Tuesday, November 18, 2008
patterns & practices App Arch Guide 2.0 Beta 2
I have been excusing myself with numerous reasons for not writing the blog, and one of them was working on the Application Architecture Guide 2.0. Well good news is, yesterday we released our patterns & practices Application Architecture Guide 2.0 Beta 2.
As our team defines it, its a Microsoft playbook for the application platform. It's our guide to help solution architects and developers make the most of the Microsoft platform. It's a distillation of many lessons learned. It’s principle-based and pattern-oriented to provide a durable, evolvable backdrop for application architecture. It's a collaborative effort among product team members, field, industry experts, MVPs, and customers. This is the guide that helps you understand our platform, choose among the technologies, and build applications based on lessons learned and proven practices.
Please Download the Guide and help us improve it by providing feedback on the issues and discussion tabs of the codeplex site.
~Later
Friday, June 6, 2008
patterns & practices WCF Security Guide - BETA released
The wait is over!!, we have released BETA version of our WCF Security guide - patterns & practices Improving Web Services Security: Scenarios and Implementation Guidance for WCF.
The guide walks you through the security concepts of WCF with key guidance around those concepts. The chapters are ably supported by Guidelines, Checklists, Practices, Q&A and How Tos. It other words you can call it our Microsoft playbook for Windows Communication Foundation (WCF - "Indigo").
It shows you how to build secure WCF. It's a compilation of proven practices, product team recommendations and insights from the field.
Please Download the Guide and embark on the WCF journey securely!!
~Later
Thursday, April 10, 2008
WCF Security - Application Scenarios
Everyone gets excited - when they see the Application Scenarios our team has been creating. As our team defines it, "Application Scenarios are visual blueprints of skeletal solutions for end-to-end deployment scenario."
Each application scenario includes a skeleton view of a deployment topology of particular scenario and a skeletal representation of possible or recommended solution, with analysis of the solution applied.
For me this are visual patterns of scenarios and solution, where you can quickly scan what scenario pattern fits your application (or closest fit) and what is the possible or recommended solution.
But let me be clear here, the recommended solution will not necessarily be 100% fit to your scenario - but treat it as baseline and customize it to your scenario appropriately.
As part of our patterns & practices WCF Security Guidance Project - Yesterday we released a set of Application Scenarios.
Intranet
~Later
Each application scenario includes a skeleton view of a deployment topology of particular scenario and a skeletal representation of possible or recommended solution, with analysis of the solution applied.
For me this are visual patterns of scenarios and solution, where you can quickly scan what scenario pattern fits your application (or closest fit) and what is the possible or recommended solution.
But let me be clear here, the recommended solution will not necessarily be 100% fit to your scenario - but treat it as baseline and customize it to your scenario appropriately.
As part of our patterns & practices WCF Security Guidance Project - Yesterday we released a set of Application Scenarios.
Intranet
- Intranet – Web to Remote WCF Using Transport Security (Trusted Subsystem TCP)
- Intranet – Web to Remote WCF Using Transport Security (Trusted Subsystem, HTTP)
- Intranet – Web to Remote WCF Using Transport Security (Original Caller, TCP)
- Intranet – Windows Forms to Remote WCF Using Transport Security (TCP)
- Internet – Web to Remote WCF Using Transport Security (Trusted Subsystem)
- Internet – Windows Forms Client Calling WCF Using Message Security
~Later
Tuesday, April 1, 2008
WCF Security - Long way to go!!
I had been hibernating and hence no posts from me in a while - now if you are wondering as to what I was upto during my hibernation, let me clarify, NO I was not wondering about meaning of life or finding ways of "Moksha". I have postponed those things for couple of years.
Infact I was deep diving in WCF security space, and we have recently released some cool WCF guidance on codeplex as part of our patterns & practices WCF Security Guidance Project.
The goal of this project is to find the key combinations of security practices for WCF that work for customers and share them more broadly. At a high-level, you can think of the project in terms of these main buckets:
~Later
Infact I was deep diving in WCF security space, and we have recently released some cool WCF guidance on codeplex as part of our patterns & practices WCF Security Guidance Project.
The goal of this project is to find the key combinations of security practices for WCF that work for customers and share them more broadly. At a high-level, you can think of the project in terms of these main buckets:
- Application Scenarios - These are whiteboard solutions for common end-to-end application scenarios.
- How Tos - These are step-by-step instructions for performing key end-to-end tasks.
- Building Codes - These are our sets of rules and practices. This includes Guidelines, Checklists, and Practices at a Glance.
- Reference - This includes Explained, Cheat Sheets, and Q&A guidance.
~Later
Subscribe to:
Posts (Atom)