Showing posts with label Azure. Show all posts
Showing posts with label Azure. Show all posts

Join me at Azure Virtual Conference, happening live on 8th August 2020

Data Transformation using Azure Data Factory


Data Factory is a Cloud based data integration service used to compose data storage, data movement and processing services into automated data pipelines

I will be speaking about "Data Transformation using Azure Data Factory".


Date and Time Saturday, 8th August, 2020 ,  ⏱️09:40PM IST


Online webinar recording | Simplify user application authentication using Microsoft Identity Platform


Microsoft identity platform is an evolution of the Azure Active Directory developer platform. It allows developers to build applications that sign in all Microsoft identities. It support to below kind of activity:

Work and school accounts
Personal accounts (such as Outlook.com or Hotmail.com)
Social identity (such as LinkedIn, Facebook, Google) via MSAL and Azure AD B2C

Azure AD v1.0 platform used to authenticate work and school accounts by requesting tokens from the Azure AD v1.0 endpoint.

Microsoft identity platform (v2.0) authenticate any Microsoft identity into your application. It is fully supported open-source Microsoft Authentication Library (MSAL) is recommended for use against the identity platform endpoints. MSAL support single sign-on (SSO) experiences for your users.

Let's explore the difference between Microsoft Authentication Library (v2.0) and Azure Active Directory Authentication Library (V1.0).


S.NO MSAL JS or MSAL .NET ADAL JS or ADAL .NET
1 Known as Microsoft Authentication Library using endpoint V2.0 Known as Azure AD Authentication Library using endpoint V1.0
2 MSAL used to authenticate a broader set of Microsoft Identities
Azure AD identities
Microsoft account, social and local account through Azure B2C)
Azure AD V1.0 used  to authenticate
Azure identities (work and school)
3 Method to renew tokens silently without prompting users is named acquireTokenSilent (more descriptive) Method to renew tokens silently without prompting users is named acquireToken
4 MSAL.js API is designed around user agent client application such as Web Browser ADAL.js uses AuthenticationContext as the representation of an instance of your application's connection 
5 Method to acquire token requests can take different authority values than what is set in the UserAgentApplication  Methods to acquire tokens are associated with a single authority set in the AuthenticationContext
6 Authority Value: V2.0 use https://login.microsoftonline.com/common authority, will allow users to sign in with any Azure AD organization account or a Microsoft personal account (MSA).
To restrict the sign in to only Azure AD accounts use https://login.microsoftonline.com/organizations
Authority Value :  v1.0, use https://login.microsoftonline.com/common authority will allow users to sign in with any Azure AD account (for any organization)


Global Azure Boot Camp 2018









I will be taking on Global Azure Boot Camp at Bangalore  this year 2018




The details about the event as well as the agenda can be found in this link : http://bengaluru.azurebootcamp.net/


IIS Binding and Registry Entry in IAAS Server


Configure DNS setting  Configure Internet facing SSL SharePoint Site using IAAS


IIS Binding and Registry Entry in IAAS Server

Step1:- Open IIS right click on the web application and “Edit Binding”











































Step 2:- On the “Site Binding” screen, click on Edit

























Step 3:- Select the certificate created in previous step and save the changes:


























Step 4:- Registry Entry in the Server

Create & Set DisableLoopBackCheck property =1





Configure the SharePoint 2013 Site with Host Header & SSL Cert

Configure the SharePoint 2013 Site with Host Header & SSL Cert

Step 1:-

How to create the Cert
http://manojmittalblogs.blogspot.in/2016/10/configure-internet-facing-ssl_9.html

Step 2:-

How to create Cert mapping url in azure portal
http://manojmittalblogs.blogspot.in/2016/10/configure-internet-facing-ssl.html

Step 3:-
Create the SharePoint Web Application using Central Administration or Powershell.
Remember you should use the application url which should have domain. like I create in

Example   https://devsp01.cloudapp.azure.com.

Hostheader name would be  devsp01.cloudapp.azure.com and port number  

Powershell Script:-

Claim based Web Application with Host Header:-

$ap = New-SPAuthenticationProvider
New-SPWebApplication -name "Development Application"-HostHeader " devsp01.cloudapp.azure.com " –Url “https://devsp01.cloudapp.azure.com” –Port 443 -ApplicationPool "Dev-ApplicationPool" -DatabaseName "WSS_Content_ Dev" -DatabaseServer "Domain\UserName" -ApplicationPoolAccount (Get-SPManagedAccount " Domain\UserName ") -AuthenticationProvider $ap

Configure SSL Certificate in IAAS server

Configure SSL Certificate  in IAAS Server

As I am doing the set up for development environment, So I am going to use self signed  Cert.

Step 1:-   Open PowerShell Window as admin run below command:

Syntax:
$cert = New-SelfSignedCertificate -DnsName <<yourdomain.com>> -CertStoreLocation "cert:\LocalMachine\My"

Example
$cert = New-SelfSignedCertificate -DnsName devsp01.cloudapp.azure.com -CertStoreLocation "cert:\LocalMachine\My



Step 2:-  Run below command to export the certificate:

 Syntax:
     Export-Certificate -Type CERT -Cert $cert -FilePath <<filePath>>.cer


Example
Export-Certificate -Type CERT -Cert $cert -FilePath  .\ devsp01.cloudapp.azure.com.cer

here certificate created at above mentioned file path location.

Step 3: Add certificate to Trusted Root Certification Authorities

Browse the Run window and type MMC
















Step 4: . Add/Remove snap in:































Step 5: -Select Certificated à Add à Computer account à Local Computer


























Step 6:- Select Local Computer




































Step 6:- Expand Certificates a Trusted Root Certificate Authorities a Certificates a All Tasks a Import









































Step 7:- Browse the created certificate































You are done here.

Happy Codding

Configure Internet facing SSL SharePoint Site using IAAS

Configure Internet facing SSL SharePoint Site using IAAS 

Step 1: Browse the Azure Portal and Select Virtual Machine from Left Hand Side and click the virtual machine , which server site user want to browse
















Step 2:- Click on the public IP address 













Step 3:- Click Configuration & enter the DNS label, domain will be set like  devsp01.cloudapp.azure.com, Click on save. 

Here you are ready with internet facing URL using IAAS platform.




























Step4:- Allow the port ->  Do the configuration in Network Security Group.

Go to the more services and type network in search box



























Step 5:- Select the Server and click inbound security rules























Step 6:- Set Inbound Rule with selected parameter

1. Priority
2. Services
3. Protocol
4. Action and click Save 


















Azure portal level configuration done and you are ready with URL i.e.  https://devsp01.cloudapp.azure.com

Next step - Continue with below sequence of articles

1. Create the SSL certification and Mapping 
http://manojmittalblogs.blogspot.in/2016/10/configure-internet-facing-ssl_9.html

2. SharePoint Site Host
http://manojmittalblogs.blogspot.in/2016/10/configure-internet-facing-ssl_83.html

3. IIS Binding & Registry entry
http://manojmittalblogs.blogspot.in/2016/10/configure-internet-facing-ssl_3.html


Happy coding..