Azure, HyperV, VMware, System Center Browse by Tags - Bienvenue, on Frédéric ESNOUF's Web Log - Site Home - TechNet Blogs

Bienvenue, on Frédéric ESNOUF's Web Log

Microsoft France, Datacenter and Cloud

Browse by Tags

Related Posts
  • Blog Post: Introduction to application reverse engineering : The CWA (Communicator Web Access) R2 case.

    By Lucimara Desiderá (MS Consultant, São Paulo) & Frédéric ESNOUF (MS Pre-sales IDA, Paris) Introduction Intelligent Application Gateway is a very powerful remote access solution which provides a wide range of technologies such as VPN, VPN/SSL, Port forwarding and Reverse Proxy for application...
  • Blog Post: H1N1 and mobility : how to quickly implement a remote access solution

    In my day to day activity, I frequently have to discuss with customers and partners about technology around mobility and security. In the last 4 weeks I had a lot of requests from customers in the context of H1N1 disease, this is why I created this post. The main concern about this disease (I would...
  • Blog Post: Display end-point detection variables on the client-side

    When you connect an IAG portal, a client-side component will inspect your workstation and will take a “technical picture” of your machine. This “picture” will contain by default more than 200 checks and can be extended quickly to cope with your own security constraints. Once this analysis...
  • Blog Post: GEMALTO (Gemplus / Axalto Merger)

    GEMALTO authentication server is called Protiva. It is a global authentication solution which can especially provide OTP (One Time Password) authentication.   The integration is very simple since the protocol used between IAG and Protiva server is Radius, so we just need to change a few things....
  • Blog Post: Publishing web applications though IAG : what if it fails ?

    Microsoft IAG (Intelligent Application Gateway) is a powerful “mobility” gateway capable of providing remote access to different kind of people: employees, partners, customers, … It introduces several approaches to provide this mobility: ·         “Reverse proxy”: this...
  • Blog Post: Mobility in the middle of your lifestyle

    Lucky me, I am working for a company where mobility is truly part of the way we work. When I joined Microsoft, they gave me a “package” of technologies that I use every day. Check this picture: ·         A Laptop: running Windows 7 for now 6 month (I love Win7), strong...
  • Blog Post: Unknown devide error when runing IAG Virtual Lab with “Windows Virtual PC” on Windows 7 RTM

    I recently upgraded my machine to Windows 7 RTM, and have decided to also install the next version of Virtual PC named “Windows Virtual PC (WVPC)”. I am using a lot the Microsoft IAG Virtual Lab (downloadable online) for my day to day work (demo, dev, …). After attempting to start those Virtual Machines...
  • Blog Post: How to request for assistance when a Web Application is causing problems through IAG/UAG

    On my blog, I have created a dedicated section (TAG = howTo-Filters) for IAG application filters. Every time I have to face a problem with a web application, I create a post on my blog, try to share the approach I used to identify the problem, and of course to fix it.   Check this link to get more...
  • Blog Post: Strong authentication using your Brain : IAG and Gridsure.

    Gridsure, a UK company, has created a very nice way to provide strong authentication. Strong authentication combines what you know (login, password) and what you have (something physical). In the long list of strong authentication mechanisms we know Smartacards, tokens, and more recently we have seen...
  • Blog Post: Tracing Client-side

      When you connect IAG for the first time a “client”  (in fact a bunch of sub components) are installed on the machine (there are other ways to install the client than online install). Later they will be loaded when needed when you connect IAG, or load application that are tagged as “high secure...
  • Blog Post: Extending client-side analyzis (example : Test Registry Key)

      IAG is able to inspect your workstation and then later, per application, verify if you are compatible with the security policy.   For example, you want to make sure that only “corporate” machine can access ApplicationA, but everybody (of course after authentication) can access applicationB...
  • Blog Post: How to detect Skyrecon software in IAG

    By default, IAG is capable of detecting a wide range of software on the client side. What happen if the software I want to check is not in the list ? I had that constraint with one of my partners, Skyrecon Here is the methodology we used : 1) asked the partner to create a VBS that will do the checks...