PPT-Securing Rich Client Applications Using OAuth 2.0 and Windo

Author : lindy-dunigan | Published Date : 2017-09-13

Caleb Baker Senior Program Manager WADB307 Agenda Why use AD or AAD to secure mobile apps What are the challenges and opportunities Writing a Windows Store app that

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Securing Rich Client Applications Using ..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Securing Rich Client Applications Using OAuth 2.0 and Windo: Transcript


Caleb Baker Senior Program Manager WADB307 Agenda Why use AD or AAD to secure mobile apps What are the challenges and opportunities Writing a Windows Store app that uses AD and AAD Touchs on the writing a backing Web API. a. n . i. ntroduction to the . application . a. rchitecture . g. uide. j. ohn devadoss. p. roduct unit manager, patterns & practices. johnd@microsoft.com. DPR 301. What is Architecture?. Pop Quiz. through replicated execution. Ben Livshits . Microsoft Research. K. Vikram. Cornell University. Abhishek Prateek. IIT Delhi. Web 2.0 is Upon Us. 2. JavaScript. + DHTML. Client-side. computation. Server-side. Zhenhua. . (Gerald) . Guo. and Marlon Pierce. Indiana University. OAuth and Gateways. OAuth is a security protocol for Web applications.. Security for REST and XML-RPC services.. Three-legged OAuth. to Science Gateways for TeraGrid . Users. Jim Basney and Jeff Gaynor. {. jbasney,gaynor. }@. illinois.edu. . Goals. Support use of . individual TeraGrid accounts. via gateways. Independent of support for gateway . Scot Hillier. Scot Hillier. Scot Hillier. scot@scothillier.net. @. ScotHillier. www.itunity.com/users/scot-hillier. www.criticalpathtraining.com. www.microsoftvirtualacademy.com/Studies/SearchResult.aspx?q=hillier. Zhenhua. . (Gerald) . Guo. and Marlon Pierce. Indiana University. OAuth and Gateways. OAuth is a security protocol for Web applications.. Security for REST and XML-RPC services.. Three-legged OAuth. Alternative . securing devices for . 4-part . shackles. . . Member and client fully support use . of . split . pin for . shackles . on . permanent / dedicated . fixture points, . rigging . assemblies, items at height, . OAuth Symmetric Proof of . Possession . for Code . Extension. Nat Sakimura. Nomura Research Institute, Ltd. . draft-sakimura-oauth-tcse-03. 2014/7/24. Problem Statement. Code interception attack (against public clients). dem@ecs.soton.ac.uk. The web 2.0 development survival guide. Part I: Everything’s Eventual. Dealing with Scale. When RDMS Fail – Na. ï. ve. Setup. Understanding . the ". NoSQL. movement" | Enterprise | Real World Computing | PC Pro . Hannes Tschofenig. Status. Finished various specifications, including . OAuth. Core: RFC 6749. Bearer Tokens: RFC 6750. Security Threats: RFC 6819. Discussion about an enhancement to Bearer Token security (now called “Proof-of-Possession”) since the early days of the working group. . Good Progress with Our Documents. Specifications. We are making progress in the working group. . Where do we go next?. Luckily we have various proposals sitting around.. http://tools.ietf.org/html/draft-recordon-oauth-v2-ux-. Opening Web Intelligence Rich Client Open SAP Business Objects Web IntelligenceOpen the Windows Start menu b.All ProgramsSAP Business Intelligence d.SAP Business Objects Web Intelligence The Web Intel OAuth 20WeinaMaAgendaOAuth overviewSimple exampleOAuth protocol workflowServer-side web application flowClient-side web application flowWhats the problemAs the web grows more and more sites rely on di The Desired Brand Effect Stand Out in a Saturated Market with a Timeless Brand

Download Document

Here is the link to download the presentation.
"Securing Rich Client Applications Using OAuth 2.0 and Windo"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents