SlideShare a Scribd company logo
1 of 48
SHAREPOINT
AND
FOREFRONT
UNIFIED
ACCESS
GATEWAY
James Tramel
Solutions Architect
Planet Technologies
• In other lives:
– Network Engineer
– Network Admin
– WAN admin
– Cloud admin
• Now
– SharePoint experience and
certification (custom and oob /
data and architect)
– Forefront IM and UAG
ABOUT ME
• As a portal
• As an intranet
• As an extranet
SHAREPOINT
• How is your farm built?
• Where does it reside?
• Who accesses it and How?
• What does it look like in your network?
• What does your network topology look
like?
SHAREPOINT AND
NETWORK
INFRASTRUCTURE
• Network topology is the layout pattern
of interconnections of the various
elements (links, nodes, etc.) of a
computer or network
• Physical topology refers to the physical
design of a network including the
devices, location and cable installation.
• Logical topology refers to how data is
actually transferred in a network as
opposed to its physical design
WHAT IS
NETWORK
TOPOLOGY
• What is a LAN?INSIDE /
OUTSIDE
• A local area network (LAN) is a
computer network that connects
computers and devices in a limited
geographical area such as home, school,
computer laboratory or office building.
The defining characteristics of LANs
includes their usually high data-transfer
rates, smaller geographic area, and lack
of a need for leased telecommunication
lines
LAN
LAN: LOCAL
AREA
NETWORK -
BASIC
LAN: TYPICAL
• What is a LAN?
• What is a WAN?
INSIDE /
OUTSIDE
• A wide area network(WAN) is a
telecommunication network that covers
a broad area (i.e., any network that
links across metropolitan, regional, or
national boundaries). Business and
government entities utilize WAN to
relay data among employees, clients,
buyers, and suppliers from various
geographical locations. In essence this
mode of telecommunication allows a
business to effectively carry out its daily
function regardless of location.
WAN
WAN: FRAME
WAN: VPN
• What is a LAN?
• What is a WAN?
• What is a Host?
INSIDE /
OUTSIDE
• A network host is a computer connected
to a computer network. A network host
may offer information resources, services,
and applications to users or other nodes
on the network
• A web hosting service is a type of Internet
hosting service that allows individuals and
organizations to make their own website
accessible via the World Wide Web. Web
hosts are companies that provide space on
a server they own or lease for use by their
clients as well as providing Internet
connectivity, typically in a data center.
Web hosts can also provide data center
space and connectivity to the Internet for
servers they do not own to be located in
their data center
HOST
• Inside network protocols
• Outside network protocols
• How can SP be setup for outside?
HOW TO USE
SHAREPOINT
FROM
OUTSIDE
SHAREPOINT
TOPOLOGY
• Anonymous Access
• SSL
• Authentication methods
– Windows Based
– Token based
– Claims based
– Forms Based
COMMON
OUTSIDE
METHODS
AUTHENTICATION
DEMO
• AD is not authoritative directory
• SAML tokens are not allowed to be
consumed
• No guarantee of Internet Explorer
• High security / sensitive data
AUTHENTICATION
EXAMPLE
• What is a LAN?
• What is a WAN?
• What is a Host?
• What is a DMZ?
INSIDE /
OUTSIDE
• A DMZ, or De Militarized Zone, is a
physical or logical subnetwork that
contains and exposes an organization's
external services to a larger untrusted
network, usually the Internet. It is
sometimes referred to as a perimeter
network. The purpose of a DMZ is to
add an additional layer of security to an
organization's local area network (LAN);
an external attacker only has access to
equipment in the DMZ, rather than any
other part of the network.
DMZ
DMZ: 1
FIREWALL
DMZ: 2
FIREWALLS
• Access Scenarios
– Remote employee
– External partner or customer
– Branded Internet sites
– Web hosting
– Mobile phone access
BUILDING A
SHAREPOINT
EXTRANET
SHAREPOINT AND UAG
• Anywhere access
• Information leakage prevention
• Endpoint health-based
authorization
• Web farm load balancing
• Advanced authentication
schemes
• Enabling access to SharePoint
sites from Microsoft Office
Outlook Web Access
• Unified Portal
• Automatic timeouts
• Internet-ready appliances
Secure Sockets Layer (SSL)
termination
• Application protection
• Policy-based access
• Single sign on
• Part of ForeFront Suite
• Reverse Proxy, Direct Access, Remote
Desktop Services and VPN solution
• Built with/on TMG (firewall, endpoint
security)
• Great for LOB apps
• Highly customizable, integrates with a
lot
WHAT IS UAG?
FOLLOW THE
PROGRAM
• TMG is installed before you install UAG
• TMG can act as a router, an Internet
gateway, a virtual private network
(VPN) server, a network address
translation (NAT) server and a proxy
server.
• TMG is a firewall that offers application
layer protection, stateful filtering,
content filtering and anti-malware
protection.
• TMG can compress web traffic and
