Click here to monitor SSC
Robert Sheldon

Cybercrime - the Dark Edges of the Internet

Criminal activity is a growing menace on the internet. This inevitably means more diligence is required by legitimate users in the face of an increasingly sophisticated criminal threat. Robert Sheldon describes some of the emerging threats and risks. Read more...

Rick Rainey

Azure Active Directory Part 6: Schema Extensions

Continuing the series on Azure Active Directory, Rick Rainey walks through how to leverage schema extensions. Read more...

Rick Rainey

Azure Active Directory Part 5: Graph API

Continuing the series on Azure Active Directory, Rick Rainey walks through how to leverage the Azure AD Graph API. Read more...

Rick Rainey

Azure Active Directory Part 4: Group Claims

Rick Rainey shows how you can incorporate checking group membership in Azure Active Directory Claims in the fourth edition of his series on JustAzure. Read more...

Rick Rainey

Azure Active Directory Part 3: Developing Native Client Applications

Rick Rainey continues his series by detailing how to integrate a native client application with Azure Active Directory. Read more...

Rick Rainey

Azure Active Directory Part 2: Building Web Applications for Azure AD

Rick Rainey follows his introduction to Azure AD with an article on how to create web applications secured using Azure Active Directory. Read more...

Rick Rainey

Azure Active Directory Part 1: An Introduction

Rick Rainey provides an Introduction to Azure Active Directory in this first article in a series on the cloud user directory service from Microsoft. Read more...

Mike Wood

Windows Azure Management Certificates

Although Windows Azure can be used from the portal, it comes into its own once provisioning, deployments and maintenance can be automated or undertaken with specialized tools. To reach this stage, you need to understand Windows Azure Management Certificates. Mike Wood brings all this information into one article and guides you through the process. Read more...

Ming Lee

Show me security in the cloud!

The cloud isn't any more, or less, inherently secure than any other platform. To be confident that your cloud data is secure, there are several precautions you can take, as Ming describes. Read more...

Anton Staykov

Online Identity Management via Windows Azure Access Control Service

Windows Azure Access Control Service can be used to integrate your application’s authentication and authorization logic with whatever Identity providers you wish, as long as they support one of the security protocols that the service understands Read more...

Most Viewed

Windows Azure Virtual Machine: A look at Windows Azure IaaS Offerings (Part 2)
 We continue our introduction of the Azure IaaS by discussing how images and disks are used in the Azure... Read more...

An Introduction to Windows Azure BLOB Storage
 Azure BLOB storage is persistent Cloud data storage that serves a variety of purposes. Mike Wood shows... Read more...

An Introduction to Windows Azure Table Storage
 Windows Azure Tables are intended for the storage of large amounts of schemaless data. Tables are just... Read more...

Managing session state in Windows Azure: What are the options?
 Because you can't maintain session state for ASP.NET applications in Azure using the default in-process... Read more...

Windows Azure Management Certificates
 Although Windows Azure can be used from the portal, it comes into its own once provisioning,... Read more...