in token
2013 © Trivadis
05.06.2014
Advanced Topics
28
Demo
Claims-based Authentication
2013 © Trivadis
Identity Federation
 Authenticate users across different security domains
 SAML (Security Assertion Markup Language )
 XML-based standard for exchanging authentication and authorization data
between security realms
05.06.2014
Advanced Topics
29
1 2
3
Organisation 1 Organisation 2
2013 © Trivadis
Access Control Service
 Allows you to integrate single sign on (SSO) and centralized
authorization into your web applications
05.06.2014
Advanced Topics
30
2013 © Trivadis
Access Control Service
 Out-of-the-box support for popular web identity providers including:
Windows Live ID, Google, Yahoo, and Facebook
 Support for OAuth 2.0 (draft 13), WS-Trust, and WS-Federation protocols
 Support for the SAML 1.1, SAML 2.0, and Simple Web Token (SWT) token
formats
05.06.2014
Advanced Topics
31
2013 © Trivadis
Security Best Practices
 Authentication and Authorization
 Use Claims-based Identity
 Authentication and access management based on open protocols
 Reduces infrastructure dependencies
- can be hosted on-premises or in the cloud without changes
 Factoring authentication out of applications
 Identity technologies and services used with Azure
 Windows Identity Foundation (WIF)
 Active Directory Federation Services 2.0
 Azure Access Control Service
05.06.2014
Advanced Topics
32
2013 © Trivadis
AGENDA
1. Service Bus
2. Identity
3. SQL Database
12.06.2014
Advanced Topics
33
2013 © Trivadis
SQL Database Overview
 Relational database engine provided as Service based on SQL Server
technology
 Many SQL features are supported
 Use with On-Premise and Cloud Application
 Data access through ADO.NET or other providers
 Data manipulation using standard T-SQL statements.
 Databases in Azure are limited to either 1/500GB depending on the
edition selected
 Consider size limitation for migration scenarios
 Automatically provides High Availability “out of box”
 Transparent failover in case of failure
 Load balancing of data to ensure SLA
12.06.2014
Advanced Topics
34
2013 © Trivadis
SQL Database Network Topology
12.06.2014
Advanced Topics
35
Application
Internet
LBTDS (tcp)
TDS (tcp)
TDS (tcp)
Apps use standard SQL client
libraries: ODBC, ADO.Net, PHP, …
Load balancer forwards ‘sticky’
sessions to TDS protocol tier
Gateway Gateway Gateway Gateway Gateway Gateway
Availability: Fabric, Failover, Replication, and Load balancing
SQL SQL SQL SQL SQLSQL
Gateway: TDS protocol gateway, enforces AUTHN/AUTHZ policy; proxy to backend SQL
2013 © Trivadis
Database Replicas
12.06.2014
Advanced Topics
36
Replica 1
Replica 2
Replica 3
DB
Replica 4
2013 © Trivadis
Provisioning
12.06.2014
Advanced Topics
37
 Each account has zero or more logical
servers
 Provisioned via a common portal
 Establishes a billing instrument
 Each logical server has one or more
databases
 Contains metadata about database &
usage
 Unit of authentication, geo-location,
billing, reporting
 Generated DNS-based name
 Each database has standard SQL
objects
 Users, Tables, Views, Indices, etc
 Unit of consistency
Account
Server
Database
2013 © Trivadis
05.06.2014
Advanced Topics
38
Demo
SQL Database
2013 © Trivadis
SQL Database Management
 Microsoft Azure Management Portal
 Create and Delete Servers and Databases
 Create Credentials
 Configure Firewall settings
 Maintain databases
 Using Master Database
 System Procedures for maintaining database
 Show data usage -> billing information
 Create / Delete Databases
12.06.2014
Advanced Topics
39
2013 © Trivadis
Security
 Network Access Control
 Server is firewall protected (default no access)
 Configure using special SP sys.firewall_rule…..
 Authentication and Authorisation
 SQL Authentication (Username,Password)
 Authorisation identical to SQL Server (Roles)
 Admin Roles have special privileges
- Create / Drop Database
- Manage Logins
- Change Firewall Rules
12.06.2014
Advanced Topics
40
2013 © Trivadis
SQL Database Limitations
 Security
 SSPI authentication is not supported
 No database encryption
 Certain users are disallowed (sa, admin, administrator, guest, root)
 It isn’t possible to define another listening port rather 1433
 Backups
 Backup and restore operations are not available
- Use Import/Export
- Database clones are possible using create database statement
 Objects
 CLR. The .NET CLR isn’t available in SQL Azure
 Tables need Clustered Index
12.06.2014
Advanced Topics
41
2013 © Trivadis
SQL Database Limitations
 Miscellaneous
 No distributed transactions
 Database size limited to chosen subscription (max 500GB)
 No Service Broker
 No SQL Agent
 No Database file placement
 Reduced subset of system schema objects
12.06.2014
Advanced Topics
42
2013 © Trivadis
Data Migration
 Existing SQL Server databases cannot be restored or attached to SQL
Database
 Data migration is a manual task using tools
 Generate SQL Scripts
 SQL Server Integration Service SSIS
 BCP utility
 BACPAC Export to Blob
12.06.2014
Advanced Topics
43
2013 © Trivadis
Database Backup
 Database Copy
 Allows you to create a single copy of a source database using the
AS COPY OF argument to the CREATE DATABASE statement:
 Copy process is background task. Query DMV sys.dm_database_copies
 SQL Data Sync
 Synchronize on-premise / cloud
 Manual
 To Blob Storage
 Import / Export (bacpac)
 Bacpac (schema and data)
 Dacpac (schema only)
12.06.2014
Advanced Topics
44
2013 © Trivadis
BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN
Thank You Q & A
12.06.2014
Advanced Topics
45

