Book Image

Mastering Microsoft Forefront UAG 2010 Customization

Book Image

Mastering Microsoft Forefront UAG 2010 Customization

Overview of this book

While UAG is built to integrate with many environments and publish dozens of application types, many organizations require a certain level of customization to meet their needs. With this book in hand, you will be equipped to deal with these types of customization scenarios, and you will be confident in using such workarounds without hassle and trial and error. Written by some of the leading experts on UAG, "Mastering Microsoft Forefront UAG 2010 Customization" covers the most complex and challenging options for customizing UAG in a way that is friendly and easy to follow. It walks you through various customization tasks, including explanations and code samples, as well as creative ideas for troubleshooting your work. Until now, only a few of the extensions to UAG's services have been publicly available, and most were only known to a select few. Now, this can include you! Throughout this book, you will tackle how to change the system's look-and-feel, deal with advanced authentication schemes and write special functions that need to be executed as part of the client interaction. With "Mastering Microsoft Forefront UAG 2010 Customization", you too can learn how to customize various aspects of UAG's functionality to enhance your organization or customers' experience.
Table of Contents (16 chapters)
Mastering Microsoft Forefront UAG 2010 Customization
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface

Working with an SQL database


One of the more popular custom repositories uses SQL as its database, and this is also pretty easy, as SQL has built-in functions for effective searching, even if the database contains a huge number of users. To interact with SQL, Windows offers the built-in ADODB object. All you have to do is initialize it, and create an SQL Select query to poll the user's name and password from SQL.

The following screenshot shows the sample code:

The code defines the name of the SQL server, DB name, and the SQL user which has access to the user's list table. It then creates an SQL query to select the table rows that match the user's username and password, and executes the query. After this, if the resulting collection is not empty, it means that at least one record matches both the username and password, and that's what we want. Otherwise, there is no match and the authentication fails.

The preceding example is far from programming best practices as it is not very secure, due...