0%

Book Description

Over 40 recipes to master claims-based identity and access control in .NET applications using Windows Identity Foundation, Active Directory Federation Services, and AppFabric Access Control Services

  • Gain a firm understanding of Microsoft’s Identity and Access Control paradigm with real world scenarios and hands-on solutions.
  • Apply your existing .NET skills to build claims-enabled applications.
  • Includes step-by-step recipes on easy-to-implement examples and practical advice on real world scenarios.

In Detail

Implementing security as a cross-cutting concern has several challenges. Consequently, modern software development practices and Service Oriented Architectures are alluding to the idea of claims-based Identity for access control. Microsoft’s Identity and Access Control paradigm leverages industry standard open specifications and provides tools, runtime and platform support for facilitating the development of claims-enabled applications.

Microsoft Windows Identity Foundation Cookbook explores real world scenarios on building claims-enabled .NET applications using Microsoft Windows Identity Foundation (WIF), Active Directory Federation Services 2.0 (AD FS 2.0) and Windows Azure Access Control Services (ACS).

This book covers all aspects of several real world challenges that professional developers face while enabling support for claims-based identity across interoperable platforms and building claims-enabled applications. The book then goes on to explore AD FS 2.0 and provides step-by-step details on how claims support is enabled in Microsoft’s server technologies.

The book starts by introducing you to the world of claims-based identity in .NET Framework 4.0. It then moves on to showcase the capabilities of the runtime and the associated SDK including the steps to perform identity delegation in ASP.NET MVC 3 applications, create WCF security token services, extend the runtime to provide support for SAML 2.0 specifications and use AppFabric as a trusted source for implementing access control. Further, the book explores AD FS 2.0 and features recipes showcasing steps to configure claims in Microsoft’s server technologies. It also features a chapter on some of the newer capabilities of the runtime including providing support for claims in Windows Workflow Foundation and Windows 8 Metro applications.

Windows Identity Foundation Cookbook provides a mix of recipes from basic to advanced to enable professional developers to implement claims-based identity in enterprise-wide scalable and interoperable applications.

Table of Contents

  1. Microsoft Windows Identity Foundation Cookbook
    1. Table of Contents
    2. Microsoft Windows Identity Foundation Cookbook
    3. Credits
    4. Foreword
    5. About the Author
    6. Acknowledgement
    7. About the Reviewers
    8. www.PacktPub.com
      1. Support files, eBooks, discount offers, and more
        1. Why Subscribe?
        2. Free Access for Packt account holders
        3. Instant Updates on New Packt Books
    9. Preface
      1. What this book covers
      2. What you need for this book
      3. Who this book is for
      4. Conventions
      5. Reader feedback
      6. Customer support
        1. Downloading the example code
        2. Errata
        3. Piracy
        4. Questions
    10. 1. Overview of Claims-based Identity
      1. Introduction
      2. Abstracting identity with claims
        1. How to do it...
        2. How it works...
        3. There's more...
          1. Authorization context
        4. See also
      3. Designing claims-based tokens using Security Assertion Markup Language
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
          1. Signing an assertion digitally
          2. Serializing SamlSecurityToken
          3. SamlAdvice and SamlConditions
        5. See also
      4. Augmenting security with a claims-based architecture
        1. Getting ready
        2. How to do it...
          1. How it works...
          2. There's more...
          3. See also
      5. Implementing federated security using a Security Token Service
        1. Getting ready
        2. How to do it...
          1. How it works...
          2. There's more...
            1. Passive federation
            2. Single realm STS
      6. Implementing Single Sign-On using claims
        1. How to do it...
          1. How it works...
          2. There's more...
      7. Implementing Single Sign-Out in a trust realm
        1. How to do it...
        2. How it works...
        3. There's more...
      8. Configuring certificates for the claims-based applications
        1. How to do it...
          1. How it works...
          2. There's more...
            1. Proof token
          3. See also
    11. 2. Programming with Windows Identity Foundation
      1. Introduction
      2. Configuring applications for Windows Identity Foundation runtime support
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
        5. See also
      3. Implementing claims in ASP.NET MVC 3 Web Applications
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
          1. Single sign-out
          2. WIF and ASP.NET MVC 4
        5. See also
      4. Extending the Windows integrated authentication to support claims-based identity
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
        5. See also
      5. Implementing claims-based authentication and authorization in ASP.NET MVC 3
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
          1. FederatedPassiveSignIn Control for ASPX View Engine
        5. See also
      6. Designing claims-enabled WCF services
        1. How to do it...
        2. How it works...
          1. ActAs and OnBehalfOf
        3. See also
      7. Implementing WIF Session Mode with a distributed token cache
        1. Getting ready
        2. How to do it...
          1. How it works...
          2. There's more...
          3. See also
    12. 3. Advanced Programming with Windows Identity Foundation
      1. Introduction
      2. Implementing the claims pipeline
        1. How to do it...
        2. How it works...
        3. There's more...
          1. Secure token consumer
        4. See also
      3. Designing a custom Identity Provider Security Token Service (IP-STS)
        1. How to do it...
        2. How it works...
        3. There's more...
        4. See also
      4. Designing a custom Relying Party Security Token Service (RP-STS)
        1. How to do it...
        2. How it works...
        3. There's more...
        4. See also
      5. Implementing support for SAML 2.0 tokens
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
          1. Bearer and Holder-of-key tokens
        5. See also
      6. Implementing Windows identity impersonation with Claims to Windows Token Service (c2WTS)
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
          1. Static content security
          2. Certificate logon
        5. See also
      7. Troubleshooting and monitoring in WIF
        1. How to do it...
        2. How it works...
        3. There's more...
    13. 4. Cloud-based Identity with Azure Access Control Service
      1. Introduction
      2. Configuring Access Control Service for an ASP.NET MVC 3 relying party
        1. Getting ready
        2. How to do it...
        3. How it works…
        4. See also
      3. Leveraging web-based identity providers such as Windows Live, Google, and Facebook
        1. How to do it...
        2. How it works…
        3. See also
      4. Designing secure REST services using ACS 2.0 and OAuth
        1. Getting ready
        2. How to do it...
        3. How it works…
        4. See also
      5. Using ACS 2.0 Management Service
        1. How to do it...
        2. How it works…
        3. See also
      6. Securing Windows Phone applications using ACS 2.0
        1. Getting ready
        2. How to do it...
        3. How it works…
        4. See also
      7. Securing iOS applications using ACS 2.0
        1. Getting ready
        2. How to do it...
        3. How it works…
    14. 5. Identity Management with Active Directory Federation Services
      1. Introduction
      2. Configuring a federation server
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
          1. SQL Server as a configuration database
          2. AD FS Role in Windows Server
      3. Implementing a federation scenario with WIF and AD FS 2.0
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
      4. Implementing a identity delegation
        1. How to do it...
        2. How it works...
        3. See also
      5. Integrating AD FS 2.0 with Azure ACS 2.0
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
      6. Troubleshooting in AD FS 2.0 with debug tracing
        1. How to do it...
        2. How it works...
        3. See also
    15. 6. Enterprise Server Interoperability with WIF, Azure ACS 2.0, and AD FS 2.0
      1. Introduction
      2. Implementing claims-based authentication in Microsoft SharePoint Server 2010
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
          1. FBA and the claims-based authentication
          2. Custom identity provider
        5. See also
      3. Implementing claims-based authentication in Microsoft Dynamics CRM Server 2011
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
          1. Disable claims-based authentication
          2. Claims-based authentication for Internet-Facing Deployment
        5. See also
      4. Implementing identity with AD FS 2.0 for the applications hosted on Windows Azure
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
      5. Integrating AD FS 2.0 with Office 365
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
        5. See also
      6. Implementing Single Sign-On with Salesforce
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
    16. 7. Extension and Future of Windows Identity Foundation
      1. Introduction
      2. Securing Workflow Services using Workflow Foundation Security Pack CTP 1
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
          1. The TokenFlowScope activity
        5. See also
      3. Implementing WIF SAML 2.0 Extension CTP
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
          1. Extensibility
      4. Securing Windows 8 Metro applications using Azure ACS 2.0
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
          1. Identity provider's login URL
          2. Cache credentials with Password Vault
          3. Windows Azure Toolkit for Windows 8
        5. See also
      5. Implementing machine-driven, claims-based access control with Windows Server 8 Dynamic Access Control and .NET Framework 4.5
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
      6. Configuring Federation Services role in Windows Server 8
        1. Getting ready
        2. How to do it...
        3. How it works...
        4. There's more...
    17. Index
3.145.202.61