The New Data Sync Solution Pete Calvert (@erucsbo) Personal devices      Work Folders   Folder Redirection / Client-Side Caching  SkyDrive Pro Team / group work data Individual work data Consumer / personal data SkyDrive Data location Public cloud SharePoint.

Download Report

Transcript The New Data Sync Solution Pete Calvert (@erucsbo) Personal devices      Work Folders   Folder Redirection / Client-Side Caching  SkyDrive Pro Team / group work data Individual work data Consumer / personal data SkyDrive Data location Public cloud SharePoint.

The New Data Sync Solution
Pete Calvert
(@erucsbo)
Personal
devices





Work Folders


Folder Redirection /
Client-Side Caching

SkyDrive Pro
Team / group
work data
Individual
work data
Consumer /
personal data
SkyDrive
Data location
Public cloud
SharePoint / Office 365
File server
File server
Personal
devices





Work Folders


Folder Redirection /
Client-Side Caching

SkyDrive Pro
Team / group
work data
Individual
work data
Consumer /
personal data
SkyDrive
Data location
Public cloud
SharePoint / Office 365
File server
File server
Personal
devices





Work Folders


Folder Redirection /
Client-Side Caching

SkyDrive Pro
Team / group
work data
Individual
work data
Consumer /
personal data
SkyDrive
Data location
Public cloud
SharePoint / Office 365
File server
File server
Device management policy
Limit access to registered devices
File encryption / selective wipe
Require password / device lock
Authentication
Kerberos (Windows Auth)
Digest (Windows Auth)
ADFS (OAuth)
https://workfolders.contoso.com
Data management
Quotas
File screens
Reporting
Classification
RMS protection
1. Local change detected
2. Initiate sync session with server
3. Upload file to server
4. Server applies change to data dir
5. Sync initiated by second client
6. Download file from server
7. Client applies change to data dir
 Client limited to 1 partnership per user per device
 Client always drives sync
 Change applier responsible for conflict resolution
?
?
How does Joe connect to
the right Work Folders
server?
Some simple options:
Email him a URL
Configuration management tools
When we migrate Joe to a
different server he needs a
new URL…
1
1. Client resolves a standard URL:
https://workfolders.contoso.com
1
2
1. Client resolves a standard URL:
https://workfolders.contoso.com
2. DNS returns a server address for
discovery (Sync1)
1
2
3
1. Client resolves a standard URL:
https://workfolders.contoso.com
2. DNS returns a server address for
discovery (Sync1)
3. Client sends discovery request to
server
1. Client resolves a standard URL:
https://workfolders.contoso.com
1
2
3
2. DNS returns a server address for
discovery (Sync1)
4
SyncServerURL
3. Client sends discovery request to
server
4. Server retrieves user property:
MSDS-SyncServerURL (Sync3)
1. Client resolves a standard URL:
https://workfolders.contoso.com
1
2
4
2. DNS returns a server address for
discovery (Sync1)
3. Client sends discovery request to
server
3
5
4. Server retrieves user property:
MSDS-SyncServerURL (Sync3)
5. Client receives and stores its sync
server URL for use in all future
sync sessions
1. Client resolves a standard URL:
https://workfolders.contoso.com
1
2
6
4
2. DNS returns a server address for
discovery (Sync1)
3. Client sends discovery request to
server
3
5
4. Server retrieves user property:
MSDS-SyncServerURL (Sync3)
5. Client receives and stores its sync
server URL for use in all future
sync sessions
6. Client syncs with designated
server
Users join their device to their workplace (Lite domain join), making the device
known to the company’s Active Directory for SSO, seamless MFA & authorization
Users sign-in once to their company from any application and are not be prompted
for credentials by every company application when using registered devices.
Businesses enable users to work from anywhere while adhering to their IT
governance policies around risk management
Businesses require additional factors of authentication when business critical
resources are accessed or when there is perceived risk
Businesses set conditional access control to resources based on four core pivots: the
user, the device used, the user’s network location and use of additional auth factors
ISVs build enterprise apps that delivery SSO and allow enterprises to set the access
control policies based on user, device and network location, and MFA
http://technet.microsoft.com/en-us/library/dn265974.aspx
test-lab-deployment.aspx
http://blogs.technet.com/b/filecab/archive/2013/07/10/work-folders-
http://channel9.msdn.com/Events/TechEd/Australia/2013
http://www.microsoftvirtualacademy.com/
http://technet.microsoft.com/en-au/
http://msdn.microsoft.com/en-au/