The New Data Sync Solution Pete Calvert (@erucsbo) Personal devices Work Folders Folder Redirection / Client-Side Caching SkyDrive Pro Team / group work data Individual work data Consumer / personal data SkyDrive Data location Public cloud SharePoint.
Download ReportTranscript The New Data Sync Solution Pete Calvert (@erucsbo) Personal devices Work Folders Folder Redirection / Client-Side Caching SkyDrive Pro Team / group work data Individual work data Consumer / personal data SkyDrive Data location Public cloud SharePoint.
The New Data Sync Solution Pete Calvert (@erucsbo) Personal devices Work Folders Folder Redirection / Client-Side Caching SkyDrive Pro Team / group work data Individual work data Consumer / personal data SkyDrive Data location Public cloud SharePoint / Office 365 File server File server Personal devices Work Folders Folder Redirection / Client-Side Caching SkyDrive Pro Team / group work data Individual work data Consumer / personal data SkyDrive Data location Public cloud SharePoint / Office 365 File server File server Personal devices Work Folders Folder Redirection / Client-Side Caching SkyDrive Pro Team / group work data Individual work data Consumer / personal data SkyDrive Data location Public cloud SharePoint / Office 365 File server File server Device management policy Limit access to registered devices File encryption / selective wipe Require password / device lock Authentication Kerberos (Windows Auth) Digest (Windows Auth) ADFS (OAuth) https://workfolders.contoso.com Data management Quotas File screens Reporting Classification RMS protection 1. Local change detected 2. Initiate sync session with server 3. Upload file to server 4. Server applies change to data dir 5. Sync initiated by second client 6. Download file from server 7. Client applies change to data dir Client limited to 1 partnership per user per device Client always drives sync Change applier responsible for conflict resolution ? ? How does Joe connect to the right Work Folders server? Some simple options: Email him a URL Configuration management tools When we migrate Joe to a different server he needs a new URL… 1 1. Client resolves a standard URL: https://workfolders.contoso.com 1 2 1. Client resolves a standard URL: https://workfolders.contoso.com 2. DNS returns a server address for discovery (Sync1) 1 2 3 1. Client resolves a standard URL: https://workfolders.contoso.com 2. DNS returns a server address for discovery (Sync1) 3. Client sends discovery request to server 1. Client resolves a standard URL: https://workfolders.contoso.com 1 2 3 2. DNS returns a server address for discovery (Sync1) 4 SyncServerURL 3. Client sends discovery request to server 4. Server retrieves user property: MSDS-SyncServerURL (Sync3) 1. Client resolves a standard URL: https://workfolders.contoso.com 1 2 4 2. DNS returns a server address for discovery (Sync1) 3. Client sends discovery request to server 3 5 4. Server retrieves user property: MSDS-SyncServerURL (Sync3) 5. Client receives and stores its sync server URL for use in all future sync sessions 1. Client resolves a standard URL: https://workfolders.contoso.com 1 2 6 4 2. DNS returns a server address for discovery (Sync1) 3. Client sends discovery request to server 3 5 4. Server retrieves user property: MSDS-SyncServerURL (Sync3) 5. Client receives and stores its sync server URL for use in all future sync sessions 6. Client syncs with designated server Users join their device to their workplace (Lite domain join), making the device known to the company’s Active Directory for SSO, seamless MFA & authorization Users sign-in once to their company from any application and are not be prompted for credentials by every company application when using registered devices. Businesses enable users to work from anywhere while adhering to their IT governance policies around risk management Businesses require additional factors of authentication when business critical resources are accessed or when there is perceived risk Businesses set conditional access control to resources based on four core pivots: the user, the device used, the user’s network location and use of additional auth factors ISVs build enterprise apps that delivery SSO and allow enterprises to set the access control policies based on user, device and network location, and MFA http://technet.microsoft.com/en-us/library/dn265974.aspx test-lab-deployment.aspx http://blogs.technet.com/b/filecab/archive/2013/07/10/work-folders- http://channel9.msdn.com/Events/TechEd/Australia/2013 http://www.microsoftvirtualacademy.com/ http://technet.microsoft.com/en-au/ http://msdn.microsoft.com/en-au/