Cargando…

Mastering Microsoft Forefront UAG 2010 Customization : Discover the Secrets to Extending and Customizing Microsoft Forefront Unified Access Gateway /

While UAG is built to integrate with many environments and publish dozens of application types, many organizations require a certain level of customization to meet their needs. With this book in hand, you will be equipped to deal with these types of customization scenarios, and you will be confident...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ben-Ari, Erez
Otros Autores: Amara, Rainier
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, ©2012.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Chapter 1: Customization Building Blocks; Introduction to UAG and how it works; The UAG detection, login, and authentication flow; Fetching pages from applications; Single Sign On; Host Address Translation (HAT); Customization and supportability; The CustomUpdate mechanism; HTML, CSS, JavaScript, ASP, and ASP.NET; Other web technologies
  • Reading, editing, and debugging ASP codeA word about security; Further reading; Summary; Chapter 2: Customizing UAG's Look and Feel; Honey, I wouldn't change a thing!; The UI pages; Customizing the login and admin pages; Customizing the portal; Portal application icons; Changing texts; Adding a user interface language; Another tip for text changing; Portal selection for clients; Summary; Chapter 3: Customizing Endpoint Detection and Policies; How does endpoint detection work?; Things you can do with custom detection scripts; Creating and placing a custom detection script
  • Custom detection script tipsIntegrating custom detection with endpoint policies; Troubleshooting and debugging detection scripts; Endpoint detection in the real world; Summary; Chapter 4: The Application Wrapper and SRA; What content alteration can do for you; The Application Wrapper and SRA configuration files; How the AppWrap and SRA engines work; Having your own way; AppWrap syntax; More fun with AppWrap; SRA syntax; Summary; Chapter 5: Creating Custom Application Templates; Building SSL-VPN templates; Creating your own templates; Template customizations and enhancements
  • More parameters used in the templateWizardDefault; SSL-VPN specific settings and configuration; Tying in to the SSL-VPN template list; Summary; Chapter 6: Custom Certificate Authentication; Certificate authentication concepts and terminologies; UAG and certificate authentication; Understanding the pieces of cert authentication for UAG; Login.inc; Validate.inc; Repository.inc; Certificate authentication with KCD; Troubleshooting certificate authentication; Summary; Chapter 7: Custom Authentication Repositories; How does custom authentication work?; Verifying usernames
  • Working with an SQL databaseMore elaborate code; Testing and debugging your code; Putting it all together; Summary; Chapter 8: Extending the Login Process with Customization; The UAG authentication flow; Creating a Post Post Validate file; Integrating your own code and interacting with UAG's COM object; Putting data into the session; Adding parameters; Sending data to the backend server; More ideas; Summary; Chapter 9: Customizing Endpoint Components; Controlling component deployment; Adding links to the portal for the client installation; Customizing SSTP; Summary