programming4us
           
 
 
Windows

Windows Azure : Managing Access Control Service Resources (part 1)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/2/2010 8:12:10 PM
Access Control resources are defined in your service namespace and are used to define the federation schemes, rules, token issuers, and policies that help realize claims-based identity federation and mapping in the cloud. This section covers ACS resource concepts and the tools required to interact with these resources.

Acm.exe is a command-line tool shipped with the AppFabric SDK. You can perform CREATE (C), READ (R), UPDATE (U), and DELETE (D) operations on your namespace's ACS resources (scopes, issuers, token policy, and rules). Acm.exe uses the management API to interact with the ACS. The source code for ACM.exe is included in the SDK. You can use the source code as a starting point to build your own web or executable application to interact with ACS. You can find the Acm.exe usage options in the AppFabric ACS documentation at http://msdn.microsoft.com/en-us/library/ee706706.aspx. Some developers at Microsoft have also released a sample Windows client application called ACS Management Browser, which is available at http://code.msdn.microsoft.com/acmbrowser.

ACS resources have a hierarchical structure, with your account at the top of the hierarchy. The ACS hierarchy is illustrated in Figure 1.

Figure 1. ACS hierarchy

The ACS hierarchy consists of three main levels: AppFabric account, service namespace, and resources.

1. Service Namespace

A service namespace is a collection of ACS resources like rules sets, issuers, scope, and token policy. From a resources perspective, the service namespace is the root of the resource tree. An account can contain many service namespaces. All the resources under the service namespace can belong to only one single service namespace—you can't share resources across multiple service namespaces. You can create a service namespace from the management portal by clicking the Add Service Namespace link, as shown earlier.

2. Token Policy

A token policy defines the token expiration and signature key of ACS-issued tokens. This policy can be associated with more than one scope. Typical parameters for a token policy are as follows:

  • DefaultTokenLifetimeInSeconds: The number of seconds for which the token remains valid

  • SigningKey: The signing key that ACS uses to sign tokens

You can create a token policy using the Acm.exe tool, as follows:

acm.exe create tokenpolicy -name:<Token Policy Name> -autogeneratekey -
host:accesscontrol.windows.net -service:<Service Namespace>
-mgmtkey:<Management Key>

<Token Policy Name> is an alphanumeric name for the token policy. You can get the service namespace and the management key from the Management Portal. When you execute the command, ACS returns a token policy ID that you can use as a parameter in other operations such as deleting a token policy or creating a scope.

You can also use the Access Control Management browser to create token policies. Figure 2 shows the user interface to create token policies.

Figure 2. Creating a token policy

3. Scope

A scope is a collection of rules used by ACS to map input claims to output claims. ACS uses the scope URI to group rules. When you submit a request to the scope URI, ACS checks for the applies_to parameter and generates output claims if both the URIs matches. One service namespace can contain many scopes. The typical parameters required to interact with the scope resource are as follows:

  • AppliesTo: The URI of the resource to which this scope applies

  • RuleSets/Id: The ID of the rule set for the scope

  • TokenPolicyId: The ID of the token policy associated with the scope

To create a scope with the Acm.exe tool, use the following command:

acm.exe create scope -name:<Scope Name> -appliesto:<Applies To>
-tokenpolicyid:<Token Policy
Id> -host:<Host> -service:<Service Namespace> -mgmtkey:<Management Key>

Host is the host name of the management service (most likely accesscontrol.windows.net), -mgmtkey is the management key from the Management Portal, and -tokenpolicyid is the token policy ID returned when you created a token policy.

When you create a scope, ACS returns a scope ID that you should record for further operations like deleting a scope and creating rules. You can also use the Access Control Management browser to create scopes. Figure 3 shows the user interface to create scopes.

Figure 3. Creating a scope

Other -----------------
- Windows Azure : Access Control Service Management Portal
- Windows 7 : Reset a Broken Service
- Windows 7 : Make Windows Shut Down Services Faster
- Windows 7 : Disable Services for Faster Performance
- Windows 7 : Controlling Services with a Script
- Windows 7 : Controlling Services at the Command Prompt
- Windows 7 : Controlling Services with the Services Snap-In
- Windows Azure : Access Control Service Usage Scenarios (part 3)
- Windows Azure : Access Control Service Usage Scenarios (part 2)
- Windows Azure : Access Control Service Usage Scenarios (part 1)
- Windows Azure : Access Control Service - Claims-Based Identity Model
- Windows Azure : Access Control Service - Concepts and Terminology
- Windows 7 : Configuring the MMC - Creating a Custom Taskpad View
- Windows 7 : Configuring the MMC - Controlling Snap-Ins with Group Policies
- Windows 7 : Configuring the MMC - Adding a Snap-In
- Configuring the Microsoft Management Console : Reviewing the Windows 7 Snap-Ins
- Windows 7 : Enabling the Shutdown Event Tracker
- Windows 7 : Increasing the Size of the Recent Documents List
- Windows 7 : Customizing the Places Bar
- Windows 7 : Customizing the Windows Security Window
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us