Authenticating to Your External System

When getting acquainted with BCS, most new users work against an unsecured backend. This means they can ignore the issue of authentication and focus on the fun stuff, like making external lists and searching external content. But real world external systems have all kinds of sensitive data: payrolls, inventories, credit card numbers, and more. The…

3

Working with BCS in Visual Studio 2010 series

The SharePoint Team Blog has a great series that walks you through the creation of an external list using Visual Studio 2010 and the new Business Data Connectivity Designer! The first two posts of the series are already live with more to come. Walkthrough of enabling CRUD for SharePoint 2010 external lists using Visual Studio…

0

Introducing the SharePoint SPIdentity Team Blog

Check out the SharePoint SPIdentity Team Blog to read up on how Identity was implemented in SharePoint 2010. There, aside from an introductory post, you’ll find the first to parts to a series of blog articles that talk about configuring claims-based authentication: Claims-based authentication “Cheat Sheet” Part 1: Forms based authentication and anonymous access Claims-based…

0

Using SharePoint workflows with BCS – Full Trust Workflow Activities

In the last post, we covered how to use Sandboxed Workflow Actions to lessen the stress on your external system. In this post, we will cover the final option for writing activities that surface BCS data to be used in SharePoint Designer (SPD): Full Trust Activities. These activities can be generic, but to build complex…

0