Microsoft Windows Identity Foundation Cookbook
|Also available on:|
- Gain a firm understanding of Microsoft’s Identity and Access Control paradigm with real world scenarios and hands-on solutions.
- Apply your existing .NET skills to build claims-enabled applications.
- Includes step-by-step recipes on easy-to-implement examples and practical advice on real world scenarios.
Book DetailsLanguage : English
Paperback : 294 pages [ 235mm x 191mm ]
Release Date : April 2012
ISBN : 1849686203
ISBN 13 : 9781849686204
Author(s) : Sandeep Chanda
Topics and Technologies : All Books, Cookbooks, Enterprise, Microsoft
Table of ContentsPreface
Chapter 1: Overview of Claims-based Identity
Chapter 2: Programming with Windows Identity Foundation
Chapter 3: Advanced Programming with Windows Identity Foundation
Chapter 4: Cloud-based Identity with Azure Access Control Service
Chapter 5: Identity Management with Active Directory Federation Services
Chapter 6: Enterprise Server Interoperability with WIF, Azure ACS 2.0, and AD FS 2.0
Chapter 7: Extension and Future of Windows Identity Foundation
- Chapter 1: Overview of Claims-based Identity
- Abstracting identity with claims
- Designing claims-based tokens using Security Assertion Markup Language
- Augmenting security with a claims-based architecture
- Implementing federated security using a Security Token Service
- Implementing Single Sign-On using claims
- Implementing Single Sign-Out in a trust realm
- Configuring certificates for the claims-based applications
- Chapter 2: Programming with Windows Identity Foundation
- Configuring applications for Windows Identity Foundation runtime support
- Implementing claims in ASP.NET MVC 3 Web Applications
- Extending the Windows integrated authentication to support claims-based identity
- Implementing claims-based authentication and authorization in ASP.NET MVC 3
- Designing claims-enabled WCF services
- Implementing WIF Session Mode with a distributed token cache
- Chapter 3: Advanced Programming with Windows Identity Foundation
- Implementing the claims pipeline
- Designing a custom Identity Provider Security Token Service (IP-STS)
- Designing a custom Relying Party Security Token Service (RP-STS)
- Implementing support for SAML 2.0 tokens
- Implementing Windows identity impersonation with Claims to WindowsToken Service (c2WTS)
- Troubleshooting and monitoring in WIF
- Chapter 4: Cloud-based Identity with Azure Access Control Service
- Configuring Access Control Service for an ASP.NET MVC 3 relying party
- Leveraging web-based identity providers such as Windows Live, Google, and Facebook
- Designing secure REST services using ACS 2.0 and OAuth
- Using ACS 2.0 Management Service
- Securing Windows Phone applications using ACS 2.0
- Securing iOS applications using ACS 2.0
- Chapter 5: Identity Management with Active Directory Federation Services
- Configuring a federation server
- Implementing a federation scenario with WIF and AD FS 2.0
- Implementing a identity delegation
- Integrating AD FS 2.0 with Azure ACS 2.0
- Troubleshooting in AD FS 2.0 with debug tracing
- Chapter 6: Enterprise Server Interoperability with WIF, Azure ACS 2.0, and AD FS 2.0
- Implementing claims-based authentication in Microsoft SharePoint Server 2010
- Implementing claims-based authentication in Microsoft Dynamics CRM Server 2011
- Implementing identity with AD FS 2.0 for the applications hosted on Windows Azure
- Integrating AD FS 2.0 with Office 365
- Implementing Single Sign-On with Salesforce
- Chapter 7: Extension and Future of Windows Identity Foundation
- Securing Workflow Services using Workflow Foundation Security Pack CTP 1
- Implementing WIF SAML 2.0 Extension CTP
- Securing Windows 8 Metro applications using Azure ACS 2.0
- Implementing machine-driven, claims-based access control with Windows Server 8
- Dynamic Access Control and .NET
- Framework 4.5
- Configuring Federation Services role in Windows Server 8
Download the code and support files for this book.
Please let us know if you have found any errors not listed on this list by completing our errata submission form. Our editors will check them and add them to this list. Thank you.
Errata- 1 submitted: last submission 04 Mar 2013
Errata type: Typo | Page number: 6 | Errata date: 01 June 12
There are two corrections in the Foreword section:
In the second paragraph, "Active Server pages" should be "Active Server Pages".
In the same paragraph, "In addition to the learning curve of moving from Classic Active Server Pages to production-worthy .NET Framework 1.1 and ASP.NET Web Services, we were just beginning to dramatically disrupt the enterprise as a way to minimize the friction between systems while increasing the reusability of these integration investments."
"In addition to the learning curve of moving from Classic Active Server Pages to production-worthy .NET Framework 1.1 and ASP.NET, Web Services were just beginning to dramatically disrupt the enterprise as a way to minimize the friction between systems while increasing the reusability of these integration investments."
What you will learn from this book
- Master the different ways to extend the available runtime for a customized claims-based Single Sign-On implementation across interoperable platforms.
- Understand Microsoft’s offering on claims-based identity.
- Get to grips with enabling claims-based access control in your ASP.NET MVC 3 applications.
- Extend the runtime to support OASIS SAML 2.0 profiles for security token exchange in Passive Federation scenarios.
- Leverage cloud based access control services in your application.
- Enable claims support in Windows Communication Foundation and provide your implementation of security token services.
Implementing security as a cross-cutting concern has several challenges. Consequently, modern software development practices and Service Oriented Architectures are alluding to the idea of claims-based Identity for access control. Microsoft’s Identity and Access Control paradigm leverages industry standard open specifications and provides tools, runtime and platform support for facilitating the development of claims-enabled applications.
Microsoft Windows Identity Foundation Cookbook explores real world scenarios on building claims-enabled .NET applications using Microsoft Windows Identity Foundation (WIF), Active Directory Federation Services 2.0 (AD FS 2.0) and Windows Azure Access Control Services (ACS).
This book covers all aspects of several real world challenges that professional developers face while enabling support for claims-based identity across interoperable platforms and building claims-enabled applications. The book then goes on to explore AD FS 2.0 and provides step-by-step details on how claims support is enabled in Microsoft’s server technologies.
The book starts by introducing you to the world of claims-based identity in .NET Framework 4.0. It then moves on to showcase the capabilities of the runtime and the associated SDK including the steps to perform identity delegation in ASP.NET MVC 3 applications, create WCF security token services, extend the runtime to provide support for SAML 2.0 specifications and use AppFabric as a trusted source for implementing access control. Further, the book explores AD FS 2.0 and features recipes showcasing steps to configure claims in Microsoft’s server technologies. It also features a chapter on some of the newer capabilities of the runtime including providing support for claims in Windows Workflow Foundation and Windows 8 Metro applications.
Windows Identity Foundation Cookbook provides a mix of recipes from basic to advanced to enable professional developers to implement claims-based identity in enterprise-wide scalable and interoperable applications.
This book is written in a simple, easy to understand format, with lots of screenshots and step-by-step explanations.
Who this book is for
If you are a .NET developer looking forward to building access control in your applications using claims-based identity, then this is the best guide for you. This book is also an excellent choice for professionals and IT administrators trying to enable Single Sign-On across applications within the enterprise, and in the cloud spanning interoperable platforms.
No previous knowledge on the subject is necessary, however a strong foundation in the C# programming language and .NET Framework 4.0 is expected. A good understanding of authentication and authorization concepts (Windows and Forms based) in .NET would also help.