offers web caching
UAG AND TMG
• Publishing Microsoft Exchange Server
Applications
• Publishing Remote Desktop Services
• Remote Network Access Using SSTP
• Intra-Site Automatic Tunnel Addressing
Protocol
• Endpoint Policies and Network Access
Protection
• UAG Arrays
• Direct Access
UAG SETUP IN
GENERAL
• UAG direct access
• Single server endpoint outside of
perimeter
• Everything on VM’s
• Multiple SP Applications
• Multiple Forests
UAG DIRECT
ACCESS AND
SHAREPOINT
• Edge firewall
UAG – SP
EXTRANETS
UAG – SP
EXTRANETS
Split back-to-back optimized for content publishing
Back-to-back perimeter with content publishing
(and optional TMG caching)
UAG – SP
EXTRANETS
• Know the network topology
• Know how to get around the network
topology
• VM’s and VM topology
• Static Routes
• Make sure you have access to local
session – you will likely lose ip your first
time
THINGS TO
NOTE FOR
INSTALLING
UAG
• Virtual Network Types
– Private Virtual Network
– Internal Virtual Network
– External Virtual Network
• Virtual NIC’s
• Physical NIC’s
• Static Routes
UNDERSTANDING
VM’S
ADDRESSING
UAG
• Name your Network Adapters
• Configure the External NIC
– Get rid of properties you don’t
need
– Default Gateway
– Un check register the connection in
DNS
– Disable NetBIOS
ADDRESSING
UAG
• Configure the Internal NIC
– No Gateway
– Register the connection in DNS
• Check your static route to internal nic
• Change the binding order
• Check routes
ADDRESSING
UAG
• You can associate a Web application with a
collection of mappings between internal and
public URLs.
• Alternate access mappings enable a Web
application that receives a request for an
internal URL, in one of the five authentication
zones, to return pages that contain links to the
public URL for the zone.
• The UAG server responds with identical content,
even though external users submit a different
protocol (HTTPS) and a different host header
than internal users.
• Alternate access mappings to allow the
SharePoint server to perform URL changes on
its own. This ensures that reverse proxies, such
as UAG, do not have to change the content of
the pages they serve to external sources.
ADDRESSING
SHAREPOINT:
AAM –
ALTERNATE
ACCESS
MAPPINGS
• The UAG portal is an ASP.Net-based Web
application using AJAX, and is the front-end
Web application for UAG
• A UAG portal trunk is a transfer channel that
allows endpoints to connect to the trunk’s
portal home page over HTTP or HTTPS. You can
also create a redirect trunk that redirects HTTP
endpoint requests to an HTTPS trunk.
• Each trunk has a portal home page to which
remote endpoints connect to interact with the
trunk, and access published applications.
• For each trunk UAG adds the Portal application
to the trunk in order to provide a default home
page. Alternatively, you can define a customized
home page.
UAG PORTALS
AND TRUNKS
• Each Web app is associated with a
unique public-facing host name, which is
used to access the application remotely.
• A Web app that is published through
the Forefront UAG trunk shares the
trunk's definitions in addition to some
of the trunk's functionality, such as the
logon and logoff pages.
• This means that the application's public
host name must reside under the same
parent domain as the trunk's public
host name; that is, the application and
the trunk are subdomains of the same
parent domain.
ADDRESSING SHAREPOINT:
PUBLIC HOST NAMES
Forefront UAG trunk’s
public host name
Trunk’s parent
domain
Examples of valid public host
names for Web app
Examples of non valid
public host names for
Web app
uag.woodgrovebank.co
m
woodgrovebank.co
m
hrportal.woodgrovebank.com
hrportal.a.b.woodgrovebank.co
m
hrportal.uag.woodgrovebank.co
m
hrportal.com
uag.ext.example.com ext.example.com hrportal.ext.example.com
hrportal.a.b.ext.example.com
hrportal.uag.ext.example.com
hrportal.com
hrportal.example.com
ADDRESSING
SHAREPOINT:
PUBLIC HOST
NAMES
• All the public host names that are used
in the trunk should be covered by this
certificate, including the trunk's public
host name and the public host names of
all the applications that are accessed via
the trunk.
ADDRESSING
SHAREPOINT
AND UAG:
SERVER
CERTIFICATES
DEMO / TOUR
• UAG is a way to go for extranets for a
highly secure deployment
• Big ROI for its other uses, as well as SP
• Know your network infrastructure
• Plan your SP install
• Access to the local UAG server
• Know your risks
CONCLUSION
Q AND A
1. MSDN
2. Technet
3. Microsoft Press
4. Wikipedia
5. http://mikecrowley.files.wordpress.com/2010/11/
6. http://www.windowsnetworking.com/articles_t
utorials/Understanding-Virtual-Networking-
Microsoft-Hyper-V.html>
7. http://mrshannon.wordpress.com/2010/04/30/se
tting-ip-addresses-on-a-uag-directaccess-
server/>
8. http://blog.concurrency.com/infrastructure/uag-
directaccess-ip-addressing-the-server/>
9. http://www.bibble-it.com/2010/02/21/forefront-
uag-in-10-minutes
REFERENCES

More Related Content

What's hot

Web Architecture and Technologies
Web Architecture and TechnologiesWeb Architecture and Technologies
Web Architecture and TechnologiesFulvio Corno
 
Taking DataFlow Management to the Edge with Apache NiFi/MiNiFi
Taking DataFlow Management to the Edge with Apache NiFi/MiNiFiTaking DataFlow Management to the Edge with Apache NiFi/MiNiFi
Taking DataFlow Management to the Edge with Apache NiFi/MiNiFiBryan Bende
 
The First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFi
The First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFiThe First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFi
The First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFiDataWorks Summit
 
Apache NiFi in the Hadoop Ecosystem
Apache NiFi in the Hadoop EcosystemApache NiFi in the Hadoop Ecosystem
Apache NiFi in the Hadoop EcosystemBryan Bende
 
Integrating NiFi and Flink
Integrating NiFi and FlinkIntegrating NiFi and Flink
Integrating NiFi and FlinkBryan Bende
 
Beyond Messaging Enterprise Dataflow powered by Apache NiFi
Beyond Messaging Enterprise Dataflow powered by Apache NiFiBeyond Messaging Enterprise Dataflow powered by Apache NiFi
Beyond Messaging Enterprise Dataflow powered by Apache NiFiIsheeta Sanghi
 
Integrating NiFi and Apex
Integrating NiFi and ApexIntegrating NiFi and Apex
Integrating NiFi and ApexBryan Bende
 
Hadoop Operations - Past, Present, and Future
Hadoop Operations - Past, Present, and FutureHadoop Operations - Past, Present, and Future
Hadoop Operations - Past, Present, and FutureDataWorks Summit
 
Log Analytics Optimization
Log Analytics OptimizationLog Analytics Optimization
Log Analytics OptimizationIsheeta Sanghi
 
State of the Apache NiFi Ecosystem & Community
State of the Apache NiFi Ecosystem & CommunityState of the Apache NiFi Ecosystem & Community
State of the Apache NiFi Ecosystem & CommunityAccumulo Summit
 
Internet and web by Gulshan K Maheshwari(QAU)
Internet and web by Gulshan  K Maheshwari(QAU)Internet and web by Gulshan  K Maheshwari(QAU)
Internet and web by Gulshan K Maheshwari(QAU)GulshanKumar368
 
Apache NiFi - Flow Based Programming Meetup
Apache NiFi - Flow Based Programming MeetupApache NiFi - Flow Based Programming Meetup
Apache NiFi - Flow Based Programming MeetupJoseph Witt
 
The First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFi
The First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFiThe First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFi
The First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFiDataWorks Summit
 

What's hot (18)

Web Architecture and Technologies
Web Architecture and TechnologiesWeb Architecture and Technologies
Web Architecture and Technologies
 
The Avant-garde of Apache NiFi
The Avant-garde of Apache NiFiThe Avant-garde of Apache NiFi
The Avant-garde of Apache NiFi
 
Taking DataFlow Management to the Edge with Apache NiFi/MiNiFi
Taking DataFlow Management to the Edge with Apache NiFi/MiNiFiTaking DataFlow Management to the Edge with Apache NiFi/MiNiFi
Taking DataFlow Management to the Edge with Apache NiFi/MiNiFi
 
Nifi workshop
Nifi workshopNifi workshop
Nifi workshop
 
The First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFi
The First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFiThe First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFi
The First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFi
 
Apache NiFi in the Hadoop Ecosystem
Apache NiFi in the Hadoop EcosystemApache NiFi in the Hadoop Ecosystem
Apache NiFi in the Hadoop Ecosystem
 
Integrating NiFi and Flink
Integrating NiFi and FlinkIntegrating NiFi and Flink
Integrating NiFi and Flink
 
Beyond Messaging Enterprise Dataflow powered by Apache NiFi
Beyond Messaging Enterprise Dataflow powered by Apache NiFiBeyond Messaging Enterprise Dataflow powered by Apache NiFi
Beyond Messaging Enterprise Dataflow powered by Apache NiFi
 
Unit 4
Unit 4Unit 4
Unit 4
 
Integrating NiFi and Apex
Integrating NiFi and ApexIntegrating NiFi and Apex
Integrating NiFi and Apex
 
Hadoop Operations - Past, Present, and Future
Hadoop Operations - Past, Present, and FutureHadoop Operations - Past, Present, and Future
Hadoop Operations - Past, Present, and Future
 
What is REST?
What is REST?What is REST?
What is REST?
 
Apache Nifi Crash Course
Apache Nifi Crash CourseApache Nifi Crash Course
Apache Nifi Crash Course
 
Log Analytics Optimization
Log Analytics OptimizationLog Analytics Optimization
Log Analytics Optimization
 
State of the Apache NiFi Ecosystem & Community
State of the Apache NiFi Ecosystem & CommunityState of the Apache NiFi Ecosystem & Community
State of the Apache NiFi Ecosystem & Community
 
Internet and web by Gulshan K Maheshwari(QAU)
Internet and web by Gulshan  K Maheshwari(QAU)Internet and web by Gulshan  K Maheshwari(QAU)
Internet and web by Gulshan K Maheshwari(QAU)
 
Apache NiFi - Flow Based Programming Meetup
Apache NiFi - Flow Based Programming MeetupApache NiFi - Flow Based Programming Meetup
Apache NiFi - Flow Based Programming Meetup
 
The First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFi
The First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFiThe First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFi
The First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFi
 

Similar to Forefront UAG

Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architectureMuhammad ismail Shah
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy ServerLakshyaArora12
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation9921103075
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_worksarun nalam
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8suddenven
 
Azure Web App services
Azure Web App servicesAzure Web App services
Azure Web App servicesAlexey Bokov
 
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...Amazon Web Services
 
Network and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle TransformationNetwork and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle TransformationMatsuo Sawahashi
 
Internet Programming - Module one.pdf
Internet Programming - Module one.pdfInternet Programming - Module one.pdf
Internet Programming - Module one.pdfLoreta Jugu
 
Proxy servers
Proxy serversProxy servers
Proxy serversKumar
 
Networking topics like ISP,DNS etc
Networking topics like ISP,DNS etcNetworking topics like ISP,DNS etc
Networking topics like ISP,DNS etcKamlesh Nishad
 
