1 / 14

M5: Data, Files, and Encryption

M5: Data, Files, and Encryption. Michael Palermo Microsoft Technical Evangelist Jeremy Foster Microsoft Developer Evangelist. Jump Start Target Agenda. Module Agenda. ˃. Design and implement data caching Save and retrieve files from the file system Secure application data. Caching.

Download Presentation

M5: Data, Files, and Encryption

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy Foster Microsoft Developer Evangelist

  2. Jump Start Target Agenda

  3. Module Agenda ˃ Design and implement data caching Save and retrieve files from the file system Secure application data

  4. Caching Expensive data web service, database Cached data local settings, local files, indexedDb, HTML local storage In-memory data page state, variables, objects, etc.

  5. Azure Caching

  6. Module Agenda Design and implement data caching Save and retrieve files from the file system Secure application data ˃

  7. Storage options consist of… Application state session state User settings local settings, roaming settings Application data temporary files, local files, roaming files, other? User data document libraries

  8. demo Codeshow: storage

  9. Module Agenda Design and implement data caching Save and retrieve files from the file system Secure application data ˃

  10. What Windows 8 can do to protect data… Create symmetric keys Perform symmetric encryption Create asymmetric keys Perform asymmetric encryption Derive password based keys Create message authentication codes (MACs) Hash content Digitally sign content Asynchronous protection of static data Asynchronous protection of a data stream Create a certificate Create a self-signed certificate Install a certificate response Import a certificate in PFX format Use smart card certificates and keys (sharedUserCertificates capabilities set) Use certificates from the user MY store (sharedUserCertificates capabilities set) Specify per application trusted root certificates Specify per application peer trusted certificates Explicitly disable inheritance from system trust Specify the certificate selection criteria

  11. Cryptography namespaces Windows.Security.Cryptography Static class for encoding and decoding data, generating random numbers, and converting between byte arrays and buffers Windows.Security.Cryptography.Certificates Types you can use to create certificate requests and install certificate responses Windows.Security.Cryptography.Core Algorithms for encrypting, signing, and hashing data Windows.Security.Cryptography.DataProtection Encrypt or decrypt static data or a data stream *requires Enterprise Authentication capability and should only be used in enterprise scenarios

  12. demo Codeshow: cryptography and encryption

  13. Summary Design and implement data caching Save and retrieve files from the file system Secure application data

More Related