High-trust provider-host add-in for SharePoint 2013 on-premise

本文详细介绍如何在SharePoint环境中创建并配置高信任应用。包括安装配置SharePoint 2013,设置自签名证书,配置SharePoint信任提供商托管服务器等步骤。

Reference 

https://dev.office.com/sharepoint/docs/sp-add-ins/create-high-trust-sharepoint-add-ins

https://dev.office.com/sharepoint/docs/sp-add-ins/package-and-publish-high-trust-sharepoint-add-ins

  1. Install & configure SharePoint 2013 on-premise (not include) Install & configure provider-hosted server
  • Window 2008 / 2012 with IIS and ASP.NET 3.5 / 4.5 
  • Web Deploy
Use self-signed certificate for developing and replace it with domain-issued certificate or a commercial certificate issued by a Certificate Authority for PROD Create self-signed certificate in provider-hostoed server
  • Open IIS and highligh <Server name>
  • Double-click on Server Certificates in Feature View
  • Click on Create Self-signed certificate in Actions
  • Specify a name for certificate (HighTrustTest)
  • Keep certificate store to Personal
  • Click OK to finish
Export pfx file
  • Back to Feature View
  • Right click on the certificate created in step 3 (HighTrustTest) and click Export
  • Choose a destionation folder for saving pfx file and provide passowrd
Create cer file
  • Back to Feature View
  • Double-click on the certificate created in step 3 (HighTrustTest)
  • Click Cope to File in Details tab
  • Check "No, do not export the private key" in Export Private Key section
  • Check "DER encoded binary X.509 (.CER)" in Export File format section
Config SharePoint to trust provider-hosted server
  • Copy .cer file to any server in SharePoint farm
  • Run below script wit PowerShell
  • $remoteCerPath= "C:\HighTrustTest.cer"
    $certificate = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($remoteCerPath)
    New-SPTrustedRootAuthority -Name "HighTrustTestCert" -Certificate $certificate
    
    $realm = Get-SPAuthenticationRealm
    
    $issuerId = [System.Guid]::NewGuid() ## write down IssueId, will be userd in next
    $issuerIdentifier = $issuerId.ToString() + '@' + $realm
    
    New-SPTrustedSecurityTokenIssuer -Name "High Trust Test Cert" -Certificate $certificate -RegisteredIssuerName $issuerIdentifier -IsTrustBroker
    
    IISReset

     

  • Set OAuth over HTTP
  • $serviceConfig = Get-SPSecurityTokenServiceConfig
    $serviceConfig.AllowOAuthOverHttp = $true
    $serviceConfig.Update()

转载于:https://www.cnblogs.com/s1nce/p/7065774.html

本项目通过STM32F103C8T6单片机最小系统,连接正点原子ESP8266 WiFi模块,将模块设置为Station模式,并与电脑连接到同一个WiFi网络。随后,STM32F103C8T6单片机将数据发送到电脑所在的IP地址。 功能概述 硬件连接: STM32F103C8T6单片机与正点原子ESP8266 WiFi模块通过串口连接。 ESP8266模块通过WiFi连接到电脑所在的WiFi网络。 软件配置: 在STM32F103C8T6上配置串口通信,用于与ESP8266模块进行数据交互。 通过AT指令将ESP8266模块设置为Station模式,并连接到指定的WiFi网络。 配置STM32F103C8T6单片机,使其能够通过ESP8266模块向电脑发送数据。 数据发送: STM32F103C8T6单片机通过串口向ESP8266模块发送数据。 ESP8266模块将接收到的数据通过WiFi发送到电脑所在的IP地址。 使用说明 硬件准备: 准备STM32F103C8T6单片机最小系统板。 准备正点原子ESP8266 WiFi模块。 将STM32F103C8T6单片机与ESP8266模块通过串口连接。 软件准备: 下载并安装STM32开发环境(如Keil、STM32CubeIDE等)。 下载本项目提供的源代码,并导入到开发环境中。 配置与编译: 根据实际需求配置WiFi网络名称和密码。 配置电脑的IP地址,确保与ESP8266模块在同一网络中。 编译并下载程序到STM32F103C8T6单片机。 运行与测试: 将STM32F103C8T6单片机与ESP8266模块上电。 在电脑上打开网络调试工具(如Wireshark、网络调试助手等),监听指定端口。 观察电脑是否接收到来自STM32F103C8T6单片机发送的数据。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值