Stop Those Prying Eyes Getting To Your Data SPTechCon
Stop Those Prying Eyes Getting To Your Data SPTechConStop Those Prying Eyes Getting To Your Data SPTechCon
Stop Those Prying Eyes Getting To Your Data SPTechConLiam Cleary [MVP]
 
Cloud description
Cloud descriptionCloud description
Cloud descriptionthanuambika
 
Integrate Applications into IBM Connections Cloud and On Premises (AD 1632)
Integrate Applications into IBM Connections Cloud and On Premises (AD 1632)Integrate Applications into IBM Connections Cloud and On Premises (AD 1632)
Integrate Applications into IBM Connections Cloud and On Premises (AD 1632)TIMETOACT GROUP
 
Stay productive_while_slicing_up_the_monolith
Stay productive_while_slicing_up_the_monolithStay productive_while_slicing_up_the_monolith
Stay productive_while_slicing_up_the_monolithMarkus Eisele
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjAmitDeshai
 
An Introduction To World Wide Web
An Introduction To World Wide WebAn Introduction To World Wide Web
An Introduction To World Wide WebAbhishek Kharbanda
 

Similar to Forefront UAG (20)

Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_works
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
Azure Web App services
Azure Web App servicesAzure Web App services
Azure Web App services
 
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...
 
Network and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle TransformationNetwork and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle Transformation
 
Internet Programming - Module one.pdf
Internet Programming - Module one.pdfInternet Programming - Module one.pdf
Internet Programming - Module one.pdf
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
Networking topics like ISP,DNS etc
Networking topics like ISP,DNS etcNetworking topics like ISP,DNS etc
Networking topics like ISP,DNS etc
 
Stop Those Prying Eyes Getting To Your Data SPTechCon
Stop Those Prying Eyes Getting To Your Data SPTechConStop Those Prying Eyes Getting To Your Data SPTechCon
Stop Those Prying Eyes Getting To Your Data SPTechCon
 
Cloud description
Cloud descriptionCloud description
Cloud description
 
Integrate Applications into IBM Connections Cloud and On Premises (AD 1632)
Integrate Applications into IBM Connections Cloud and On Premises (AD 1632)Integrate Applications into IBM Connections Cloud and On Premises (AD 1632)
Integrate Applications into IBM Connections Cloud and On Premises (AD 1632)
 
Stay productive_while_slicing_up_the_monolith
Stay productive_while_slicing_up_the_monolithStay productive_while_slicing_up_the_monolith
Stay productive_while_slicing_up_the_monolith
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
IS100 Week 5
IS100 Week 5IS100 Week 5
IS100 Week 5
 
An Introduction To World Wide Web
An Introduction To World Wide WebAn Introduction To World Wide Web
An Introduction To World Wide Web
 

More from James Tramel

DevOps Kata Modern Debugging
DevOps Kata Modern DebuggingDevOps Kata Modern Debugging
DevOps Kata Modern DebuggingJames Tramel
 
MS Cloud Design Patterns Infographic 2015
MS Cloud Design Patterns Infographic 2015MS Cloud Design Patterns Infographic 2015
MS Cloud Design Patterns Infographic 2015James Tramel
 
Microsoft and DevOps
Microsoft and DevOpsMicrosoft and DevOps
Microsoft and DevOpsJames Tramel
 
SharePoint 2013 Apps and the App Model
SharePoint 2013 Apps and the App ModelSharePoint 2013 Apps and the App Model
SharePoint 2013 Apps and the App ModelJames Tramel
 
Oauth and SharePoint 2013 Provider Hosted apps
Oauth and SharePoint 2013 Provider Hosted appsOauth and SharePoint 2013 Provider Hosted apps
Oauth and SharePoint 2013 Provider Hosted appsJames Tramel
 
Oauth - Brief Introduction
Oauth - Brief IntroductionOauth - Brief Introduction
Oauth - Brief IntroductionJames Tramel
 
Office 365 and SharePoint
Office 365 and SharePointOffice 365 and SharePoint
Office 365 and SharePointJames Tramel
 
