Skip to main content

Posts Tagged ‘Business Connectivity Services’

SharePoint 2013 – Farm and App level ECTs in BCS

SharePoint 2013 introduces the concept of App level External Content Type(ECT) which allows model representing external entities to be packaged along with app in single unit so later it can be accessed by app to understand and integrate external data without outer dependencies. External Content Types(ECTs) and External List – BCS(Business Connectivity Services) is an […]

Consuming OData sources in SharePoint 2013 App step by step

SharePoint 2013  has an out-of-box supports for connecting to OData sources using BCS. You no longer are required to write .Net assembly connector to talk to external OData sources. 1. Open Visual Studio 2012 and create a new SharePoint 2013 App project. This project template is available after installing office developer tools for Visual Studio […]

Business Connectivity Services: FAST Indexing With Null Values in Arrays from BCS Entities

Recently, I was working with Jeff Monette [] at a client, setting up some Business Connectivity Services (BCS) connectors in SharePoint 2010 to index them with a FAST Search for SharePoint 2010 install.The connectors were set up correctly, and accessing data from external Line of Business (LOB) systems was not a problem.What turned out to […]

SharePoint 2010 Identity Delegation Part 2: Business Connectivity Services

In my last post, I demonstrated how to enable Windows Identity Foundation (WIF) on a WCF web service and configure it to require a SAML 1.1 “ActAs” token from a SharePoint 2010 server. In this post, I’ll demonstrate how this web service and the data it provides can be integrated with SharePoint 2010 in a […]

SharePoint 2010 Identity Delegation Part 1: Claims Aware Web Services

Most of my previous posts involve configuring Claims Mode authentication in SharePoint 2010 and using federated Identity Providers (IP) to authenticate users. I also recently demonstrated how roles can be defined internally and assigned to user identities via ADFS 2.0 through token augmentation. These roles can in turn be used for access control to resources […]