This chapter explored the process of configuring UAG for certificate authentication by using the sample files included with UAG, and adapting them to your needs. This serves as the basis for the topic covered in the next chapter Creating your own custom repository, which is a lot more challenging, but also provides incredible benefits by allowing you to authenticate your users against virtually any directory.
Mastering Microsoft Forefront UAG 2010 Customization
Mastering Microsoft Forefront UAG 2010 Customization
Overview of this book
While UAG is built to integrate with many environments and publish dozens of application types, many organizations require a certain level of customization to meet their needs.
With this book in hand, you will be equipped to deal with these types of customization scenarios, and you will be confident in using such workarounds without hassle and trial and error.
Written by some of the leading experts on UAG, "Mastering Microsoft Forefront UAG 2010 Customization" covers the most complex and challenging options for customizing UAG in a way that is friendly and easy to follow. It walks you through various customization tasks, including explanations and code samples, as well as creative ideas for troubleshooting your work.
Until now, only a few of the extensions to UAG's services have been publicly available, and most were only known to a select few. Now, this can include you!
Throughout this book, you will tackle how to change the system's look-and-feel, deal with advanced authentication schemes and write special functions that need to be executed as part of the client interaction.
With "Mastering Microsoft Forefront UAG 2010 Customization", you too can learn how to customize various aspects of UAG's functionality to enhance your organization or customers' experience.
Table of Contents (16 chapters)
Mastering Microsoft Forefront UAG 2010 Customization
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Customization Building Blocks
Customizing UAG's Look and Feel
Customizing Endpoint Detection and Policies
The Application Wrapper and SRA
Creating Custom Application Templates
Custom Certificate Authentication
Custom Authentication Repositories
Extending the Login Process with Customization
Customizing Endpoint Components
Customer Reviews