SharePoint Blog

Sharing SharePoint Stories and Experiances

Exam SharePoint 2010 development (70-573 ) Material


I used the MeasureUp practice tests

C# version: http://www.measureup.com/70-573-CS-TS-Microsoft-SharePoint-2010-Application-Development-C-P1821.aspx

VB version: http://www.measureup.com/70-573-VB-TS-Microsoft-SharePoint-2010-Application-Development-VB-P1829.aspx

 

Here are a list of good resources

http://www.criticalpathtraining.com/Courses/Pages/DevelopingSolutionswithSharePoint2010Webcast.aspx

http://msdn.microsoft.com/en-us/sharepoint/ff420377.aspx

http://msdn.microsoft.com/en-us/SP2010DevTrainingCourse.aspx

http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=17215

http://www.appdev.com/prodfamily.asp?catalog_name=AppDevCatalog&category_name=SDXProduct&cookie%5Ftest=1

http://techtrainingnotes.blogspot.com/2010/05/sharepoint-2010-preparing-for-70-573-ts.html

http://www.amazon.com/SharePoint-2010-Developers-Certification-Toolkit/dp/0470912340/ref=sr_1_1?ie=UTF8&s=books&qid=1286009020&sr=8-1

http://www.amazon.com/SharePoint-2010-Development-Video-Training/dp/0672333066/ref=sr_1_12?s=books&ie=UTF8&qid=1286004216&sr=1-12

http://www.amazon.com/SharePoint-2010-Administration-Development-Interactive/dp/0975463187/ref=sr_1_17?s=books&ie=UTF8&qid=1286004770&sr=1-17

http://www.amazon.com/Professional-SharePoint-2010-Development-Programmer/dp/0470529423/ref=sr_1_1?ie=UTF8&qid=1313508572&sr=8-1

SharePoint Online (Office 365) is getting Second Service Update


The second update to SharePoint Online (SPO) since the launch of Office 365 (O365) is beginning to roll out worldwide. We want to share information about the new features that will be available as part of this service update.

Enterprise Readiness

SharePoint Online was initially scoped to scale to customers with fewer than 20,000 Active Directory entries (specifically user objects). This service update allows customers with up to 500,000 user objects to provision SharePoint Online. As a result, customers of any size can easily start using SharePoint Online. And in the future, you can expect even larger scale limits.
To learn more about how SharePoint Online meets the requirements of enterprises, please visit theSharePoint Online planning guide of Office 365 for enterprises. There is also a SharePoint Online planning guide of Office 365 for small businesses.

Recycle Bin Enhancements

Business is full of “oops” moments, and sometimes these moments can really slow down productivity. SharePoint Online now offers numerous levels of recovery no matter what gets deleted. Specifically, enterprise customers can now restore full site collections, in addition to sites, documents, lists, and list items.
This new feature is found in the SharePoint Online Administration Center. After the update is in place, you will see a new “Recycle Bin” button, which gives you the power to self-restore data—including entire site collections—with just a few clicks in just minutes.
To learn more about how to restore full SharePoint Online site collections, visit the SharePoint Online Support Resource Center article on this topic.

External Sharing Gets a Broader Reach

The days when external invitees had to use a specific domain-based email address are gone. Instead, external users can now use their business email address to authenticate when invited into an Office 365 customer’ssite collection. How does it work? It’s simple. External users just associate their business email address (ex: user@contoso.com) with the Windows LiveID system. Then, Office 365 customers invite their partners and clients to their external sharing sites by using their primary email account. As long as this email has been associated to the LiveID system, the external user can sign in with their primary user name and associated password.
To associate a business email user name to the Live ID system, go tohttps://idsignup.live.com, select “Use existing email address:” and follow the instructions.
You can learn more about how to use external sharing withinOffice 365 for small businesses or within Office 365 for enterprises.

PDFs

Office 365 users wanted a better, more connected and governed experience when it came to working with PDF files within SharePoint Online document libraries. Thanks to your direct comments and active voices in the Community forums, PDF files will now open directly into Adobe Reader without requiring that it be downloaded first. The PDF remains connected and stored in your SharePoint Online document library as you view and edit the file. You can even check it out like other Office documents.
After the SharePoint Online environment has been updated, users must have the latest Adobe Reader version (10.1.2) installed:http://get.adobe.com/reader/ 
 

Opening and editing PDF files in Adobe Reader and connected to SharePoint Online


You can now open PDF files directly in Adobe Reader – and the PDF file will remain connected to SharePoint Online. You can also edit and save your changes to SharePoint Online from the desktop. And further, you can now use versioning (check-in and check-out) with PDF files for better management and review. We have improved the experience while maintaining the level of security you expect from Office 365.

To take advantage of this update, do the following steps.
Wait for the update to the SharePoint Online service, which is in progress now.
Upgrade Adobe Reader to the version 10.1.2 client.
Add your SharePoint Online root URL/domain to the Trusted Sites security zone in Internet Explorer1 (e.g., https://contoso.sharepoint.com).
Check the Keep me signed in box when you log in to a SharePoint Online site.
This SharePoint Online update is currently being rolled out worldwide along with several other new features.

Thank you for your feedback and patience,
The SharePoint Online Team

1To add your root site to the Trusted Sites security zone, open Internet Explorer, browse to your root SharePoint online site, click Tools, and then click Internet options. Click the Security tab, click Trusted sites, click Sites, and then click Add.

Understanding Claims in SharePoint 2010


Sometimes claims are referred to as “metadata about a user”.  To over-simplify the topic, we sometimes hear them spoken about as Active Directory attributes or LDAP attributes. People often talk about the concept of claims in a very simple manner, saying that claims represent user attributes or attributes about a user.  To understand the concept, you have to view claims as an assertion that I make about myself.  In other words, a claim is an attribute that I claim to have or be.  For example, I can tell you that I am Canadian.  I can tell you I’m a Canadian of Italian heritage.  You may or may not believe me.  This is something that I’m claiming about my identity.  If you were to look at my passport, perhaps you’d be more inclined to believe this claim, because my passport is an official document that many agencies trust.  If you were to ask someone that you trust about me, and that person happens to know me well, then you would likely be inclined to trust what they say about me.

In the digital world, a claim must be trusted by the dependant application.   For example, SharePoint must trust a claims provider like ADFS2.  An application trusts a claim about a user’s identity if it is issued to the calling application by a trusted identity provider.  So when creating or deploying a claims aware application, it is important to establish a trust relationship between that claims-aware application (the relying party) and the claims issuer (sometimes called a claims identity provider).

Claims offer us much more than just retrieving attributes from a directory.  As an example, consider the scenario where a corporation’s external partner is not permitted to connect their system to the organization’s internal directory to retrieve attributes.  Even if they are permitted to connect, the partner has no way of trusting those attributes because they have no way of validating them.  As well, for the organization, there really is no effective way of limiting what attributes each calling application is permitted to access.

The real power of claims becomes evident when you consider the following points:

  • Claims are issued to applications by trusted identity providers
  • These trusted identity providers can be on-premise, in the cloud, inside or outside the enterprise
  • Trusted identity providers can be configured to only return certain claims to specific trusted calling applications
  • Claims tokens are digitally signed and communicated back to the calling application using standards based protocols (like SAML)
  • Claims are packaged up into tokens using standards based formats (like WS-Federation or SAML)

Claims allow us to take identities across network boundaries in a secure and trusted way, enabling us to solve some new and exciting challenges for our customers.  These challenges include federation, complex authentication requirements, as well as authorization based on not only who I am, but what my clearance level is, if I’m connecting over a secure connection or an internet cafe, the time of day, if I need two factor authentication for specific systems or sites, and so on.

Post Navigation