Using AAL to Secure Calls to a Classic WCF Service

[you do remember that this is my personal blog and those are my own opinions, right? ;-)] After the releases we’ve been publishing in the last few months, I am sure you have little doubt that REST is something we are really interested in supporting. The directory uses OAuth for all sorts of workloads, the…

0

Claims on the Client…

…and fire in the sky ♫ Don’t you hate it when a technical blog devolves in what is for the most part a series of announcements? That’s kind of what happened to mine. The reality is that making the things which get announced here take an inordinate amount of time, and that every remaining moment…

0

2 new great reviews for our book, and status after 1/2 year of availability

It’s since April that I don’t write about the book (at the time we released the entire Chapter 2 on MSDN). Last week I received notice that 2 new reviews were published: one is from the Denver Visual Studio User Group, the other is on Paul Van Brenk’s blog. Both reviews are extremely nice, for…

2

New version of the Biztalk Services SDK available, now with support for managed cards

Almost one year ago I briefly mentioned the Biztalk Service SDK, here and here. A new version has recently been made available: you would not believe the amount of new features that were added to it in this timeframe. The main reason of excitement for me is that this new release supports managed cards! It’s…

2

Perspectives.on10.net: podcast interview with Jon Udell on identity & "Understanding Windows CardSpace"

Jon Udell recently launched a new interesting format on the website perspectives.on10.net. Perspectives is a series of in-depth conversations with passionate innovators. Most work for Microsoft; some work elsewhere; all are advancing the state of the art in areas as diverse as robotics, digital identity, e-science, and social software. Information technology is the common thread,…

2

The Tao of Authentication (Part III - last)

(continues from Part I and Part II) Finally we’ve lined up all the elements we need for understanding how we can get rid of the 1-2-3 tyranny, and deal with our business requirements directly instead of relying on an old model that forces us to perform unnecessary steps and introduces artificial dependencies. For making sense…

6

The Tao of Authentication (Part II)

(continues from Part I) You can consider this post and the fine grained analysis we made in Part I as a down payment for grasping the implications we’ll see in Part III, which I plan to post in few hours (almost done). I was planning to have just 2 parts, but it came out far…

6

CardSpace & surveillance

Well, don’t get fooled. I’m not going to make any big philosophical considerations about technology and privacy (though I may do that in the future), but I will talk about the little project I’ve put together after three gintonics & the MIX party at TAO. I am often on the road. When I am homesick…

1

Kim on our book "Understanding Windows CardSpace"

  As mentioned in a post last November, Kim himself made us the huge honor of writing the foreword of our book “Understanding Windows CardSpace”. Today I had the same thrill as, while opening his blog, I’ve seen he dedicated an entire post to it!You know, it’s a strange feeling to go through the post…

2

NoSSL sample: a class for checking signatures of tokens sent to the RP in clear HTTP

[Edit: attached the sample app files]  In short: I show a simple class that checks the signature of self issued tokens sent on a normal HTTP connection (as opposed to HTTPS); the same class takes care of generating a UniqueID and giving access to claims. It basically covers for the NoSSL case the core functions…

6