Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Mastering Microsoft Forefront UAG 2010 Customization
  • Table Of Contents Toc
Mastering Microsoft Forefront UAG 2010 Customization

Mastering Microsoft Forefront UAG 2010 Customization

5 (12)
close
close
Mastering Microsoft Forefront UAG 2010 Customization

Mastering Microsoft Forefront UAG 2010 Customization

5 (12)

Overview of this book

While UAG is built to integrate with many environments and publish dozens of application types, many organizations require a certain level of customization to meet their needs. With this book in hand, you will be equipped to deal with these types of customization scenarios, and you will be confident in using such workarounds without hassle and trial and error. Written by some of the leading experts on UAG, "Mastering Microsoft Forefront UAG 2010 Customization" covers the most complex and challenging options for customizing UAG in a way that is friendly and easy to follow. It walks you through various customization tasks, including explanations and code samples, as well as creative ideas for troubleshooting your work. Until now, only a few of the extensions to UAG's services have been publicly available, and most were only known to a select few. Now, this can include you! Throughout this book, you will tackle how to change the system's look-and-feel, deal with advanced authentication schemes and write special functions that need to be executed as part of the client interaction. With "Mastering Microsoft Forefront UAG 2010 Customization", you too can learn how to customize various aspects of UAG's functionality to enhance your organization or customers' experience.
Table of Contents (16 chapters)
close
close
Mastering Microsoft Forefront UAG 2010 Customization
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface

Chapter 7. Custom Authentication Repositories

One of the strongest points of UAG is its ability to authenticate users against many types of authentication providers. While most customers use Active Directory and Active Directory only, many require other or additional providers, such as RSA SecureID or LDAP. However, with some customizations you can also define your own custom authentication. This could be almost anything an SQL database, for example, is one popular customization, but other options are available. In this chapter, we will discuss the following topics:

  • How does custom authentication work?

  • Verifying usernames

  • Working with an SQL database

  • More elaborate code

  • Testing and debugging your code

  • Putting it all together

How does custom authentication work?

The process of authentication with UAG includes three key pieces:

  • UAG presents the login form to the user and collects the credentials

  • UAG verifies the credentials against the defined authentication repository or repositories, defined on...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Mastering Microsoft Forefront UAG 2010 Customization
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon