Introduction – Getting Setup
This blog post is all about getting ready to learn about .NET Services, and the Service Bus specifically. This blog is based on the Azure Services Toolit and adds additional background information.
The training kit can be downloaded at
Brief Intro about .NET Services – What is .NET Services and why should we learn it?
Similar to Enterprise Service Bus
.NET Services is about getting past firewalls and NATs
Certificates are needed for the Access Control Service
There are numerous SDK samples that illustrate these different credential options.
The client credential is a self-issued Windows CardSpace information card that is registered with the .NET Access Control Service.
The client credential is a self-issued Windows CardSpace information card that is registered with the .NET Access Control Service. The difference is the access token will be automatically renewed as needed.
The client credential is a managed Windows CardSpace information card issued by an identity provider trusted by the .NET Access Control Service.
The client credential is a username/password credential for the .NET Service Bus solution registered with the .NET Access Control Service.
The client credential is a X.509 certificate for the .NET Service Bus solution that has been registered with the .NET Access Control Service.
No client credential is provided.
Some Key Points about certificates and authentication
Table of contents for this blog post
Downloading of resources
This includes SDKs and the training kit
Hands-On Lab - .NET Services: Introduction to the .NET Service Bus – Setup
This is discussing the setup of the lab exercise
You must have the following items to complete this lab:
• Microsoft Visual Studio 2008
• Microsoft .NET Framework 3.5
You also need administrator privileges.
X.509 certificates are needed for the lab exercises
How certmgr.exe works
How makecert.exe works
You will need to install the .NET Services SDK
Azure Services Toolkit
The purpose of this blog post is to help understand the Hands-on Labs in more detail.
There are several useful downloads at http://www.microsoft.com/azure/sdk.mspx
Here are just a few:
Let's start with the certificates to begin the process.
One of the first things you will need to get up and running is some certificates, so that you can get the appropriate X.509 certificates to do some of these lab exercises. ...). If you need security, WSHttpBinding is another solution, but you will have to give your users some kind of credentials (Username/password, certificate...) to use your service.
Azure Access control works with .NET Services. It provides:
A certificate creation tool is used to generate and store in the local machine X.509 certificates.
We will use a certificate creation tool to generate and store in the local machine X.509 certificates.
The folder = C:\AzureServicesKit\Labs\IntroServiceBus\Setup
The script to execute = SetupEx.vbs
Delete Existing certificates
currentUser indicates that the certificate store is under the HKEY_CURRENT_USER key. This is the default
Indicates that the certificate store is a system store. If you do not specify this option, the store is a StoreFile.
System store is called My
Deletes certificates is used with the –del
Common name of certificat. In this example, client.com
Two registry locations (CurrentUser & LocalMachine)
Two System stores (My & TrustedPeople)
Create new certificates
Specifies the subject's certificate store location. Location can be either currentuser (the default), or localmachine.
Specifies the subject's certificate store name that stores the output certificate.
Specifies the signature algorithm. Must be either md5 (the default) or sha1.
Specifies the subject's certificate name. This name must conform to the X.500 standard. The simplest method is to specify the name in double quotes, preceded by CN=; for example, "CN=myName".
Specifies the subject's key type, which must be signature, exchange, or an integer that represents a provider type. By default, you can pass 1 for an exchange key and 2 for a signature key.
Marks the generated private key as exportable. This allows the private key to be included in the certificate.
Here is the command you will execute
If all goes well, you will see:
Next, the setup process will try to install some snippets to help with the programming side of the labs.
You may see a security warning. Simply hit "Yes" and continue to hit "Next" until you finally get the "Finish."
The final screen will look like this:
Downloading and Installing the Microsoft .Net Services SDK
Download the .NET Services SDK (currently the latest is March 2009)
Continue to hit "Next" until you hit finish.
This concludes the installation of the .NET Services SDK
Make sure you have an account with Azure
Now we are ready to start writing some applications…
Thank you for submitting this cool story - Trackback from progg.ru