Azure, HyperV, VMware, System Center March, 2010 - Bienvenue, on Frédéric ESNOUF's Web Log - Site Home - TechNet Blogs

Bienvenue, on Frédéric ESNOUF's Web Log

Microsoft France, Datacenter and Cloud

March, 2010

  • UAG Activity Logging

    When you connect an application through UAG, all the user activity will be logged by the system. The reason is that it is not only a “technical” gateway (that will pass back and forth the HTTP requests), but an “application layer” one (that will also...
  • Understanding (and extending) UAG Web SSO capabilities

    First of all, I would like to thank Matthieu Martineau ( matthieu.martineau@piservices.fr ) (Gold Partner, MCSE and MCT) with whom I had the opportunity to investigate some of the breaking scenarios I mention at the end of this post In the wide...
  • Tracing UAG : don’t be blind ;-)

    Tracing a product is always a good thing. First , it helps you to understand how it works internally and so enhance your own skills… second , it helps you to understand why such expected feature or configuration is not working fine. With IAG (previous...
  • Changing the policy error message (graphical)

    The purpose of UAG is to provide “remote access” (more an employee term) and “application publishing” (more a partner or customer term). This means that UAG has to be ready to “talk” to people that are not IT specialists at all. Security policy...
  • Understanding workstation analysis, under the hood

    When you connect UAG, in an internal phase called “install and detect” the UAG client will download from the UAG server a file named Detection.VBS. This Detection.vbs file contains all the “VBS” code that will analyze the client machine. This...
  • Understanding workstation analysis and security policy

    Workstation analysis and security policy are the key features proposed by UAG to provide security at the application layer. Whereas firewall will operate at the network layer (filter by IP or TCP Port range), the application layer will look at “what”...