Contenu connexe

Tendances

Migrate to WVD and Beyond
Migrate to WVD and BeyondMigrate to WVD and Beyond
Migrate to WVD and BeyondMarius Sandbu
 
Multi-tenancy In the Cloud
Multi-tenancy In the CloudMulti-tenancy In the Cloud
Multi-tenancy In the Cloudsdevillers
 
Cloud computing 2
Cloud computing 2Cloud computing 2
Cloud computing 2Anh Nguyen
 
G07.2014 magic quadrant for enterprise file synchronization and sharing
G07.2014   magic quadrant for enterprise file synchronization and sharingG07.2014   magic quadrant for enterprise file synchronization and sharing
G07.2014 magic quadrant for enterprise file synchronization and sharingSatya Harish
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021Marius Sandbu
 
Cloud Ubuntu Open Stack Private Cloud
Cloud  Ubuntu Open Stack Private CloudCloud  Ubuntu Open Stack Private Cloud
Cloud Ubuntu Open Stack Private CloudThe World Bank
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureK.Mohamed Faizal
 
Citrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix
 
Multi-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud ComputingMulti-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud ComputingSrinath Perera
 
Citrix with Microsoft EMS
Citrix with Microsoft EMSCitrix with Microsoft EMS
Citrix with Microsoft EMSMarius Sandbu
 
Understanding IaaS Requirements & Design Cloud
Understanding IaaS Requirements & Design CloudUnderstanding IaaS Requirements & Design Cloud
Understanding IaaS Requirements & Design CloudJohn Treadway
 
Cloud Computing Use Cases Whitepaper 3 0
Cloud Computing Use Cases Whitepaper 3 0Cloud Computing Use Cases Whitepaper 3 0
Cloud Computing Use Cases Whitepaper 3 0Jason Reed
 
Seven standards of cloud computing
Seven standards of cloud computingSeven standards of cloud computing
Seven standards of cloud computingHossam Zein
 
Azure Networking - The First Technical Challenge
Azure Networking  - The First Technical ChallengeAzure Networking  - The First Technical Challenge
Azure Networking - The First Technical ChallengeAidan Finn
 
Cloud Deploying a Public Cloud on Ubuntu Open Stack
Cloud Deploying a Public Cloud on Ubuntu Open StackCloud Deploying a Public Cloud on Ubuntu Open Stack
Cloud Deploying a Public Cloud on Ubuntu Open StackThe World Bank
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingMarius Sandbu
 

Tendances (20)

Azure security
Azure  securityAzure  security
Azure security
 
Migrate to WVD and Beyond
Migrate to WVD and BeyondMigrate to WVD and Beyond
Migrate to WVD and Beyond
 
04 Azure IAAS 101
04 Azure IAAS 10104 Azure IAAS 101
04 Azure IAAS 101
 
Multi-tenancy In the Cloud
Multi-tenancy In the CloudMulti-tenancy In the Cloud
Multi-tenancy In the Cloud
 
Cloud computing 2
Cloud computing 2Cloud computing 2
Cloud computing 2
 
G07.2014 magic quadrant for enterprise file synchronization and sharing
G07.2014   magic quadrant for enterprise file synchronization and sharingG07.2014   magic quadrant for enterprise file synchronization and sharing
G07.2014 magic quadrant for enterprise file synchronization and sharing
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021
 
Cloud Ubuntu Open Stack Private Cloud
Cloud  Ubuntu Open Stack Private CloudCloud  Ubuntu Open Stack Private Cloud
Cloud Ubuntu Open Stack Private Cloud
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft Azure
 
Citrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix Netscaler Deployment Guide
Citrix Netscaler Deployment Guide
 
Infra project report1
Infra project report1Infra project report1
Infra project report1
 
Multi-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud ComputingMulti-Tenant SOA Middleware for Cloud Computing
Multi-Tenant SOA Middleware for Cloud Computing
 
Citrix with Microsoft EMS
Citrix with Microsoft EMSCitrix with Microsoft EMS
Citrix with Microsoft EMS
 
Understanding IaaS Requirements & Design Cloud
Understanding IaaS Requirements & Design CloudUnderstanding IaaS Requirements & Design Cloud
Understanding IaaS Requirements & Design Cloud
 
Cloud Computing Use Cases Whitepaper 3 0
Cloud Computing Use Cases Whitepaper 3 0Cloud Computing Use Cases Whitepaper 3 0
Cloud Computing Use Cases Whitepaper 3 0
 
Seven standards of cloud computing
Seven standards of cloud computingSeven standards of cloud computing
Seven standards of cloud computing
 
Azure Networking - The First Technical Challenge
Azure Networking  - The First Technical ChallengeAzure Networking  - The First Technical Challenge
Azure Networking - The First Technical Challenge
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud Deploying a Public Cloud on Ubuntu Open Stack
Cloud Deploying a Public Cloud on Ubuntu Open StackCloud Deploying a Public Cloud on Ubuntu Open Stack
Cloud Deploying a Public Cloud on Ubuntu Open Stack
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User Computing
 

Similaire à Session 4: Fortgeschrittene Themen

Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930
Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930
Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930A10 Networks
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesIEEEFINALYEARPROJECTS
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...IEEEGLOBALSOFTTECHNOLOGIES
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft CloudEuropean Collaboration Summit
 
Azure Services Platform Oc Event Ned
Azure Services Platform Oc Event NedAzure Services Platform Oc Event Ned
Azure Services Platform Oc Event NedWes Yanaga
 
Becoming a Microsoft Specialist in Microsoft Azure Infrastructure
Becoming a Microsoft Specialist in Microsoft Azure InfrastructureBecoming a Microsoft Specialist in Microsoft Azure Infrastructure
Becoming a Microsoft Specialist in Microsoft Azure InfrastructureSyed Irtaza Ali
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEcscpconf
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanNCCOMMS
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfBenAissaTaher1
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13Cohesive Networks
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and IntegrationsCloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrationspaulfallon
 
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2SkillFactory
 

Similaire à Session 4: Fortgeschrittene Themen (20)

Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930
Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930
Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issues
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Yongsan presentation 2
Yongsan presentation 2Yongsan presentation 2
Yongsan presentation 2
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
Azure Services Platform Oc Event Ned
Azure Services Platform Oc Event NedAzure Services Platform Oc Event Ned
Azure Services Platform Oc Event Ned
 
Azure F5 Solutions
Azure F5 SolutionsAzure F5 Solutions
Azure F5 Solutions
 
Becoming a Microsoft Specialist in Microsoft Azure Infrastructure
Becoming a Microsoft Specialist in Microsoft Azure InfrastructureBecoming a Microsoft Specialist in Microsoft Azure Infrastructure
Becoming a Microsoft Specialist in Microsoft Azure Infrastructure
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
 
Project
ProjectProject
Project
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdf
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Paper1
Paper1Paper1
Paper1
 
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and IntegrationsCloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
 
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
 

Plus de Digicomp Academy AG

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Digicomp Academy AG
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Digicomp Academy AG
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Digicomp Academy AG
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutDigicomp Academy AG
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutDigicomp Academy AG
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xDigicomp Academy AG
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Digicomp Academy AG
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinDigicomp Academy AG
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Digicomp Academy AG
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattDigicomp Academy AG
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogDigicomp Academy AG
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnDigicomp Academy AG
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingDigicomp Academy AG
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessDigicomp Academy AG
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Digicomp Academy AG
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceDigicomp Academy AG
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudDigicomp Academy AG
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slidesDigicomp Academy AG
 

Plus de Digicomp Academy AG (20)

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handout
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit x
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe Klein
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING Expertendialog
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital Business
 
Minenfeld IPv6
Minenfeld IPv6Minenfeld IPv6
Minenfeld IPv6
 
Was ist design thinking
Was ist design thinkingWas ist design thinking
Was ist design thinking
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slides
 

Dernier

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 

Dernier (20)

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

Session 4: Fortgeschrittene Themen

  • 1. 2013 © Trivadis BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN Microsoft Azure Advanced Topics Stefan Geiger Gerry Keune @trivadis.com 12.06.2014 Advanced Topics 1
  • 2. 2013 © Trivadis AGENDA 1. Service Bus 2. Identity 3. SQL Database 12.06.2014 Advanced Topics 2
  • 3. 2013 © Trivadis Azure Service Bus Overview  PaaS Messaging Middleware  All Microsoft Azure Datacenters  Multiple Clusters (Scale-Units) per Datacenter  Provides secure messaging and connectivity across different network topologies  Uses ACS to allow sending messages to and listening on endpoints  Key Features  Pub/Sub Reliable Messaging (Brokered Messaging)  Relay  Notifications 05.06.2014 Advanced Topics 3 *customer preview
  • 4. 2013 © Trivadis Service Bus Relay Service  Enables hybrid applications that span on-premises and the cloud  Implements open format and protocols  Supports REST and WS-*  Exposes Service Endpoints into the Cloud  Accessible for Cloud & On-Premise Services  Relay Service allows communication between the client and services behind firewalls and NAT routers  Communication Patterns  One-way communication,  Publish/Subscribe  Peer-to-Peer  Multicast  Direct Connections 05.06.2014 Advanced Topics 5
  • 6. 2013 © Trivadis Challenges  Addressability and discoverability  Private addresses and Network Address Translation (NAT)  Dynamic addresses (e.g. ISP)  Connectivity  Firewalls (denial of inbound connections)  Event distribution  Transient connectivity 05.06.2014 Advanced Topics 7
  • 7. 2013 © Trivadis Service Bus Relaying Messages 05.06.2014 Advanced Topics 9
  • 8. 2013 © Trivadis Security  Messages travelling between communication parties can be secured  [Microsoft.ServiceBus.EndToEndSecurityMode]  Message security is independent of relay security  Message Security Types  None - Disables Security  Transport (Default) - Message is sent through a secure channel (e.g HTTPS) to and from the relay service. (Not Secure within AppFabric SB)  Message - Encrypt body of the message (X509)  TransportWithMessageCredentials - Combination of Transport/Message types 05.06.2014 Advanced Topics 10
  • 9. 2013 © Trivadis 05.06.2014 Advanced Topics 11 Demo Service Bus Relay
  • 10. 2013 © Trivadis Service Bus Brokered Messaging  Sophisticated Pub / Sub mechanism  Disconnected communication between producers and consumers  Scales independently of each other since the intermediate message broker buffers any difference  Supports two distinct forms of brokered messages  Queues  Topics & Subscriptions  Features (some not all)  Deadlettering, Sessions, Transaction  Scheduled Messages  Duplicate Detection, Prefetch 05.06.2014 Advanced Topics 12
  • 11. 2013 © Trivadis Message Dimension  Max Message: 256 Kbyte  Max Total Props: 64 Kbyte  Includes sys props, reserve ~4 KByte  Max Prop: No explicit limit  Constrained by de-facto HTTP limits if you use HTTP; ~4KB for a header max  Max Body: 256KByte – sizeof(Props) 05.06.2014 Advanced Topics 13
  • 12. 2013 © Trivadis Delivery Options  Receive and Delete  Fastest. Message lost if receiver crashes or transmission fails  Peek Lock  Message is locked when retrieved. Reappears on broker when not deleted within lock timeout.  Session + Peek Lock  Message is locked along with all subsequent messages w/ same session-id ensuring order 05.06.2014 Advanced Topics 14 Receive and Delete 2. Delete/Unlock 1. Peek/Lock
  • 13. 2013 © Trivadis Service Bus Queues  Ordered Message Log  Ordered by arrival (broker assigns strongly monotonic sequence number to each msg)  Timestamped on arrival (authoritative clock)  Stored in SQL; once accepted, the message is as safe as any data in the SQL deployment  Multiplexing with sessions  Two modes: Pull and Forward  Pull – delivers messages on request, allowing concurrent readers  Forward – delivers message to single forward destination 05.06.2014 Advanced Topics 15
