How A Major Retailer Successfully Performed a Divestiture v3

Video How A Major Retailer Successfully Performed a Divestiture

This webinar will cover aspects of how a retailer successfully transitioned from the parent company to a 100% cloud based managed service offering. This retailer is “all in on the cloud”, having no on-premise infrastructure even having their active directory hosted in the cloud. Hear how they rapidly integrated into multiple cloud applications including Office 365, migrating from the parent company’s on-prem exchange. We will cover approach, what worked and lessons learned.

optimal-cloud-login-screen

Video The OptimalCloud

(2 minutes 30 seconds) The OptimalCloud (2 minutes 30 seconds)
Provides a product overview and discusses the full benefits of The OptimalCloud.

deployment-scenarios

Video OptimalCloud Deployment Scenarios

(2 minutes 40 seconds) The OptimalCloud Deployment Scenarios (2 minutes 40 seconds)
Discusses several deployment scenarios for The OptimalCloud.

VIS for Federation Services

Video Virtual Identity Server for Federation Services

(10 minutes) Virtual Identity Server for Federation Services (10 minutes)
Provides an overview of the Virtual Identity Server for Federation Services

Video Virtual Identity Server for SharePoint

(10 minutes) Virtual Identity Server for SharePoint Hands-On-Demo (10 minutes)

Video Optimal People Picker for SharePoint

Optimal People Picker Overview (8 minutes)
Provides an overview of the Optimal People Picker

video bridging the protocol gap in cloud identity services

Video Webinar: Bridging The Protocol Gap On Cloud Identity Projects

(40 minutes 50 seconds) Webinar: Bridging The Protocol Gap On Cloud Identity Projects (40 minutes 50 seconds) Bridging the divide between newer authorization and federation protocols such as OAuth2 and OpenID Connect and connecting to older federation protocols such as SAML2 and WS-Federation presents some unique challenges. We will discuss those challenges and look at some practical, real world solutions. Various web applications, thick clients, and web services will be reviewed. This technical presentation will cover: Origin of protocols and when to use them Best options to use with mobile apps How to deal with situations outside of specifications Security concerns to consider

Just a few things . . .




 

By clicking Submit, you consent for us to use your personal data for sales and marketing efforts. If this is unacceptable, please contact us via telephone.