Windows Identity Foundation (WIF) Fast Track

I want to taste from WIF. Sell me on it. Not too broad and not too deep. Just enough. What would you give me as a half page to hook me? Hmm… would this one work for you? What’s missing? What’s off? Getting Started (what is it, can I touch it?) Windows Identity Foundation Overview…

0

SSO, Identity Flow, Authorization In Cloud Applications and Services – Challenges and Solution Approaches

Regardless of the physical deployment the high level schema of canonical cloud application can be described as follows.   Key characteristics End user can have existing identities managed by industry strength identity providers such as Windows Live ID, Google, Yahoo!, Facebook, or enterprise Active Directory. End user interacts with the system that requires authentication and…

0

Windows Identity Foundation (WIF) SDK Help Overhaul

Overview Identity Challenges – SSO, Identity Flow, Fine Grained Authorization (Changed from: Identity Silos) The Claims-Based Identity Model Solution Concept (Changed from: Basic Scenario) Security Token Service Relying Party Solution Implementation Overview (Changed from: Federation Scenario) Fast track (How to use this content) Getting Started Windows Identity Foundation SDK – Download and Installation of runtime…

0

Windows Identity Foundation (WIF) Configuration Sections in ASP.NET Web.Config

This post outlines common configuration settings in web.config related to Windows Identity Foundation (WIF) when used with ASP.NET applications. Summary of Common WIF Configuration Settings Below is the summary of common configuration setting related to WIF: Authentication and Authorization configurations. Register Http Modules with ASP.NET pipeline Identity Model Configuration Section Initializing Audience Federation Configuration Token…

0

Windows Identity Foundation (WIF)/Azure AppFabric Access Control Service (ACS) Survival Guide Published

I have just published Windows Identity Foundation (WIF) and Azure AppFabric Access Control (ACS) Service Survival Guide. It has the following structure: Problem Scope What is it? How does it fit? How To Make It Work? Case Studies WIF/ACS Anatomy Architecture Identification (how a client identifies itself) Authentication (how client’s credentials validated) Identity flow (how…

0