all Technical posts

Sentinet Extensibility – Custom SMS Alert Handler with Twilio

Sentinet is highly extendable through standard Microsoft .Net, WCF and WIF extensibility points. Also the Sentinet API interfaces can be used to extend Sentinet possibilities.

8 Aug 2014

all Technical posts

Creating a High Available FTP Server on Microsoft Azure

This blogpost will demonstrate how to create a high-available FTP server on the Microsoft Azure platform.

4 Aug 2014

all Technical posts

Not all properties are created equal!

Although there are several posts about the different type of Context Properties, they do not explain the most important differences in full. This post will not cover the PartContextPropertyBase because it is intended for very specific (EDI/MIME) scenarios.

3 Aug 2014

all Technical posts

Sentinet – Leverage the standard WCF extensibility points

Sentinet is highly extendable through standard Microsoft .NET, WCF and WIF extensibility points, and thorough the Sentinet API interfaces.In the previous post we saw how to build a custom access rule expression (standard .NET library), With this post I would like to continue the serie about the Sentinet Extensibility and demonstrate how to leverage the WCF extensibility setting up my virtual service with a custom endpoint behavior.

25 Jul 2014

all Technical posts

Troubleshooting the WCF-Custom adapter - Typed-Polling with dynamic SQL & empty result sets

Integration with SQL Server is not always a walk in the park. Recently I had to integrate dynamic SQL scripts with Typed-Polling and some of the resulted in empty result sets. In this post I explain the pitfalls and lessons learned of our solution by using a sample scenario.

22 Jul 2014

all Technical posts

Sentinet Extensibility – Custom Access Rule Expression

In Sentinet, authorization and access to any virtual service is defined using an Access Rule which is a combination of authorization expressions and logical conditions. Sentinet provides an out of the box access rule composer with a set of common Access Rule Expressions like X509 certificate, Claim and User validation. In this blog post I will go through the steps involved in creating a custom access rule expression, register it and test it.

8 Jul 2014
Load more

Thanks, we've sent the link to your inbox

Invalid email address

Submit

Your download should start shortly!

Stay in Touch - Subscribe to Our Newsletter

Keep up to date with industry trends, events and the latest customer stories

Invalid email address

Submit

Great you’re on the list!