Buy Ticket

New Masterclass! Microsoft Identity solutions with Azure AD, on-premises AD FS and AD

Oslo: 27th November - 1st December
Duration: 5 days
Price: NOK 30.000 / SEK 32.000.- charged in local currency

All classes held in English

More information and sign-up

Please send an email to: info@nicconf.com

About the Masterclass

NIC has the pleasure to present several Masterclasses with John Craddock in 2017. The Master Class focus on Microsoft Identity solutions with Azure AD, on-premises AD FS and AD.

Limited seats available.

Complete program

Feedback from participants on the last Masterclass:

"Very useful course which gave me valuable knowledge I will use a lot in my daily work as a security engineer."

"Great course. Really well formed, pedagogic and easy to follow. It's the first time 5 days have gone so fast on a course and I still want to continue and learn more. I look forward to go back at work an follow up on my new skills. The opportunity to keep the lab environment is great! Thanks for a great week!"

"I must say that  John Craddock is the best instructor I've ever esperienced in my 30 years in IT business. Easy to understand his speaking, very good and thorough explanations, and  incredible high knowledge about all topics. A pleasure to attend :) :)"

 

WHO SHOULD JOIN THIS MASTERCLASS – Get hands-on in our labs

 

Come to this Masterclass written and delivered by John Craddock. Discover how the identity solutions offered by Azure Active Directory, on-premises AD FS and AD will help you build identity systems for the future using protocols that include OpenID Connect and OAuth 2.0.

In the Masterclass you will learn how to authenticate and provide authorization factors to applications that can be located on-premises or in the cloud. The source of identity of the users could be from you own corporate network, your Azure AD domain, a partner organization and/or a social identity provider such as Facebook or Google. ? The class provides detailed learning through the extensive use of hands-on labs.

Attendees will not only learn the fundamentals and principles, but also learn how-to deploy and troubleshoot the solutions. In-depth learning will be gained through the use tools, such as Fiddler, to analyse and understand the protocol flows. Microsoft Identity solutions with Azure Active Directory, on-premises AD FS and AD Who is it for? The class is primarily aimed at IT professionals. However, application developers who are tasked with integrating authentication and authorisation with Microsoft Azure and/or on-premises AD FS will greatly benefit from the detailed coverage. Code development is not included in the class, but you will learn about all of the configuration requirements. ?

What to expect

The Masterclass is a high-energy, action packed event, crammed with solid information and tips. During the 5-days John Craddock will help build your knowledge and consolidate your new skills with over 35 hands-on labs.

 

WHAT OTHERS SAID ABOUT THIS CLASS Extremely technical, extremely satisfied

 

 "I believe this is the most useful course I have ever attended! John is very good at conveying the concepts and it is easy to see that he has solid knowledge and experience. He is also really taking the time to explain, not just rushing through hundreds of slides. Also, very many hands-on labs which was very good."

"Best training class ever!...I'm VERY satisfied."

"Fantastic training, better structure and execution than any training I have attended in years."

"Excellent class; fully packed with information that is spot on and very useful hands-on labs. We are amazed! John is easy to listen to and has lots of knowledge on the subject! This is probably the best course I’ve had. Time well spent! "

"John is very knowledgeable and makes the course easy to follow. After completing the class, I really feel I have in-depth knowledge about how these aspects of Azure really work and operate. Having Limited experience working With Azure, I already feel that my knowledge now exceeds what more experienced consultants claim to know."

"I really appreciate John as a trainee. He really manages the area fully. The course really opened my eyes, and we will make changes in our company environment."

 

 

Complete program

Day 1

After a comprehensive introduction to today’s identity challenges and solutions you will learn the details of the authentication protocols. This in-depth coverage of the protocols will allow you troubleshoot any problems you may encounter when deploying solutions. As we go through the hands-on labs you will be expected to troubleshoot any problems you may encounter.

Day 1 hands-on labs include:

  • Creating an Azure Active Directory
  • Capturing and analysing HTTP/HTTPS sessions using Fiddler
  • Enabling Kerberos on a website
  • Troubleshooting Kerberos network traffic using Wireshark
  • Tracing the WS-federation protocol

 

Day 2

After completing our investigation of the protocols, you will learn how to configure the Azure Active Directory to meet your requirements. You'll discover how to manage the Azure AD through the Azure Portal, using PowerShell and the GraphAPIs. After adding custom domains and branding to your Azure AD, you will see how to enhance security and the user experience using role based access control, self-service password resets, MFA and Azure AD Identity Protection.

 

Day 2 hands-on labs include:

  • Investigating OpenID Connect
  • Adding custom domains to Azure AD
  • Branding your portal
  • Managing Azure AD with PowerShell
  • Using Graph Explorer
  • Scoped role based access control
  • Self-service password resets
  • Enabling Multi-Factor Authentication

 

Day 3

You will start the day by deploying Azure AD Connect to synchronize on-premises AD users to Azure AD. We will then investigate pass-through authentication and the new SSO capabilities provided by Azure AD Connect. You will learn about the SSO capabilities of Windows 10 when it is joined to Azure AD and how Windows Hello can eliminate the need for passwords. At this stage, we have a solid identity infrastructure and now it's time to make applications available to our users. You will start by deploying a SaaS app to your users; configuring groups, assignments and self-service application management. You will then deploy your own applications into Azure AD using both WS-Federation and OpenID Connect / Oauth2.0. 

Day 3 hands-on labs include: 

  • Installing and configuring synchronization with Azure AD Connect
  • Investigating pass-through authentication
  • Working with SaaS applications
  • Self-service application management
  • Configuring a WS-Federation App with Azure AD
  • Configuring an Open ID Connect / OAuth 2.0 app with Azure AD

 

Day 4

The day start by diving deeper into the application model and learning about managing permissions, roles, groups, delegation and consent. You will discover how to turn your application into a multi-tenant app and make it available to all users from all Azure AD tenants. You will the go on to work with the Azure AD Application Proxy to publish applications to the Internet. We will end the day by configuring AD FS and the Web Application Proxy on Server 2016.

Day 4 hands-on labs include: 

  • Managing permission roles and groups
  • Defining WebAPI permissions
  • Investigating consent
  • Multi-tenant applications
  • Publishing a claims-aware application with the Azure AD application proxy
  • Publishing an application using Windows Authentication via Kerberos Constrained Delegation
  • Configuring AD FS and the WAP

 

Day 5

As we now have AD FS operational, the day starts by using Azure AD Connect to establish federated SSO for our on-premises AD users. You will then learn about managing AD FS claims and how to configure an OpenID Connect /OAuth 2.0 application to work with Azure AD. We will then stretch our boundaries and see how Azure AD can open access to consumers (B2C) and businesses (B2B).

Day 5 hands-on labs include: 

  • Enabling Federated SSO
  • Installing and configuring an OpenID Connect app on AD FS
  • Managing claims AD FS claims rules
  • Creating a B2C directory
  • Multi-tenant versus federated applications
  • Managing B2B invitations and guest users
  • Taking over an unmanaged tenant