  • 14. 2013 © Trivadis Service Bus Topics  All features of Queues, plus Multiple, Independent Subscriptions  Named, durably created (optional) - Quota: Up to 2000 concurrent subscriptions  Rules with filter conditions on msg headers - Quota: Up to 2000 rules per subscription - Optional action set/modify message props - Each rule hit yields a message  Topic 'tail' and subscription 'head' are fully protocol compatible with Queues 05.06.2014 Advanced Topics 17
  • 15. 2013 © Trivadis Programming Options 05.06.2014 Advanced Topics 19 Apps NetMessagingBinding .NET Service Bus Messaging API .NET WCF Service Model SB Messaging Protocol (net.tcp, proprietary) AMQP 1.0 C/C++ (incl Embedded) Apache Proton-C HTTP(S) PHP client Node.js client Python client Java/JMS Apache Qpid JMS AMQP 1.0 Any HTTP client
  • 16. 2013 © Trivadis AGENDA 1. Service Bus 2. Identity 3. SQL Database 12.06.2014 Advanced Topics 22
  • 17. 2013 © Trivadis Security  Authentication and Authorization  Use Claims-based Identity  Authentication and access management based on open protocols  Reduces infrastructure dependencies - can be hosted on-premises or in the cloud without changes  Factoring authentication out of applications  Identity technologies and services used with Azure  Windows Identity Foundation (WIF)  Active Directory Federation Services 2.0  Azure Access Control Service 05.06.2014 Advanced Topics 23
  • 18. 2013 © Trivadis Claims-based solution  Stop building custom identification and user account databases into every new application  One approach to identity that works in various scenarios  Factoring out authentication of applications  Easy upgrade to stronger authentication methods  Identity Federation  WIF (Windows Identity Foundation) Framework simplifies implementing claims-based identity in your applications 05.06.2014 Advanced Topics 24
  • 19. 2013 © Trivadis Claims-based Identity Model  User’s identity to your application as a set of claims  Claims are attributes made by an issuer (e.g. email adress, username)  Identity data you receive comes from a trusted source  If you trust the issuer you will trust the claim  claim is a statement about a user made from a authority  Releases Application from  Authenticating users, storing user accounts and passwords  Calling to enterprise directories to look up user identity details.  Integrating with identity systems from other platforms or companies. 05.06.2014 Advanced Topics 25 User Name: Email: Roles: IsNETNerd: Stefan stefan.geiger@trivadis.com Consultant, Trainer true
  • 20. 2013 © Trivadis Security Token  The user delivers a set of claims to your application piggybacked along with her request  Token is a Serialized set of claims digitally signed by the issuing authority  Signature assures authenticity of claims  Web-Service carries the claim in the security header of the SOAP envelope.  Browser-based Web application sends claims via an HTTP POST from the user’s browser  Can be cached in a cookie if a session is desired 05.06.2014 Advanced Topics 26
  • 21. 2013 © Trivadis Security Token Service (STS)  STS builds, signs, and issues security tokens  Claims, tokens, and STSs are the foundation of claims-based identity 05.06.2014 Advanced Topics 27 Claim List of Trusted STS Token Token 1 Authenticate user, return token 2 Submit token 3 Verfify token’s signature and STS is trusted 4 Use claims in token
  • 22. 2013 © Trivadis 05.06.2014 Advanced Topics 28 Demo Claims-based Authentication
  • 23. 2013 © Trivadis Identity Federation  Authenticate users across different security domains  SAML (Security Assertion Markup Language )  XML-based standard for exchanging authentication and authorization data between security realms 05.06.2014 Advanced Topics 29 1 2 3 Organisation 1 Organisation 2
  • 24. 2013 © Trivadis Access Control Service  Allows you to integrate single sign on (SSO) and centralized authorization into your web applications 05.06.2014 Advanced Topics 30
  • 25. 2013 © Trivadis Access Control Service  Out-of-the-box support for popular web identity providers including: Windows Live ID, Google, Yahoo, and Facebook  Support for OAuth 2.0 (draft 13), WS-Trust, and WS-Federation protocols  Support for the SAML 1.1, SAML 2.0, and Simple Web Token (SWT) token formats 05.06.2014 Advanced Topics 31
  • 26. 2013 © Trivadis Security Best Practices  Authentication and Authorization  Use Claims-based Identity  Authentication and access management based on open protocols  Reduces infrastructure dependencies - can be hosted on-premises or in the cloud without changes  Factoring authentication out of applications  Identity technologies and services used with Azure  Windows Identity Foundation (WIF)  Active Directory Federation Services 2.0  Azure Access Control Service 05.06.2014 Advanced Topics 32
  • 27. 2013 © Trivadis AGENDA 1. Service Bus 2. Identity 3. SQL Database 12.06.2014 Advanced Topics 33
  • 28. 2013 © Trivadis SQL Database Overview  Relational database engine provided as Service based on SQL Server technology  Many SQL features are supported  Use with On-Premise and Cloud Application  Data access through ADO.NET or other providers  Data manipulation using standard T-SQL statements.  Databases in Azure are limited to either 1/500GB depending on the edition selected  Consider size limitation for migration scenarios  Automatically provides High Availability “out of box”  Transparent failover in case of failure  Load balancing of data to ensure SLA 12.06.2014 Advanced Topics 34
  • 29. 2013 © Trivadis SQL Database Network Topology 12.06.2014 Advanced Topics 35 Application Internet LBTDS (tcp) TDS (tcp) TDS (tcp) Apps use standard SQL client libraries: ODBC, ADO.Net, PHP, … Load balancer forwards ‘sticky’ sessions to TDS protocol tier Gateway Gateway Gateway Gateway Gateway Gateway Availability: Fabric, Failover, Replication, and Load balancing SQL SQL SQL SQL SQLSQL Gateway: TDS protocol gateway, enforces AUTHN/AUTHZ policy; proxy to backend SQL
  • 30. 2013 © Trivadis Database Replicas 12.06.2014 Advanced Topics 36 Replica 1 Replica 2 Replica 3 DB Replica 4
  • 31. 2013 © Trivadis Provisioning 12.06.2014 Advanced Topics 37  Each account has zero or more logical servers  Provisioned via a common portal  Establishes a billing instrument  Each logical server has one or more databases  Contains metadata about database & usage  Unit of authentication, geo-location, billing, reporting  Generated DNS-based name  Each database has standard SQL objects  Users, Tables, Views, Indices, etc  Unit of consistency Account Server Database
  • 32. 2013 © Trivadis 05.06.2014 Advanced Topics 38 Demo SQL Database
  • 33. 2013 © Trivadis SQL Database Management  Microsoft Azure Management Portal  Create and Delete Servers and Databases  Create Credentials  Configure Firewall settings  Maintain databases  Using Master Database  System Procedures for maintaining database  Show data usage -> billing information  Create / Delete Databases 12.06.2014 Advanced Topics 39
  • 34. 2013 © Trivadis Security  Network Access Control  Server is firewall protected (default no access)  Configure using special SP sys.firewall_rule…..  Authentication and Authorisation  SQL Authentication (Username,Password)  Authorisation identical to SQL Server (Roles)  Admin Roles have special privileges - Create / Drop Database - Manage Logins - Change Firewall Rules 12.06.2014 Advanced Topics 40
  • 35. 2013 © Trivadis SQL Database Limitations  Security  SSPI authentication is not supported  No database encryption  Certain users are disallowed (sa, admin, administrator, guest, root)  It isn’t possible to define another listening port rather 1433  Backups  Backup and restore operations are not available - Use Import/Export - Database clones are possible using create database statement  Objects  CLR. The .NET CLR isn’t available in SQL Azure  Tables need Clustered Index 12.06.2014 Advanced Topics 41
  • 36. 2013 © Trivadis SQL Database Limitations  Miscellaneous  No distributed transactions  Database size limited to chosen subscription (max 500GB)  No Service Broker  No SQL Agent  No Database file placement  Reduced subset of system schema objects 12.06.2014 Advanced Topics 42
  • 37. 2013 © Trivadis Data Migration  Existing SQL Server databases cannot be restored or attached to SQL Database  Data migration is a manual task using tools  Generate SQL Scripts  SQL Server Integration Service SSIS  BCP utility  BACPAC Export to Blob 12.06.2014 Advanced Topics 43
  • 38. 2013 © Trivadis Database Backup  Database Copy  Allows you to create a single copy of a source database using the AS COPY OF argument to the CREATE DATABASE statement:  Copy process is background task. Query DMV sys.dm_database_copies  SQL Data Sync  Synchronize on-premise / cloud  Manual  To Blob Storage  Import / Export (bacpac)  Bacpac (schema and data)  Dacpac (schema only) 12.06.2014 Advanced Topics 44
  • 39. 2013 © Trivadis BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN Thank You Q & A 12.06.2014 Advanced Topics 45