Information architecture in share point 2010
Information architecture in share point 2010Information architecture in share point 2010
Information architecture in share point 2010James Tramel
 
Sharepoint and SQL Server 2012
Sharepoint and SQL Server 2012Sharepoint and SQL Server 2012
Sharepoint and SQL Server 2012James Tramel
 

More from James Tramel (9)

DevOps Kata Modern Debugging
DevOps Kata Modern DebuggingDevOps Kata Modern Debugging
DevOps Kata Modern Debugging
 
MS Cloud Design Patterns Infographic 2015
MS Cloud Design Patterns Infographic 2015MS Cloud Design Patterns Infographic 2015
MS Cloud Design Patterns Infographic 2015
 
Microsoft and DevOps
Microsoft and DevOpsMicrosoft and DevOps
Microsoft and DevOps
 
SharePoint 2013 Apps and the App Model
SharePoint 2013 Apps and the App ModelSharePoint 2013 Apps and the App Model
SharePoint 2013 Apps and the App Model
 
Oauth and SharePoint 2013 Provider Hosted apps
Oauth and SharePoint 2013 Provider Hosted appsOauth and SharePoint 2013 Provider Hosted apps
Oauth and SharePoint 2013 Provider Hosted apps
 
Oauth - Brief Introduction
Oauth - Brief IntroductionOauth - Brief Introduction
Oauth - Brief Introduction
 
Office 365 and SharePoint
Office 365 and SharePointOffice 365 and SharePoint
Office 365 and SharePoint
 
Information architecture in share point 2010
Information architecture in share point 2010Information architecture in share point 2010
Information architecture in share point 2010
 
Sharepoint and SQL Server 2012
Sharepoint and SQL Server 2012Sharepoint and SQL Server 2012
Sharepoint and SQL Server 2012
 

Recently uploaded

Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 

Recently uploaded (20)

Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 

Forefront UAG

  • 2. • In other lives: – Network Engineer – Network Admin – WAN admin – Cloud admin • Now – SharePoint experience and certification (custom and oob / data and architect) – Forefront IM and UAG ABOUT ME
  • 3. • As a portal • As an intranet • As an extranet SHAREPOINT
  • 4. • How is your farm built? • Where does it reside? • Who accesses it and How? • What does it look like in your network? • What does your network topology look like? SHAREPOINT AND NETWORK INFRASTRUCTURE
  • 5. • Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.) of a computer or network • Physical topology refers to the physical design of a network including the devices, location and cable installation. • Logical topology refers to how data is actually transferred in a network as opposed to its physical design WHAT IS NETWORK TOPOLOGY
  • 6. • What is a LAN?INSIDE / OUTSIDE
  • 7. • A local area network (LAN) is a computer network that connects computers and devices in a limited geographical area such as home, school, computer laboratory or office building. The defining characteristics of LANs includes their usually high data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines LAN
  • 10. • What is a LAN? • What is a WAN? INSIDE / OUTSIDE
  • 11. • A wide area network(WAN) is a telecommunication network that covers a broad area (i.e., any network that links across metropolitan, regional, or national boundaries). Business and government entities utilize WAN to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. WAN
  • 14. • What is a LAN? • What is a WAN? • What is a Host? INSIDE / OUTSIDE
  • 15. • A network host is a computer connected to a computer network. A network host may offer information resources, services, and applications to users or other nodes on the network • A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their own website accessible via the World Wide Web. Web hosts are companies that provide space on a server they own or lease for use by their clients as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet for servers they do not own to be located in their data center HOST
  • 16. • Inside network protocols • Outside network protocols • How can SP be setup for outside? HOW TO USE SHAREPOINT FROM OUTSIDE
  • 18. • Anonymous Access • SSL • Authentication methods – Windows Based – Token based – Claims based – Forms Based COMMON OUTSIDE METHODS
  • 20. • AD is not authoritative directory • SAML tokens are not allowed to be consumed • No guarantee of Internet Explorer • High security / sensitive data AUTHENTICATION EXAMPLE
  • 21. • What is a LAN? • What is a WAN? • What is a Host? • What is a DMZ? INSIDE / OUTSIDE
  • 22. • A DMZ, or De Militarized Zone, is a physical or logical subnetwork that contains and exposes an organization's external services to a larger untrusted network, usually the Internet. It is sometimes referred to as a perimeter network. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the network. DMZ
  • 25. • Access Scenarios – Remote employee – External partner or customer – Branded Internet sites – Web hosting – Mobile phone access BUILDING A SHAREPOINT EXTRANET
  • 26. SHAREPOINT AND UAG • Anywhere access • Information leakage prevention • Endpoint health-based authorization • Web farm load balancing • Advanced authentication schemes • Enabling access to SharePoint sites from Microsoft Office Outlook Web Access • Unified Portal • Automatic timeouts • Internet-ready appliances Secure Sockets Layer (SSL) termination • Application protection • Policy-based access • Single sign on
  • 27. • Part of ForeFront Suite • Reverse Proxy, Direct Access, Remote Desktop Services and VPN solution • Built with/on TMG (firewall, endpoint security) • Great for LOB apps • Highly customizable, integrates with a lot WHAT IS UAG?
  • 29. • TMG is installed before you install UAG • TMG can act as a router, an Internet gateway, a virtual private network (VPN) server, a network address translation (NAT) server and a proxy server. • TMG is a firewall that offers application layer protection, stateful filtering, content filtering and anti-malware protection. • TMG can compress web traffic and offers web caching UAG AND TMG
  • 30. • Publishing Microsoft Exchange Server Applications • Publishing Remote Desktop Services • Remote Network Access Using SSTP • Intra-Site Automatic Tunnel Addressing Protocol • Endpoint Policies and Network Access Protection • UAG Arrays • Direct Access UAG SETUP IN GENERAL
  • 31. • UAG direct access • Single server endpoint outside of perimeter • Everything on VM’s • Multiple SP Applications • Multiple Forests UAG DIRECT ACCESS AND SHAREPOINT
  • 32. • Edge firewall UAG – SP EXTRANETS
  • 33. UAG – SP EXTRANETS Split back-to-back optimized for content publishing
  • 34. Back-to-back perimeter with content publishing (and optional TMG caching) UAG – SP EXTRANETS
  • 35. • Know the network topology • Know how to get around the network topology • VM’s and VM topology • Static Routes • Make sure you have access to local session – you will likely lose ip your first time THINGS TO NOTE FOR INSTALLING UAG
  • 36. • Virtual Network Types – Private Virtual Network – Internal Virtual Network – External Virtual Network • Virtual NIC’s • Physical NIC’s • Static Routes UNDERSTANDING VM’S
  • 38. • Name your Network Adapters • Configure the External NIC – Get rid of properties you don’t need – Default Gateway – Un check register the connection in DNS – Disable NetBIOS ADDRESSING UAG
  • 39. • Configure the Internal NIC – No Gateway – Register the connection in DNS • Check your static route to internal nic • Change the binding order • Check routes ADDRESSING UAG
  • 40. • You can associate a Web application with a collection of mappings between internal and public URLs. • Alternate access mappings enable a Web application that receives a request for an internal URL, in one of the five authentication zones, to return pages that contain links to the public URL for the zone. • The UAG server responds with identical content, even though external users submit a different protocol (HTTPS) and a different host header than internal users. • Alternate access mappings to allow the SharePoint server to perform URL changes on its own. This ensures that reverse proxies, such as UAG, do not have to change the content of the pages they serve to external sources. ADDRESSING SHAREPOINT: AAM – ALTERNATE ACCESS MAPPINGS
  • 41. • The UAG portal is an ASP.Net-based Web application using AJAX, and is the front-end Web application for UAG • A UAG portal trunk is a transfer channel that allows endpoints to connect to the trunk’s portal home page over HTTP or HTTPS. You can also create a redirect trunk that redirects HTTP endpoint requests to an HTTPS trunk. • Each trunk has a portal home page to which remote endpoints connect to interact with the trunk, and access published applications. • For each trunk UAG adds the Portal application to the trunk in order to provide a default home page. Alternatively, you can define a customized home page. UAG PORTALS AND TRUNKS
  • 42. • Each Web app is associated with a unique public-facing host name, which is used to access the application remotely. • A Web app that is published through the Forefront UAG trunk shares the trunk's definitions in addition to some of the trunk's functionality, such as the logon and logoff pages. • This means that the application's public host name must reside under the same parent domain as the trunk's public host name; that is, the application and the trunk are subdomains of the same parent domain. ADDRESSING SHAREPOINT: PUBLIC HOST NAMES
  • 43. Forefront UAG trunk’s public host name Trunk’s parent domain Examples of valid public host names for Web app Examples of non valid public host names for Web app uag.woodgrovebank.co m woodgrovebank.co m hrportal.woodgrovebank.com hrportal.a.b.woodgrovebank.co m hrportal.uag.woodgrovebank.co m hrportal.com uag.ext.example.com ext.example.com hrportal.ext.example.com hrportal.a.b.ext.example.com hrportal.uag.ext.example.com hrportal.com hrportal.example.com ADDRESSING SHAREPOINT: PUBLIC HOST NAMES
  • 44. • All the public host names that are used in the trunk should be covered by this certificate, including the trunk's public host name and the public host names of all the applications that are accessed via the trunk. ADDRESSING SHAREPOINT AND UAG: SERVER CERTIFICATES
  • 46. • UAG is a way to go for extranets for a highly secure deployment • Big ROI for its other uses, as well as SP • Know your network infrastructure • Plan your SP install • Access to the local UAG server • Know your risks CONCLUSION
  • 48. 1. MSDN 2. Technet 3. Microsoft Press 4. Wikipedia 5. http://mikecrowley.files.wordpress.com/2010/11/ 6. http://www.windowsnetworking.com/articles_t utorials/Understanding-Virtual-Networking- Microsoft-Hyper-V.html> 7. http://mrshannon.wordpress.com/2010/04/30/se tting-ip-addresses-on-a-uag-directaccess- server/> 8. http://blog.concurrency.com/infrastructure/uag- directaccess-ip-addressing-the-server/> 9. http://www.bibble-it.com/2010/02/21/forefront- uag-in-10-minutes REFERENCES

