exam questions

Exam 70-486 All Questions

View all questions & answers for the 70-486 exam

Exam 70-486 topic 1 question 48 discussion

Actual exam question from Microsoft's 70-486
Question #: 48
Topic #: 1
[All 70-486 Questions]

DRAG DROP -
You are developing an ASP.NET MVC application that allows users to log on by using a third-party authenticator.
You need to configure Microsoft Azure Access Control Services and the application.
Which five actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:

Show Suggested Answer Hide Answer
Suggested Answer:
Box 1: Create a service namespace
The first step is to create an ACS Namespace. This is your Security Token Services (STS) that will generate Signed Identity tokens to be consumed by WAP. This will also be the only STS that WAP will trust.
Box 2: Register the application as a relaying partner.
Now that the Namespace is created, you will have to tell it about the WAP Portals that is expecting tokens from it. We add the WAP Tenant Portal as a Relying
Party to ACS (Access Control Services).
Box 3: Add a Security Token Service (STS) reference in Visual Studio 2012.
Now that the Namespace is created, you will have to tell it about the WAP Portals that is expecting tokens from it.
1. Click on Relying Party Applications and click on Add to add the Windows Azure Pack tenant Portal as a Relying Party to this namespace. This essentially tells the ACS namespace that the Tenant Portal is expecting it to provide user identities.
2. You will now go to the Add Relying Party Application page where you can enter details about the WAP tenant Portal.
3. The easier option is to provide the federation Metadata from the tenant portal. Save the XML file locally on your computer
4. Now back in the ACS management portal, Upload the federation metadata file and provide a Display Name for the Relying Party.
5. Scroll Down to the Token Format section and choose the token format to be 'JWT'. By Default, the Windows Live Identity Provider will be selected. Deselect it if you do not want to allow users to sign in using their Live id. Under the Token Signing Settings section, select X.509 Certificate as the Type. Click on Save.
Box 4: Add the third-party as the identity provider.
We have our ACS and WAP portals setup. We now have to find a source of Identities that can be flown in to the WAP Portals through ACS. We configure external services to act as Identity Providers
Box 5: Generate provider rules for claims
We now have our Relying Party and our Identity Providers set up. We should now tell ACS how to transform the incoming Claims from these Identity providers so that the Relying Party can understand it. We do that using Rule Groups which are a set of rules that govern Claim Transformation. Since, we have two identity
Providers, we will have to create a rule for each of these.
References:
https://blogs.technet.microsoft.com/privatecloud/2014/01/17/setting-up-windows-azure-active-directory-acs-to-provide-identities-to-windows-azure- pack/

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
founderDev
Highly Voted 5 years, 3 months ago
correct answer is : Create service namespace Add the identity provider Register application as relying party Generate provider rules for claimes Add a STS reference in vs2012
upvoted 17 times
ilCorvo
5 years, 2 months ago
The procedure is described here: https://blogs.msdn.microsoft.com/mcsuksoldev/2012/11/02/azure-access-control-services-creating-a-custom-identity-provider/
upvoted 5 times
...
Karel_Gott
5 years ago
Agree with founderDev: https://blog.2mas.xyz/configuring-windows-azure-active-directory-access-control/
upvoted 4 times
...
...
shyams3382
Most Recent 4 years, 4 months ago
https://blog.2mas.xyz/configuring-windows-azure-active-directory-access-control/ Create service namespace Add the identity provider Register application as relying party Generate provider rules for claimes Add a STS reference in vs2012
upvoted 2 times
...
hungry_ape9000
4 years, 12 months ago
FINAL ANSWER: Create a service namespace Add the third-party as the identity provider Register the application as the relying party Generate provider rules for claims Add a Security Token Service (STS) reference in Visual Studio 2012
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago