Book Image

Mastering Microsoft Forefront UAG 2010 Customization

Book Image

Mastering Microsoft Forefront UAG 2010 Customization

Overview of this book

While UAG is built to integrate with many environments and publish dozens of application types, many organizations require a certain level of customization to meet their needs. With this book in hand, you will be equipped to deal with these types of customization scenarios, and you will be confident in using such workarounds without hassle and trial and error. Written by some of the leading experts on UAG, "Mastering Microsoft Forefront UAG 2010 Customization" covers the most complex and challenging options for customizing UAG in a way that is friendly and easy to follow. It walks you through various customization tasks, including explanations and code samples, as well as creative ideas for troubleshooting your work. Until now, only a few of the extensions to UAG's services have been publicly available, and most were only known to a select few. Now, this can include you! Throughout this book, you will tackle how to change the system's look-and-feel, deal with advanced authentication schemes and write special functions that need to be executed as part of the client interaction. With "Mastering Microsoft Forefront UAG 2010 Customization", you too can learn how to customize various aspects of UAG's functionality to enhance your organization or customers' experience.
Table of Contents (16 chapters)
Mastering Microsoft Forefront UAG 2010 Customization
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface

Template customizations and enhancements


As noted previously, the ability to create your own script is what makes creating custom templates so powerful. The Drive Mapping application uses this ability to run a NET USE command, which maps a network drive over a TCP/IP tunnel using the RPC/SMB protocols. You can create a similar template that runs any command you want. In fact, you may want to use this to simply manipulate some of the client's configurations without even needing the tunnel at all.

Essentially, you can put any CMD-Shell commands within the CDATA section. They will be running in a visible shell window, so it may be good practice to use the echo off statement and the @ symbol to conceal the commands and their outputs from the end user.

What if you want to do something even more powerful? The SSL-VPN tunnel can also run a .VBS file, although that involves a slightly trickier approach. The engine cannot run a VBS file directly, but you can use the CMD-Shell echo command to generate...