Editor's Notes

  1. Formerly
  2. Lots of ways to create SharePoint, some of which require more secure setups
  3. SharePoint resides in a…
  4. If you don’t know, to understand network topology…
  5. Concept we’ll return to a few times Key components to network Who’s in your inner circle?
  6. Notice the wall
  7. Notice the wall / the blockade
  8. To understand what all this means, let’s go back to inside and outside for a moment
  9. To understand what all this means, let’s go back to inside and outside for a moment
  10. Bring this up, as this is common – you host SharePoint yourself – althought don’t have to
  11. Question for SP - How do users get to your data and your farm
  12. Add slide from mind to matter on topology, explain web application and zones
  13. Lead to how do we do this
  14. Create kerberos token for claims – follow Shannon and keep it simple That’s great, but what if you want this stuff:
  15. CU – great – but what’s wrong Is it supported? How safe is it? What is the cost? What is the benefit?
  16. To understand what all this means, let’s go back to inside and outside for a moment
  17. http://go.microsoft.com/fwlink/?LinkId=187987
  18. http://technet.microsoft.com/en-us/library/dd861393.aspx
  19. http://en.wikipedia.org/wiki/Microsoft_Forefront_Unified_Access_Gateway authentication vendors such as RSA Security, Vasco, GrIDsure, Swivel, ActivCard and Aladdin numerous authentication systems and protocols such as Active Directory, RADIUS, LDAP, NTLM, Lotus Domino, PKI and TACACS+.
  20. Secure socket tunneling porotocal
  21. What we’re going to do / What I’ve done
  22. Simple, right?
  23. More Complicated
  24. Where to put things How to get from point A to B VLANS TMG does not play around
  25. Who can name all 5? Default Intranet Internet Custom Extranet Demo
  26. Browse to Planets Explain redirection Show service
  27. http://technet.microsoft.com/en-us/virtuallabs/bb499665.aspx – configure portal trunk Show http redirect Show AAM Show IIS Show Portal Show TMG Show UAG
  28. References