#Tarabica16 najava predavanja: Srđan Marković - "Azure AD Identity & Access Management in SPA"

#Tarabica16 najava predavanja: Srđan Marković - "Azure AD Identity & Access Management in SPA"

Over ten years of experience as software developer, technical lead and software architect gives me an opportunity to announce my readiness for software solutions development on:
 
Platforms:

Microsoft Windows / Windows Server,
Microsoft Windows Azure
 

Application architecture types:

Rich Client Application Archetype,
Rich Internet Application (RIA) Archetype,
Service Archetype,
Web Application Archetype
 

Architecture Styles:

Service-Oriented Architecture (SOA),
Message-Bus,
Component-Based Architecture,
Object-Oriented,
Layered Architecture, N-tier / 3-tier,
Client-Server
 

Technologies:

C++ OOP, MFC, ATL COM
P/Invoke, COM Interop
ASP.NET WebForms .NET 1.1, 2.0, 3.0, 3.5, Web Pages
HTML, HTML5
ADO.NET, LINQ, EntityFramework
Relational Databases: MS SQL Server, SQL-CE, SQLite
NoSQL (MongoDB)
XML, XSLT, XPath
XML Web Services,  WCF, WCF Data Services (OData Protocol)
MVC 2, 3, 4, 5 (Web API, Web API 2)
JavaScript (jQuery, PURE, Knockout, Bootstrap, AngularJS)
Dependency Injection – IoC  (MS Unity, StructureMap, Autofac)
NUnit, MS UnitTest Framework
Software revision control (Visual SourceSafe, SVN, TFS)


Azure AD Identity & Access Management in SPA

Azure Active Directory (Azure AD) is Microsoft’s cloud based directory, offering comprehensive identity and access management solution that provides a robust set of capabilities to manage users and groups for cloud based applications.

This session describes authentication & authorization for a single page application (SPA) that uses Azure AD to secure its Web API back end. Single page applications are typically structured as a JavaScript presentation layer (front-end) that runs in the browser and a Web API back-end that runs on a server and implements the application’s business logic. In this scenario, when the user signs in, the JavaScript front end uses Active Directory Authentication Library for JavaScript (ADAL.JS) and the OAuth 2.0 Implicit Grant flow to obtain an access token (access_token) from Azure AD. The token is cached and the client attaches it to the request as the bearer token when making calls to its Web API back end, which is secured using the OWIN middleware.


Više informacija na sledećem linku:
http://tarabica.msforge.net/Session/Details/1192

 

Admin